Takao Murakami

Top Profile Publications Japanese

International Journal Papers

  1. Privacy-Preserving Multiple Tensor Factorization for Synthesizing Large-Scale Location Traces with Cluster-Specific Features
    Takao Murakami, Koki Hamada, Yusuke Kawamoto, Takuma Hatano
    Proceedings on Privacy Enhancing Technologies (PoPETs), Issue 2, pp.5-26, 2021. [acceptance rate: 82/436 = 18.8%]
    [Published Version (PDF)] [Code]
  2. Exposing Private User Behaviors of Collaborative Filtering via Model Inversion Techniques
    Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka
    Proceedings on Privacy Enhancing Technologies (PoPETs), Issue 3, pp.264-283, 2020. [acceptance rate: 78/339 = 23.0%]
    [Published Version (PDF)]
  3. Cancelable Permutation-based Indexing for Secure and Efficient Biometric Identification
    Takao Murakami, Ryo Fujita, Tetsushi Ohki, Yosuke Kaga, Masakazu Fujio, Kenta Takahashi
    IEEE Access, Vol.7, pp.45563-45582, 2019.
    [Published Version (PDF)]
  4. Cancelable Indexing Based on Low-rank Approximation of Correlation-invariant Random Filtering for Fast and Secure Biometric Identification
    Takao Murakami, Tetsushi Ohki, Yosuke Kaga, Masakazu Fujio, Kenta Takahashi
    Elsevier Pattern Recognition Letters (Special Issue on Robustness, Security and Regulation Aspects in Current Biometric Systems), Vol.126, pp.11-20, 2019.
    [Published Version (PDF)]
  5. Signature Schemes with a Fuzzy Private Key
    Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki
    International Journal of Information Security, Vol.18, No.5, pp.581-617, 2019.
    [Published Version (PDF)]
  6. Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes
    Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka
    IEICE Transactions on Information and Systems, Vol.101-D, No.11, pp.2665-2676, 2018.
    [Published Version (PDF)]
  7. How to Handle Excessively Anonymized Datasets
    Ryo Nojima, Hidenobu Oguri, Hiroaki Kikuchi, Hiroshi Nakagawa, Koki Hamada, Takao Murakami, Yuji Yamaoka, Chiemi Watanabe
    Journal of Information Processing, Vol.26, pp.477-485, 2018.
    [Published Version (PDF)]
  8. Toward Distribution Estimation under Local Differential Privacy with Small Samples
    Takao Murakami, Hideitsu Hino, Jun Sakuma
    Proceedings on Privacy Enhancing Technologies (PoPETs), Issue 3, pp.84-104, 2018. [acceptance rate: 36/218 = 16.5%]
    [Published Version (PDF)]
  9. Modality Selection Attacks and Modality Restriction in Likelihood-ratio Based Biometric Score Fusion
    Takao Murakami, Yosuke Kaga, Kenta Takahashi
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E100-A, No.12, pp.3023-3037, 2017.
