default search action
Tetsushi Ohki
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Ren Takeuchi, Rikima Mitsuhashi, Masakatsu Nishigaki, Tetsushi Ohki:
Ensemble Malware Classifier Considering PE Section Information. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(3): 306-318 (2024) - [j6]Jun Narita, Takao Murakami, Hideitsu Hino, Masakatsu Nishigaki, Tetsushi Ohki:
Synthesizing differentially private location traces including co-locations. Int. J. Inf. Sec. 23(1): 389-410 (2024) - [c48]Ryo Iijima, Tatsuya Takehisa, Tetsushi Ohki, Tatsuya Mori:
The Catcher in the Eye: Recognizing Users by their Blinks. AsiaCCS 2024 - [c47]Kota Numada, Shinnosuke Nozaki, Takumi Takaiwa, Tetsushi Ohki, Masakatsu Nishigaki:
Perceiving Human Psychological Consistency: Attack Detection Against Advanced Persistent Social Engineering. EIDWT 2024: 152-162 - [c46]Toi Kojima, Tomoya Aiba, Soshi Maeda, Hiromi Arai, Masakatsu Nishigaki, Tetsushi Ohki:
Are Dark Patterns Self-destructive for Service Providers?: Revealing Their Impacts on Usability and User Satisfaction. HCI (37) 2024: 66-78 - [c45]Takumi Takaiwa, Shinnosuke Nozaki, Kota Numada, Tsubasa Shibata, Sana Okumura, Soichi Takigawa, Tetsushi Ohki, Masakatsu Nishigaki:
Electrical Muscle Stimulation System for Automatic Reproduction of Secret Information Without Exposing Biometric Data. HCI (46) 2024: 234-249 - [c44]Tomoya Aiba, Takahiko Arakawa, Masakatsu Nishigaki, Tatsuya Mori, Tetsushi Ohki:
MagSerea: Fingerprinting Magnetic Field of Specified Area with Wearable Sensors. MobileHCI (Companion) 2024: 6:1-6:6 - [c43]Soshi Maeda, Masora Okano, Masakatsu Nishigaki, Tetsushi Ohki:
DAP PLXENT#x1D107; : Develop pair-Authentication Protocol with DAP. MobileHCI (Companion) 2024: 11:1-11:6 - [c42]Tussoun Jitpanyoyos, Yuya Sato, Soshi Maeda, Masakatsu Nishigaki, Tetsushi Ohki:
ExpressionAuth: Utilizing Avatar Expression Blendshapes for Behavioral Biometrics in VR. VR Workshops 2024: 679-680 - [i5]Tetsushi Ohki, Yuya Sato, Masakatsu Nishigaki, Koichi Ito:
LabellessFace: Fair Metric Learning for Face Recognition without Attribute Labels. CoRR abs/2409.09274 (2024) - [i4]Tetsushi Ohki, Narishige Abe, Hidetsugu Uchida, Shigefumi Yamada:
A Human-Centered Risk Evaluation of Biometric Systems Using Conjoint Analysis. CoRR abs/2409.11224 (2024) - [i3]Koichi Ito, Taito Tonosaki, Takafumi Aoki, Tetsushi Ohki, Masakatsu Nishigaki:
Multibiometrics Using a Single Face Image. CoRR abs/2409.20003 (2024) - 2023
- [c41]Takahiko Arakawa, Yuya Sato, Hitoshi Sakano, Tetsushi Ohki:
Development of a Robust Ear Recognition Algorithm using Planar Approximation. APSIPA ASC 2023: 1811-1815 - [c40]Sana Okumura, Tomoya Amagasa, Tsubasa Shibata, Takumi Yamamoto, Tadakazu Yamanaka, Tetsushi Ohki, Masakatsu Nishigaki:
Scheme for Selection of Deceptions as a Countermeasure for Insider Threats. BWCCA 2023: 109-121 - [c39]Mei Suzuki, Ryo Iijima, Kazuki Nomoto, Tetsushi Ohki, Tatsuya Mori:
