Takuya Yoshida
-
Cybersecurity
Based on my diverse experience in fundamental studies, applications, development, product marketing and planning and overseas posting, I work to keep a broad perspective so as to contribute to the research, development and dissemination of security technologies that are used worldwide.
-
Department
- InfoTech IS,
Information and Communication Planning Div.
- InfoTech IS,
-
Biography
-
-
2018-
-
Engaged in research and development on security for connected cars
-
-
-
2016-
2018 -
Conducted marketing and planning for security products
-
-
-
2011-
2016 -
Transferred to Silicon Valley, U.S.
-
-
-
2002-
2011 -
Engaged in the security of products and services, in areas ranging from cryptographic primitives to applications and development, including research on encryption and authentication algorithms, research and development on web application security, and design and development on content protection
-
-
-
2002
-
Completed the doctoral program at Tokyo Institute of Technology and joined an electronics manufacturer
-
-
-
Publication List/Conference presentation
Paper
-
Development and Operation of Personal Data Analysis Environment that Allows Appropriate Data Use without Compromising Usability, Information Processing Society of Japan, IPSJ SIG IOT65
-
Unsupervised Anomaly Detection using VQ-VAE and Transformer considering Statistics and Sequence of Flow Data, The Japanese Society for Artificial Intelligence, The 38th Annual Conference of the Japanese Society for Artificial Intelligence, 2024
-
GNN-based Anomaly Traffic Detection using Continuous Graph Considering Functional Transitions of Flow Data, The Japanese Society for Artificial Intelligence, The 38th Annual Conference of the Japanese Society for Artificial Intelligence, 2024
-
Unsupervised Anomaly Detection with Vector Quantization considering Statistics and Sequence of Flow Data, The Institute of Electronics, Information and Communication Engineers, 2024 Symposium on Cryptography and Information Security
-
A Graph Construction Method for Anomalous Traffic Detection with Graph Neural Networks Using Sets of Flow Data (Fast Abstract), IEEE, COMPSAC 2023
-
New Graph Composition Method based on Sets of Flow Data and its Application to Anomaly Traffic Detection with Graph Neural Networks, The Japanese Society for Artificial Intelligence, The 37th Annual Conference of the Japanese Society for Artificial Intelligence, 2023 (JSAI2023)
-
Proxy Re-encryption Scheme for Secure Data Sharing in Cloud Services
Toshiba Review 66(11), 18-22, 2011-11 -
High-Speed Anonymous Authentication Technology to Prevent Dissemination of Personal Data
Toshiba Review 64(7), 12-15, 2009-07 -
Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices
International Workshop on Security IWSEC 2008: Advances in Information and Computer Security pp 83-99
-
-
Commendation/Memberships
-
Doctor of Engineering
-
Registered Information Security Specialist
-
Patents: JP 19 registered, Other(US, GB, FR, DE, CH, KR, SG, VN) 26 registered
-