    [Published Version (PDF)] (Copyright (C) 2017 IEICE) (IEICE Transactions Online)
  10. Expectation-Maximization Tensor Factorization for Practical Location Privacy Attacks
    Takao Murakami
    Proceedings on Privacy Enhancing Technologies (PoPETs), Issue 4, pp.138-155, 2017. [acceptance rate: 52/231 = 22.5%]
    [Published Version (PDF)]
  11. Group Sparsity Tensor Factorization for Re-identification of Open Mobility Traces
    Takao Murakami, Atsunori Kanemura, Hideitsu Hino
    IEEE Transactions on Information Forensics and Security, Vol.12, No.3, pp.689-704, 2017.
    [Accepted Version (PDF)] [Published Version (IEEE Xplore)] [Code]
  12. Optimal Sequential Fusion for Multibiometric Cryptosystems
    Takao Murakami, Tetsushi Ohki, Kenta Takahashi
    Elsevier Information Fusion (Special Issue on Information Fusion in Biometrics), Vol.32, pp.93-108, 2016.
    [Accepted Version (PDF)] [Published Version (ScienceDirect)]
  13. Localization Attacks Using Matrix and Tensor Factorization
    Takao Murakami, Hajime Watanabe
    IEEE Transactions on Information Forensics and Security, Vol.11, No.8, pp.1647-1660, 2016.
    [Accepted Version (PDF)] [Published Version (IEEE Xplore)]
  14. Information-theoretic Performance Evaluation of Multibiometric Fusion under Modality Selection Attacks
    Takao Murakami, Yosuke Kaga, Kenta Takahashi
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E99-A, No.5, pp.929-942, 2016.
    [Published Version (PDF)] (Copyright (C) 2016 IEICE) (IEICE Transactions Online)
  15. A Measure of Information Gained through Biometric Systems
    Kenta Takahashi, Takao Murakami
    Elsevier Image and Vision Computing, Vol.32, No.12, pp.1194-1203, 2014.
    [Accepted Version (PDF)] [Published Version (ScienceDirect)]
  16. A General Framework and Algorithms for Score Level Indexing and Fusion in Biometric Identification
    Takao Murakami, Kenta Takahashi, Kanta Matsuura
    IEICE Transactions on Information and Systems, Vol.E97-D, No.3, pp.510-523, 2014.
    [Published Version (PDF)] (Copyright (C) 2014 IEICE) (IEICE Transactions Online)
  17. Toward Optimal Fusion Algorithms with Security against Wolves and Lambs in Biometrics
    Takao Murakami, Kenta Takahashi, Kanta Matsuura
    IEEE Transactions on Information Forensics and Security, Vol.9, No.2, pp.259-271, 2014.
    [Accepted Version (PDF)] [Published Version (IEEE Xplore)]
  18. Probabilistic Enhancement of Approximate Indexing in Metric Spaces
    Takao Murakami, Kenta Takahashi, Susumu Serita, Yasuhiro Fujii
    Elsevier Information Systems, Vol.38, No.7, pp.1007-1018, 2013.
    [Accepted Version (PDF)] [Published Version (ScienceDirect)]