PinchKey: A Natural and User-Friendly Approach to VR User Authentication. EuroUSEC 2023: 192-204 - [c38]Ziga Emersic, Tetsushi Ohki, Muku Akasaka, Takahiko Arakawa, Soshi Maeda, Masora Okano, Yuya Sato, Anjith George, Sébastien Marcel, Iyyakutti Iyappan Ganapathi, Syed Sadaf Ali, Sajid Javed, Naoufel Werghi, S. G. Isik, Erdi Saritas, Hazim Kemal Ekenel, V. Hudovernik, Jan Niklas Kolf, Fadi Boutros, Naser Damer, G. Sharma, Aman Kamboj, Aditya Nigam, Deepak Kumar Jain, G. Cámara-Chávez, Peter Peer, Vitomir Struc:
The Unconstrained Ear Recognition Challenge 2023: Maximizing Performance and Minimizing Bias. IJCB 2023: 1-10 - 2022
- [c37]Takamichi Terada, Vo Ngoc Khoi Nguyen, Masakatsu Nishigaki, Tetsushi Ohki:
Improving Robustness and Visibility of Adversarial CAPTCHA Using Low-Frequency Perturbation. AINA (2) 2022: 586-597 - [c36]Muku Akasaka, Soshi Maeda, Yuya Sato, Masakatsu Nishigaki, Tetsushi Ohki:
Model-Free Template Reconstruction Attack with Feature Converter. BIOSIG 2022: 14-22 - [c35]Kohei Yagyu, Ren Takeuchi, Masakatsu Nishigaki, Tetsushi Ohki:
Improving Classification Accuracy by Optimizing Activation Function for Convolutional Neural Network on Homomorphic Encryption. BWCCA 2022: 102-113 - [c34]Ayumi Serizawa, Ryosuke Okudera, Yumo Ouchi, Mizuho Yoshihira, Yuya Shiomi, Naoya Nitta, Masataka Nakahara, Akira Baba, Yutaka Miyake, Tetsushi Ohki, Masakatsu Nishigaki:
Improving Palmprint-Region Estimation for ID-Less Palmprint Recognition. BWCCA 2022: 125-136 - [c33]Yusuke Shimizu, Tetsushi Ohki, Yusuke Yamamoto:
Privacy-aware Snippets: Enhancing Assessment of Balance between Privacy Risks and Benefits in Web Search. GoodIT 2022: 24-31 - [c32]Mizuho Yoshihira, Ayumi Serizawa, Ryosuke Okudera, Yumo Ouchi, Yuya Shiomi, Naoya Nitta, Masataka Nakahara, Akira Baba, Yutaka Miyake, Tetsushi Ohki, Masakatsu Nishigaki:
Improving Rank-N Identification Rate of Palmprint Identification Using Permutation-Based Indexing. HCI (32) 2022: 78-93 - [c31]Shinnosuke Nozaki, Ayumi Serizawa, Mizuho Yoshihira, Masahiro Fujita, Yoichi Shibata, Tadakazu Yamanaka, Nori Matsuda, Tetsushi Ohki, Masakatsu Nishigaki:
Multi-observed Multi-factor Authentication: A Multi-factor Authentication Using Single Credential. NBiS 2022: 201-211 - 2021
- [c30]Vo Ngoc Khoi Nguyen, Takamichi Terada, Masakatsu Nishigaki, Tetsushi Ohki:
Examining of Shallow Autoencoder on Black-box Attack against Face Recognition. APSIPA ASC 2021: 1775-1780 - [c29]Hiroto Tamiya, Toshiyuki Isshiki, Kengo Mori, Satoshi Obana, Tetsushi Ohki:
Improved Post-quantum-secure Face Template Protection System Based on Packed Homomorphic Encryption. BIOSIG 2021: 91-100 - [c28]Jun Narita, Yayoi Suganuma, Masakatsu Nishigaki, Takao Murakami, Tetsushi Ohki:
Synthesizing Privacy-Preserving Location Traces Including Co-locations. DPM/CBT@ESORICS 2021: 20-36 - [c27]Takumi Kitagawa, Tetsushi Ohki, Yuki Koizumi, Yoshinobu Kawabe, Toru Hasegawa, Masakatsu Nishigaki:
Deterrence-Based Trust: A Study on Improving the Credibility of Social Media Messages in Disaster Using Registered Volunteers. NBiS 2021: 188-201 - 2020
- [c26]Yuya Shiomi, Genki Sugimoto, Ayaka Sugimoto, Kota Uehara, Masahiro Fujita, Yuto Mano, Tetsushi Ohki, Masakatsu Nishigaki:
