Kazuhiro Kono Homepage

Paper

  1. N. Babaguchi, I. Echizen, J. Yamagishi, N. Nitta, Y. Nakashima, K. Nakamura, K. Kono, F. Fang, S. Myojin, Z. Kuang, H.H. Nguyen, and N. T. Tieu, "Preventing Fake Information Generation Against Media Clone Attacks," IEICE Transactions on Information and Systems, vol. E104-D, no. 1, pp. 2-11, 2021. (Invited Paper) (Win IEICE-ISS Excellent Paper Award)
  2. I. Echizen, N. Babaguchi, J. Yamagishi, N. Nitta, Y. Nakashima, K. Nakamura, K. Kono, F. Fang, S. Myojin, Z. Kuang, H.H. Nguyen, and N. T. Tieu, "Generation and Detection of Media Clones," IEICE Transactions on Information and Systems, vol. E104-D, no. 1, pp. 12-23, 2021. (Invited Paper) (Win IEICE-ISS Excellent Paper Award)
  3. K. Kono, "Toward Realization of Anonymous Services on the Internet," Safety Science Review 2010, no. 1, pp. 13-26, 2011. (in Japanese)
  4. K. Kono, S. Nakano, Y. Ito, and N. Babaguchi, "Anonymous Communication System Based on Multiple Loopbacks," Journal of Information Assurance and Security, 8 pages, online published 2011.
  5. K. Kono, S. Nakano, Y. Ito, and N. Babaguchi, "Theoretical Analysis of the Performance of Anonymous Communication System 3-Mode Net," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E93-A, no. 7, pp. 1338-1345, 2010.
  6. K. Kono, S. Nakano, Y. Ito, and N. Babaguchi, "A Consideration on the Numbers of Relay Nodes and Encryption Required for Anonymous Communication System 3-Mode Net," Journal of Information Assurance and Security, 8 pages , online published, 2010.
  7. K. Kono, Y. Ito, A. Aoyama, H. Kamoda, and N. Babaguchi, "Matrix-Based Algorithm for Integrating Inheritance Relations of Access Rights for Policy Generation," Journal of Information Processing, Vol. 17, pp. 318-327, December 2009.

International Conference

  1. K. Kono and N. Babaguchi, "Data Anonymization for Service Strategy Development and Information Recommendation to Users Based on TF-IDF Method," Proc. of 30th International Symposium on Information Theory and Its Applications (ISITA 2020), to be published in 2020.
  2. K. Kono, T. Yoshida, S. Ohshiro, and N. Babaguchi, "Passive Video Forgery Detection Considering Spatio-Temporal Consistency," Proc. of 14th International Conference on Information Assurance and Security (IAS 2018), 10 pages, Porto, Portugal, December 2018.
  3. S. Karita, K. Nakamura, K. Kono, Y. Ito, and N. Babaguchi, "Owner Authentication for Mobile Devices Using Motion Gestures Based on Multi-Owner Template Update," Proc. of 2015 Workshop on User Authentication for Emerging Interfaces (UAEI), in conjunction with IEEE International Conference on Multimedia and Expo (ICME2015), 6 pages, Torino, Italy, July 2015.
  4. K. Nakamura, K. Kono, Y. Ito, N. Babaguchi, "Tablet Owner Authentication Based on Behavioral Characteristics of Multi-Touch Actions," Proc. of International Conference on Pattern Recognition(ICPR 2012), 4 pages, Japan, November 2012.
  5. K. Kono, Y. Ito, and N. Babaguchi, Anonymous Communication System Using Probabilistic Choice of Actions and Multiple Loopbacks," Proc. 6th IEEE International Conference on Information Assurance and Security (IAS 2010), USA, pp. 210-215, 2010.
  6. K. Kono, S. Nakano, Y. Ito, and N. Babaguchi, "Security Analysis of Anonymous Communication System 3-Mode Net Against Collaborating Nodes," Proc. 2009 Asia-Pacific Signal and Information Processing Association Annual Summit Conference (APSIPA ASC 2009), pp. 105-110, Japan, October 2009.
  7. K. Kono, S. Nakano, Y. Ito, and N. Babaguchi, "Performance Analysis of Anonymous Communication System 3-Mode Net," Proc. 5th IEEE International Conference on Information Assurance and Security (IAS 2009), pp. 593-596, China, August 2009. (Win Best Paper Award

Thesis

Publication in Japanese and English

Copyright (C) Kazuhiro Kono Homepage All Rights Reserved.