International Conference Papers

  1. Locally Differentially Private Analysis of Graph Statistics
    Jacob Imola*, Takao Murakami*, Kamalika Chaudhuri (*: equal contributions)
    Proceedings of the 30th USENIX Security Symposium (USENIX Security 2021), 2021 (to appear).
    [Full Paper (arXiv)] [Code]
  2. TransMIA: Membership Inference Attacks Using Transfer Shadow Training
    Seira Hidano, Takao Murakami, Yusuke Kawamoto
    Proceedings of the 2021 International Joint Conference on Neural Networks (IJCNN 2021), 2021 (to appear).
  3. Local Distribution Obfuscation via Probability Coupling
    Yusuke Kawamoto, Takao Murakami
    Proceedings of the 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton 2019), pp.718-725, 2019.
    [Published Version (PDF)] [Full Paper (arXiv)]
  4. Local Obfuscation Mechanisms for Hiding Probability Distributions
    Yusuke Kawamoto, Takao Murakami
    Proceedings of the 24th European Symposium on Research in Computer Security (ESORICS 2019), pp.128-148, 2019. [acceptance rate: 67/344 = 19.5%]
    [Published Version (SpringerLink)] [Full Paper (arXiv)]
  5. Utility-Optimized Local Differential Privacy Mechanisms for Distribution Estimation
    Takao Murakami, Yusuke Kawamoto
    Proceedings of the 28th USENIX Security Symposium (USENIX Security 2019), pp.1877-1894, 2019. [acceptance rate: 113/719 = 15.7%]
    [Published Version (PDF)] [Full Paper (arXiv)] [Slide]
  6. Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions
    Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka
    Proceedings of the 22nd International Conference on Practice and Theory of Public Key Cryptography (PKC 2019), pp.549-580, 2019. [acceptance rate: 42/172 = 24.4%]
    [Accepted Version (PDF)] [Published Version (SpringerLink)]
  7. A Generalization of the Theory of Biometric System Entropy
    Kenta Takahashi, Takao Murakami
    Proceedings of the 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC 2018), pp.1-6, 2018.
    [Published Version (PDF)]
  8. On the Anonymization of Differentially Private Location Obfuscation
    Yusuke Kawamoto, Takao Murakami
    Proceedings of the 2018 International Symposium on Information Theory and Its Applications (ISITA 2018), pp.159-163, 2018.
    [Published Version (PDF)] (Copyright (C) 2018 IEICE)
  9. A Succinct Model for Re-identification of Mobility Traces Based on Small Training Data
    Takao Murakami
    Proceedings of the 2018 International Symposium on Information Theory and Its Applications (ISITA 2018), pp.164-168, 2018.
    [Published Version (PDF)] (Copyright (C) 2018 IEICE)
  10. Face/Fingerphoto Spoof Detection under Noisy Conditions by Using Deep Convolutional Neural Network
    Masakazu Fujio, Yosuke Kaga, Takao Murakami, Tetsushi Ohki, Kenta Takahashi
    Proceedings of the 11th International Conference on Bio-inspired Systems and Signal Processing (BIOSIGNALS 2018), pp.54-62, 2018.
    [Published Version (PDF)]
  11. A Secure and Practical Signature Scheme for Blockchain Based on Biometrics
    Yosuke Kaga, Masakazu Fujio, Ken Naganuma, Kenta Takahashi, Takao Murakami, Tetsushi Ohki, Masakatsu Nishigaki
    Proceedings of the 3rd International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2017), pp.877-891, 2017.
    [Accepted Version (PDF)] [Published Version (SpringerLink)]
  12. Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes
    Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka
    Proceedings of the 15th International Conference on Privacy, Security, and Trust (PST 2017), pp.115-126, 2017.
    [Accepted Version (PDF)] [Published Version (IEEE Xplore)]
  13. On Restricting Modalities in Likelihood-ratio Based Biometric Score Fusion
    Takao Murakami, Yosuke Kaga, Kenta Takahashi
    Proceedings of the 23rd International Conference on Pattern Recognition (ICPR 2016), pp.3031-3037, 2016.
    [Accepted Version (PDF)] [Published Version (IEEE Xplore)]
  14. Fuzzy Signatures: Relaxing Requirements and a New Construction
    Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka
    Proceedings of the 14th International Conference on Applied Cryptography and Network Security (ACNS 2016), LNCS 9696, pp.97-116, 2016. [acceptance rate: 35/183 = 19.1%]
    [Accepted Version (PDF)] [Published Version (SpringerLink)]
  15. Information-theoretic Performance Evaluation of Likelihood-ratio Based Biometric Score Fusion under Modality Selection Attacks
    Takao Murakami, Kenta Takahashi