Micro Biometric Authentication Using Fingernail Surfaces: A Study of Practical Use. AINA 2020: 1330-1340 - [c25]Yumo Ouchi, Ryosuke Okudera, Yuya Shiomi, Kota Uehara, Ayaka Sugimoto, Tetsushi Ohki, Masakatsu Nishigaki:
Study on Possibility of Estimating Smartphone Inputs from Tap Sounds. APSIPA 2020: 1425-1429 - [c24]Yayoi Suganuma, Jun Narita, Masakatsu Nishigaki, Tetsushi Ohki:
Understanding the Impact of Service Trials on Privacy Disclosure. HCI (40) 2020: 605-612 - [c23]Ayaka Sugimoto, Yuya Shiomi, Akira Baba, Norihiro Okui, Tetsushi Ohki, Yutaka Miyake, Masakatsu Nishigaki:
A Liveness Detection Method for Palmprint Authentication. IHSI 2020: 385-391 - [c22]Koki Mukaihira, Yasuyoshi Jinno, Takashi Tsuchiya, Tetsushi Ohki, Kenta Takahashi, Wakaha Ogata, Masakatsu Nishigaki:
Communication Protocol Between Humans and Bank Server Secure Against Man-in-the-Browser Attacks. IHSI 2020: 503-509
2010 – 2019
- 2019
- [j5]Takao Murakami, Ryo Fujita, Tetsushi Ohki, Yosuke Kaga, Masakazu Fujio, Kenta Takahashi:
Cancelable Permutation-Based Indexing for Secure and Efficient Biometric Identification. IEEE Access 7: 45563-45582 (2019) - [j4]Takao Murakami, Tetsushi Ohki, Yosuke Kaga, Masakazu Fujio, Kenta Takahashi:
Cancelable indexing based on low-rank approximation of correlation-invariant random filtering for fast and secure biometric identification. Pattern Recognit. Lett. 126: 11-20 (2019) - [c21]Tetsushi Ohki, Vishu Gupta, Masakatsu Nishigaki:
Efficient Spoofing Attack Detection against Unknown Sample using End-to-End Anomaly Detection. APSIPA 2019: 224-230 - [c20]Yosuke Kaga, Masakazu Fujio, Kenta Takahashi, Tetsushi Ohki, Masakatsu Nishigaki:
PDH : Probabilistic Deep Hashing Based on Map Estimation of Hamming Distance. ICIP 2019: 2229-2233 - [c19]Mohammad Jahanian, Toru Hasegawa, Yoshinobu Kawabe, Yuki Koizumi, Amr Magdy, Masakatsu Nishigaki, Tetsushi Ohki, K. K. Ramakrishnan:
DiReCT: Disaster Response Coordination with Trusted Volunteers. ICT-DM 2019: 1-8 - [c18]Yoshinobu Kawabe, Yuki Koizumi, Tetsushi Ohki, Masakatsu Nishigaki, Toru Hasegawa, Tetsuhisa Oda:
On Trust Confusional, Trust Ignorant, and Trust Transitions. IFIPTM 2019: 178-195 - [i2]Yosuke Kaga, Masakazu Fujio, Kenta Takahashi, Tetsushi Ohki, Masakatsu Nishigaki:
PDH : Probabilistic deep hashing based on MAP estimation of Hamming distance. CoRR abs/1905.08501 (2019) - 2018
- [c17]Toshiki Honda, Kohei Mukaiyama, Takeharu Shirai, Tetsushi Ohki, Masakatsu Nishigaki:
Ransomware Detection Considering User's Document Editing. AINA 2018: 907-914 - [c16]Aki Harada, Yasushi Yamazaki, Tetsushi Ohki:
Biometric Bit String Generation for Smart-Phones Using Voice Data. APSIPA 2018: 12-16 - [c15]Masakazu Fujio, Yosuke Kaga, Takao Murakami, Tetsushi Ohki, Kenta Takahashi:
Face/Fingerphoto Spoof Detection under Noisy Conditions by using Deep Convolutional Neural Network. BIOSIGNALS 2018: 54-62 - [c14]Keisuke Inoue, Toshiki Honda, Kohei Mukaiyama, Tetsushi Ohki, Masakatsu Nishigaki:
Automatic Examination-Based Whitelist Generation for XSS Attack Detection. BWCCA 2018: 326-338 - [c13]Genki Sugimoto, Masahiro Fujita, Yuto Mano, Tetsushi Ohki, Masakatsu Nishigaki:
