Search Results for author: Takao Murakami

Found 8 papers, 1 papers with code

Degree-Preserving Randomized Response for Graph Neural Networks under Local Differential Privacy

no code implementations21 Feb 2022 Seira Hidano, Takao Murakami

Technically, our DPRR uses Warner's RR (Randomized Response) and strategic edge sampling, where each user's sampling probability is automatically tuned using the Laplacian mechanism to preserve the degree information under edge LDP.

Data Poisoning Graph Classification

TransMIA: Membership Inference Attacks Using Transfer Shadow Training

no code implementations30 Nov 2020 Seira Hidano, Takao Murakami, Yusuke Kawamoto

Transfer learning has been widely studied and gained increasing popularity to improve the accuracy of machine learning models by transferring some knowledge acquired in different training.

BIG-bench Machine Learning Transfer Learning

Locality Sensitive Hashing with Extended Differential Privacy

no code implementations19 Oct 2020 Natasha Fernandes, Yusuke Kawamoto, Takao Murakami

Then we show that our mechanisms enable friend matching with high utility and rigorous privacy guarantees based on extended DP.

Local Distribution Obfuscation via Probability Coupling

no code implementations13 Jul 2019 Yusuke Kawamoto, Takao Murakami

We introduce a general model for the local obfuscation of probability distributions by probabilistic perturbation, e. g., by adding differentially private noise, and investigate its theoretical properties.

Local Obfuscation Mechanisms for Hiding Probability Distributions

no code implementations3 Dec 2018 Yusuke Kawamoto, Takao Murakami

To improve the tradeoff between distribution privacy and utility, we introduce a local obfuscation mechanism, called a tupling mechanism, that adds random dummy data to the output.

Cryptography and Security Databases Information Theory Information Theory

On the Anonymization of Differentially Private Location Obfuscation

no code implementations23 Jul 2018 Yusuke Kawamoto, Takao Murakami

Obfuscation techniques in location-based services (LBSs) have been shown useful to hide the concrete locations of service users, whereas they do not necessarily provide the anonymity.

Cryptography and Security Databases Information Theory Information Theory

Cancelable Indexing Based on Low-rank Approximation of Correlation-invariant Random Filtering for Fast and Secure Biometric Identification

no code implementations5 Apr 2018 Takao Murakami, Tetsushi Ohki, Yosuke Kaga, Masakazu Fujio, Kenta Takahashi

Furthermore, existing biometric indexing schemes cannot be used in conjunction with template protection schemes to speed up biometric identification, since a biometric index leaks some information about the original feature.

Cannot find the paper you are looking for? You can Submit a new open access paper.