    Proceedings of the 7th IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS 2015), pp.1-8, 2015. [acceptance rate (oral): 29/130 = 22.3%]
    [Accepted Version (PDF)] [Published Version (IEEE Xplore)]
  16. Group Sparsity Tensor Factorization for De-anonymization of Mobility Traces
    Takao Murakami, Atsunori Kanemura, Hideitsu Hino
    Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2015), pp.621-629, 2015. [acceptance rate: 79/278 = 28.4%]
    [Accepted Version (PDF)] [Published Version (IEEE Xplore)]
    [Best Paper Award (one of top 2 papers)]
  17. A Signature Scheme with a Fuzzy Private Key
    Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki
    Proceedings of the 13th International Conference on Applied Cryptography and Network Security (ACNS 2015), LNCS 9092, pp.105-126, 2015. [acceptance rate: 33/157 = 21.0%]
    [Accepted Version (PDF)] [Published Version (SpringerLink)]
  18. Location Prediction Attacks Using Tensor Factorization and Optimal Defenses
    Takao Murakami, Hajime Watanabe
    Proceedings of the 1st IEEE International Workshop on Big Data Security and Privacy (BDSP 2014), workshop at IEEE BigData2014, pp.13-21, 2014.
    [Accepted Version (PDF)] [Published Version (IEEE Xplore)]
  19. Towards Optimal Countermeasures against Wolves and Lambs in Biometrics
    Takao Murakami, Kenta Takahashi, Kanta Matsuura
    Proceedings of the 5th IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS 2012), pp.69-76, 2012. [acceptance rate (oral): 32/144 = 22.2%]
    [Accepted Version (PDF)] [Published Version (IEEE Xplore)]
    [Best Reviewed Paper (one of top 4 papers)]
  20. Fast and Accurate Biometric Identification Using Score Level Indexing and Fusion
    Takao Murakami, Kenta Takahashi
    Proceedings of the IEEE/IAPR International Joint Conference on Biometrics (IJCB 2011), pp.1-8, 2011. [acceptance rate (poster): 107/324 = 33.0%]
    [Accepted Version (PDF)] [Published Version (IEEE Xplore)]
  21. Versatile Probability-based Indexing for Approximate Similarity Search
    Takao Murakami, Kenta Takahashi, Susumu Serita, Yasuhiro Fujii
    Proceedings of the 4th ACM International Conference on Similarity Search and Applications (SISAP 2011), pp.51-58, 2011.
    [Accepted Version (PDF)] [Published Version (ACM Digital Library)]
    [Best Paper (one of top 3 papers)]
  22. A Metric of Information Gained through Biometric Systems
    Kenta Takahashi, Takao Murakami
    Proceedings of the 20th International Conference on Pattern Recognition (ICPR 2010), pp.1184-1187, 2010.
    [Accepted Version (PDF)] [Published Version (IEEE Computer Society Digital Library)]
  23. Accuracy Improvement with High Convenience in Biometric Identification Using Multihypothesis Sequential Probability Ratio Test
    Takao Murakami, Kenta Takahashi
    Proceedings of the 1st IEEE International Workshop on Information Forensics and Security (WIFS 2009), pp.66-70, 2009. [acceptance rate: 39/124 = 31.5%]
    [Accepted Version (PDF)] [Published Version (IEEE Xplore)]
  24. Speech Recognition Only with Supra-segmental Features --- Hearing Speech as music ---
    Nobuaki Minematsu, Tazuko Nishimura, Takao Murakami, Keikichi Hirose
    Proceedings of the International Conference on Speech Prosody, pp.589-594, 2006.
  25. Japanese Vowel Recognition Using External Structure of Speech
    Takao Murakami, Kazutaka Maruyama, Nobuaki Minematsu Keikichi Hirose
    Proceedings of the IEEE Automatic Speech Recognition and Understanding Workshop (ASRU 2005), pp.203-208, 2005. [acceptance rate: 73/(approximately)180 = 40%]
  26. Japanese Vowel Recognition Based on Structural Representation of Speech
    Takao Murakami, Kazutaka Maruyama, Nobuaki Minematsu, Keikichi Hirose
    Proceedings of the 9th European Conference on Speech Communication and Technology (Interspeech 2005), pp.1261-1264, 2005.

Talks

  1. Locally Differentially Private Analysis of Graph Statistics (from Usenix Security 2021)
    Takao Murakami
    IT-Security & Privacy Colloquium, the University of Luebeck, 2021.
  2. Toward Distribution Estimation under Local Differential Privacy with Small Samples
    Takao Murakami
    CSE 259 (Seminar in Artificial Intelligence), Fall 2018 AI Seminar, UC San Diego, 2018.
  3. Quantifying the Risk of Re-identification in Data Anonymization Competition
    Takao Murakami
    Workshop on Design Issues for a data Anonymization Competition (WODIAC), workshop at PETS 2017, 2017.
(Other publications include 7 domestic journal papers, 7 international patents, and 16 domestic patents.)