Masakatsu Nishigaki’s research while affiliated with Shizuoka University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (96)


Enhancing Remote Adversarial Patch Attacks on Face Detectors with Tiling and Scaling
  • Preprint

December 2024

·

8 Reads

Masora Okano

·

·

Masakatsu Nishigaki

·

This paper discusses the attack feasibility of Remote Adversarial Patch (RAP) targeting face detectors. The RAP that targets face detectors is similar to the RAP that targets general object detectors, but the former has multiple issues in the attack process the latter does not. (1) It is possible to detect objects of various scales. In particular, the area of small objects that are convolved during feature extraction by CNN is small,so the area that affects the inference results is also small. (2) It is a two-class classification, so there is a large gap in characteristics between the classes. This makes it difficult to attack the inference results by directing them to a different class. In this paper, we propose a new patch placement method and loss function for each problem. The patches targeting the proposed face detector showed superior detection obstruct effects compared to the patches targeting the general object detector.


Multibiometrics Using a Single Face Image

September 2024

·

5 Reads

·

Taito Tonosaki

·

Takafumi Aoki

·

[...]

·

Masakatsu Nishigaki

Multibiometrics, which uses multiple biometric traits to improve recognition performance instead of using only one biometric trait to authenticate individuals, has been investigated. Previous studies have combined individually acquired biometric traits or have not fully considered the convenience of the system.Focusing on a single face image, we propose a novel multibiometric method that combines five biometric traits, i.e., face, iris, periocular, nose, eyebrow, that can be extracted from a single face image. The proposed method does not sacrifice the convenience of biometrics since only a single face image is used as input.Through a variety of experiments using the CASIA Iris Distance database, we demonstrate the effectiveness of the proposed multibiometrics method.





LabellessFace: Fair Metric Learning for Face Recognition without Attribute Labels

September 2024

·

5 Reads

Demographic bias is one of the major challenges for face recognition systems. The majority of existing studies on demographic biases are heavily dependent on specific demographic groups or demographic classifier, making it difficult to address performance for unrecognised groups. This paper introduces ``LabellessFace'', a novel framework that improves demographic bias in face recognition without requiring demographic group labeling typically required for fairness considerations. We propose a novel fairness enhancement metric called the class favoritism level, which assesses the extent of favoritism towards specific classes across the dataset. Leveraging this metric, we introduce the fair class margin penalty, an extension of existing margin-based metric learning. This method dynamically adjusts learning parameters based on class favoritism levels, promoting fairness across all attributes. By treating each class as an individual in facial recognition systems, we facilitate learning that minimizes biases in authentication accuracy among individuals. Comprehensive experiments have demonstrated that our proposed method is effective for enhancing fairness while maintaining authentication accuracy.


Messages and Incentives to Promote Updating of Software on Smartphones

April 2024

·

20 Reads

To improve the rate of taking security action, it is important to promote personalized approaches for each user. Related works indicate phrases and UIs of dialog messages and incentives that influence a user’s action. In our previous work, we focused on smartphone users updating software, and proposed appropriate phrases of dialog messages according to the user’s understanding of the updating procedure, as well as the type of software. We also analyzed appropriate incentives. However, in the terms of level of literacy, the effectiveness of the UI of dialog messages and the volume of incentives remain unclear. In this paper, we conducted a user survey to analyze appropriate UIs according to the user’s understanding of the updating procedure and the appropriate volume of incentives. As a result, we confirmed different UIs are effective according to the user’s understanding of the updating procedure. In addition, we found an appropriate volume of points, mobile data, and coupons in order to promote the updating of software.



Perceiving Human Psychological Consistency: Attack Detection Against Advanced Persistent Social Engineering

February 2024

·

22 Reads

·

1 Citation

Social engineering involves manipulating a target to make it act to achieve the attacker's objectives. Currently, direct and short-term attacks are common in the mainstream. However, with the development of science and technology, there has been a shift toward extended and long-term attacks using VR and other technologies. We define advanced persistent social engineering (APSE) as social engineering in which a sophisticated intrusion is continuously made in the psychological aspect of the target so that the target voluntarily behaves as intended by the attacker. Countermeasures against APSE attacks have not been studied yet. We propose a method to detect APSE attacks by checking for inconsistencies in personality because the principles of human behavior (personality) do not change easily but change when others intrude.


Human Factors Impacting the Security Actions of Help Recipients

October 2023

·

3 Reads

Some users (“Help recipients”) delegate necessary security actions to their family, friends, or others close to them. It is important to be able to take appropriate defensive actions against security threats by themselves when help is not available from neighbors (“Helpers”). In this paper, we interviewed 9 users who used to be Help recipients, but who have now started to take security actions by themselves. We investigated the reason why Help recipients delegated their security actions to Helpers and the human factors that have an impact when one takes security actions by oneself. As a result, Help recipients take their own security actions when they try new hobbies or feel a sense of ownership. Based on these findings, we classify Help recipients into four groups and propose an optimized system that shows security action lists according to user situation. These findings are useful when providing appropriate intervention for Help recipients.


