Takuya Yoshida

Takuya Yoshida

  • Cybersecurity

Based on my diverse experience in fundamental studies, applications, development, product marketing and planning and overseas posting, I work to keep a broad perspective so as to contribute to the research, development and dissemination of security technologies that are used worldwide.

  • Department

    • InfoTech IS,
      Information and Communication Planning Div.
  • Biography

    • 2018-

      Engaged in research and development on security for connected cars

    • 2016-
      2018

      Conducted marketing and planning for security products

    • 2011-
      2016

      Transferred to Silicon Valley, U.S.

    • 2002-
      2011

      Engaged in the security of products and services, in areas ranging from cryptographic primitives to applications and development, including research on encryption and authentication algorithms, research and development on web application security, and design and development on content protection

    • 2002

      Completed the doctoral program at Tokyo Institute of Technology and joined an electronics manufacturer

  • Publication List/Conference presentation

    Paper

    • Development and Operation of Personal Data Analysis Environment that Allows Appropriate Data Use without Compromising Usability, Information Processing Society of Japan, IPSJ SIG IOT65

    • Unsupervised Anomaly Detection using VQ-VAE and Transformer considering Statistics and Sequence of Flow Data, The Japanese Society for Artificial Intelligence, The 38th Annual Conference of the Japanese Society for Artificial Intelligence, 2024

    • GNN-based Anomaly Traffic Detection using Continuous Graph Considering Functional Transitions of Flow Data, The Japanese Society for Artificial Intelligence, The 38th Annual Conference of the Japanese Society for Artificial Intelligence, 2024

    • Unsupervised Anomaly Detection with Vector Quantization considering Statistics and Sequence of Flow Data, The Institute of Electronics, Information and Communication Engineers, 2024 Symposium on Cryptography and Information Security

    • A Graph Construction Method for Anomalous Traffic Detection with Graph Neural Networks Using Sets of Flow Data (Fast Abstract), IEEE, COMPSAC 2023

    • New Graph Composition Method based on Sets of Flow Data and its Application to Anomaly Traffic Detection with Graph Neural Networks, The Japanese Society for Artificial Intelligence, The 37th Annual Conference of the Japanese Society for Artificial Intelligence, 2023 (JSAI2023)

    • Proxy Re-encryption Scheme for Secure Data Sharing in Cloud Services
      Toshiba Review 66(11), 18-22, 2011-11

    • High-Speed Anonymous Authentication Technology to Prevent Dissemination of Personal Data
      Toshiba Review 64(7), 12-15, 2009-07

    • Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices
      International Workshop on Security IWSEC 2008: Advances in Information and Computer Security pp 83-99

  • Commendation/Memberships

    • Doctor of Engineering

    • Registered Information Security Specialist

    • Patents: JP 19 registered, Other(US, GB, FR, DE, CH, KR, SG, VN) 26 registered