Takamasa Isohara’s research while affiliated with KDDI Research and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (21)


A Review on Machine Unlearning
  • Preprint

November 2024

·

10 Reads

·

Toru Nakamura

·

Takamasa Isohara

·

Recently, an increasing number of laws have governed the useability of users' privacy. For example, Article 17 of the General Data Protection Regulation (GDPR), the right to be forgotten, requires machine learning applications to remove a portion of data from a dataset and retrain it if the user makes such a request. Furthermore, from the security perspective, training data for machine learning models, i.e., data that may contain user privacy, should be effectively protected, including appropriate erasure. Therefore, researchers propose various privacy-preserving methods to deal with such issues as machine unlearning. This paper provides an in-depth review of the security and privacy concerns in machine learning models. First, we present how machine learning can use users' private data in daily life and the role that the GDPR plays in this problem. Then, we introduce the concept of machine unlearning by describing the security threats in machine learning models and how to protect users' privacy from being violated using machine learning platforms. As the core content of the paper, we introduce and analyze current machine unlearning approaches and several representative research results and discuss them in the context of the data lineage. Furthermore, we also discuss the future research challenges in this field.



Messages and Incentives to Promote Updating of Software on Smartphones

April 2024

·

20 Reads

To improve the rate of taking security action, it is important to promote personalized approaches for each user. Related works indicate phrases and UIs of dialog messages and incentives that influence a user’s action. In our previous work, we focused on smartphone users updating software, and proposed appropriate phrases of dialog messages according to the user’s understanding of the updating procedure, as well as the type of software. We also analyzed appropriate incentives. However, in the terms of level of literacy, the effectiveness of the UI of dialog messages and the volume of incentives remain unclear. In this paper, we conducted a user survey to analyze appropriate UIs according to the user’s understanding of the updating procedure and the appropriate volume of incentives. As a result, we confirmed different UIs are effective according to the user’s understanding of the updating procedure. In addition, we found an appropriate volume of points, mobile data, and coupons in order to promote the updating of software.




Standard stability checking algorithm
Stability checking algorithm for FHE
Modified Algorithm
An example of preference orders [4]. The table on the left shows the preference orders for men and the table on the right shows the preference orders for women
A blocking pair of the example [4]. Blue cells indicate current matching pairs. Red cells indicate blocking pairs. Here (m1,w2)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(m_1, w_2)$$\end{document} is the blocking pair, where m1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$m_1$$\end{document} prefers w2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$w_2$$\end{document} to w3\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$w_3$$\end{document} who is the current matching pair of m1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$m_1$$\end{document} and at the same time w2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$w_2$$\end{document} prefers m1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$m_1$$\end{document} to m3\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$m_3$$\end{document} who is the current matching pair of w2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$w_2$$\end{document}

+5

Private Verification in Multi-stakeholder Environment and its Application to Stable Matching
  • Article
  • Publisher preview available

March 2024

·

15 Reads

SN Computer Science

This paper provides a solution to mitigate mistrust that arises from untransparency in a multi-stakeholder environment. This work is related to a kind of verifiable computation. When considering the multi-stakeholder environment, not only the participants’ requirements but also the assignee’s intention should be respected. That is, the assignee should be given the discretion to select a result that is the best for the assignee among all the choices. However, there is a possibility that if the assignee is malicious, he/she may falsify and provide an inadequate result for participants to maximize his/her benefit by ignoring the participants’ requirements. It is difficult for the participants to detect this if they want to keep their preference orders secret from others. This paper proposes a solution to determine whether the received result is adequate for the participants while keeping their preference orders secret. The proposed solution is based on fully homomorphic encryption (FHE) and assumes the use of a semi-honest third-party server. This paper first describes a general solution that is not limited to specific requirements from participants. Next, this paper shows a way to apply to stable matching problem as a specific implementation. More specifically, a transformation of a standard stability checking algorithm into an algorithm that can be implemented by FHE with the computational complexity O(n2)O(n2)O(n^2). Finally, this paper gives an example of an implementation and its performance with HElib, which is an FHE library that provides BGV.

View access options



Hierarchical Local Differential Privacy

December 2023

·

17 Reads

Journal of Information Processing

The local differential privacy metric has attracted attention due to its quantitative nature, and many mechanisms have been studied for satisfying local differential privacy based on data formats and use cases. Local differential privacy mechanisms generally target a certain data space and perturb it sufficiently to provide indistinguishability of the data on that space. Therefore, individual data tends to be greatly disturbed so that even relatively simple tasks require a large amount of data to equalize the noise caused by the mechanism. In this paper, we define hierarchical local differential privacy, which is an extension of local differential privacy, and propose a mechanism to satisfy both local differential privacy and hierarchical local differential privacy. Hierarchical local differential privacy views a data space hierarchically as a set of smaller spaces, and instead of abandoning the privacy of data contained in different spaces, the amount of noise can be reduced. In this paper, we further design a hierarchical local differential privacy framework and achieve a privacy guarantee based on local differential privacy for all the data in the framework. Finally, we experimentally evaluate the proposed framework using image data. The framework allows control over the amount of information that can be disclosed, and furthermore, maintains a higher degree of utility than applying a simple local differential privacy mechanism.



Citations (4)


... The emergent nature of the mixed reality continuum defined by Milgram and Kishino [44] restricts the work done so far relative to how users interact with and experience suspicious emails aiming to capitalize either on the augmentation or the virtuality for the purpose of phishing, spamming, or scamming. So far, Kanaoka and Isohara [45] used the augmentation (e.g., AR glasses) to help users analyze images of URLs displayed across devices towards better phishing detection. Their usability test showed that the AR glasses helped users improve the correct identifying of phishing attempts compared to a baseline condition. ...

Reference:

"Oh, sh*t! I actually opened the document!": An Empirical Study of the Experiences with Suspicious Emails in Virtual Reality Headsets
Enhancing Smishing Detection in AR Environments: Cross-Device Solutions for Seamless Reality
  • Citing Conference Paper
  • March 2024

... Furthermore, we show a specific FHE-based verification algorithm for two-sided matching, which checks whether the matching is stable while the users' private inputs are kept secret. This paper is an extended version of the ICEIS paper written by Nakamura et al. [4]. In addition to the above contributions, we provide an implementation and its evaluation result with HElib, which is an open FHE library, in this paper. ...

Achieving Private Verification in Multi-stakeholder Environment and Application to Stable Matching
  • Citing Conference Paper
  • January 2023

... To address these practical concerns, machine unlearning has become a promising approach. Machine unlearning involves the targeted removal of certain training data and its influence from a trained model, ensuring that the revised model operates as though it has never been exposed to that data [15][16][17][18]. The most direct way of unlearning is to restart training on a dataset with that data deleted. ...

A Review on Machine Unlearning

SN Computer Science

... In security and privacy, Sano et al. [49,50], Faklaris et al. [30], and Ting et al. [55] have explored applying the Stages of Change and Processes of Change to end user studies. These researchers identified a theoretical and/or empirical basis for classifying computer users by whether they are in either precontemplation (Stage 1), contemplation/preparation (Stages 2-3), or action/maintenance (Stages 4-5) of adopting practices such as updating their operating systems, checking for https in URLs, and using antivirus software. ...

Designing Personalized OS Update Message based on Security Behavior Stage Model
  • Citing Conference Paper
  • December 2021