Citations (52)


... Identifying potentially harmful files or documents is crucial for early APT defense. In [52], the authors define advanced persistent social engineering (APSE) as social engineering in which a sophisticated intrusion continually penetrates the target's psychological aspect, causing the target to behave as the attacker intends readily. Authors proposed a framework that captures the change in human behavior. ...

Reference:

A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques
Perceiving Human Psychological Consistency: Attack Detection Against Advanced Persistent Social Engineering
  • Citing Conference Paper
  • February 2024

... Moreover, chaos theory can be used to compare the di erent states of an organization's systems and transferred data. The analysis can indicate a deviation from the normal behavior of the system, and might indicate a cyberattack 4 . The analyzed data can be obtained from various sources, such as logs, EDRs, networks, computers, and every device that is connected to the organization systems. ...

Scheme for Selection of Deceptions as a Countermeasure for Insider Threats
  • Citing Chapter
  • October 2023

... These problems do not exist in surface analysis. Previous studies that performed surface analysis have proposed image-based methods using ensemble learning [13]- [15]. Each feature of the malware is converted into an image, followed by feature extraction using convolutional neural network (CNN)-based models, and finally aggregating the classification results using ensemble learning. ...

Ensemble Malware Classifier Considering PE Section Information
  • Citing Article
  • Full-text available
  • September 2023

IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences

... The advantage of the approach for data processing as a condition for business agility (quality) is that managers are fully aware of the data as they directly collect it, which speeds up analytics (Chen et al., 2023;Curnin et al., 2023). The advantage of data preservation (resilience) is the low risk of data leakage due to the disparate nature of the data and the difficulty of copying it from different media (Ameri et al., 2023;Horikawa et al., 2023). ...

Enhancement of a Company-Wide Information Security Management System Through Incident Learning

SN Computer Science

... Dataset approach is an efficient method for improving fairness among races, yet constructing large-scale datasets with fairness considerations is not straightforward. Additionally, it has been pointed out that racial boundaries are ambiguous [6] and that the impact of fairness can also arise from the interrelationship between racial and environmental factors [12,17]. Many researches has also been conducted to address racial bias by innovating the structure of models to allow fair learning even with existing datasets that are biased towards certain races. ...

A Fair Model is not Fair in a Biased Environment
  • Citing Conference Paper
  • November 2022

... Another study demonstrated that by optimizing the activation functions, the classification accuracy of CIFAR-10 could be improved by 4.27%. Moreover, pretraining the activation function optimization for Fashion-MNIST and CIFAR-10, even in different networks and datasets, could enhance the classification accuracy [18]. ...

Improving Classification Accuracy by Optimizing Activation Function for Convolutional Neural Network on Homomorphic Encryption
  • Citing Chapter
  • October 2022

... In addition to the method basis and training data, previous works in the literature can be categorized based on the output resolution, i.e., low-resolution (e.g., 112 × 112) or high-resolution (e.g., 1024 × 1024) reconstructed face images. However, most works in the literature generate lowresolution face images [15], [16], [17], [18], [19], [20], [21]. In [15], an optimization-based method for whitebox TI attacks was proposed, where starting from a random noise or a guiding image an iterative gradient-ascend approach is used to generate an image that has a similar facial template. ...

Model-Free Template Reconstruction Attack with Feature Converter
  • Citing Conference Paper
  • September 2022

... CAPTCHA Scheme Perturbations Domain [3] Image-based Space [14] Image-based Space Text-based [15] Text-based Space [13] Image-based Space Text-based Click-based [4] Text-based Space [5] Image-based Space [18] Text-based Frequency [6] Text-based Space [16] Text-based Frequency [17] Text-image-based Space [18] Image-based Space [37] Audio-based Space [41] Image-based Frequency [38] Audio-based Space ...

Improving Robustness and Visibility of Adversarial CAPTCHA Using Low-Frequency Perturbation
  • Citing Chapter
  • March 2022

... Risk and crisis communication via social media could increase exposure to information such as guidelines, warnings, or peer experiences (Wukich, 2019;Zhang et al., 2019). Disaster managers may engage volunteers to improve the reach of social media messages (Kitagawa et al., 2022) or employ volunteer teams (aka Virtual Operations Support Teams) who monitor social media in support of disaster incident response (Reuter & Kaufhold, 2018;Reuter et al., 2016). ...

Deterrence-Based Trust: A Study on Improving the Credibility of Social Media Messages in Disaster Using Registered Volunteers
  • Citing Chapter
  • August 2021