Micro Disposable Biometric Authentication: An Application Using Fingernail Minute Textures for Nonsensitive Services. ICBSP 2018: 68-73 - [c12]Yosuke Takahashi, Masashi Endo, Hiroaki Matsuno, Hiroaki Muramatsu, Tetsushi Ohki, Masakatsu Nishigaki:
A Study on Human Reflex-Based Biometric Authentication Using Eye-Head Coordination. NBiS 2018: 419-429 - [i1]Takao Murakami, Tetsushi Ohki, Yosuke Kaga, Masakazu Fujio, Kenta Takahashi:
Cancelable Indexing Based on Low-rank Approximation of Correlation-invariant Random Filtering for Fast and Secure Biometric Identification. CoRR abs/1804.01670 (2018) - 2017
- [j3]Yasushi Yamazaki, Tetsushi Ohki:
Toward More Secure and Convenient User Authentication in Smart Device Era. IEICE Trans. Inf. Syst. 100-D(10): 2391-2398 (2017) - [c11]Tetsushi Ohki, Akira Otsuka:
A Study on Autoencoder-based Reconstruction Method for Wi-Fi Location Data with Erasures. MPS@CCS 2017: 13-18 - [c10]Tetsushi Ohki, Akira Otsuka:
Theoretical vulnerabilities in map speaker adaptation. ICASSP 2017: 2042-2046 - [c9]Yosuke Kaga, Masakazu Fujio, Ken Naganuma, Kenta Takahashi, Takao Murakami, Tetsushi Ohki, Masakatsu Nishigaki:
A Secure and Practical Signature Scheme for Blockchain Based on Biometrics. ISPEC 2017: 877-891 - 2016
- [j2]Takao Murakami, Tetsushi Ohki, Kenta Takahashi:
Optimal sequential fusion for multibiometric cryptosystems. Inf. Fusion 32: 93-108 (2016) - 2014
- [c8]Yuuki Goubaru, Yasushi Yamazaki, Takeru Miyazaki, Tetsushi Ohki:
A consideration on a common template-based biometric cryptosystem using on-line signatures. GCCE 2014: 131-135 - [c7]Tetsushi Ohki, Akira Otsuka:
Theoretical vulnerability in likelihood-ratio-based biometric verification. IJCB 2014: 1-8 - 2013
- [j1]Yoshiaki Isobe, Tetsushi Ohki, Naohisa Komatsu:
Security performance evaluation for biometric template protection techniques. Int. J. Biom. 5(1): 53-72 (2013) - [c6]Toshiyuki Isshiki, Toshinori Araki, Kengo Mori, Satoshi Obana, Tetsushi Ohki, Shizuo Sakamoto:
New Security Definitions for Biometric Authentication with Template Protection: Toward covering more threats against authentication systems. BIOSIG 2013: 171-184 - 2012
- [c5]Seira Hidano, Tetsushi Ohki, Kenta Takahashi:
Evaluation of security for biometric guessing attacks in biometric cryptosystem using fuzzy commitment scheme. BIOSIG 2012: 1-6 - [c4]Tetsushi Ohki, Seira Hidano, Tatsuya Takehisa:
Evaluation of wolf attack for classified target on speaker verification systems. ICARCV 2012: 182-187 - 2010
- [c3]Seira Hidano, Tetsushi Ohki, Naohisa Komatsu, Kenta Takahashi:
A metric of identification performance of biometrics based on information content. ICARCV 2010: 1274-1279
2000 – 2009
- 2008
- [c2]Seira Hidano, Tetsushi Ohki, Naohisa Komatsu, Masao Kasahara:
On biometric encryption using fingerprint and it's security evaluation. ICARCV 2008: 950-956 - 2006
- [c1]Tetsushi Ohki, Shiro Akatsuka, Naohisa Komatsu, Masao Kasahara:
Safety of templates in biometric person authentication using error-correcting code. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60720K
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-21 20:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint