著書

  1. ファジィ・ニューロ・AIハンドブック,オーム社,1994 (共著)
  2. 講座ファジィ13 ファジィ・コンピューティング,  (ファジィProlog, 日刊工業新聞社, Vol. 13, pp.171-187,) 1995 (共著)
  3. ネットワークセキュリティ, (石橋啓一郎,菊池,松井彩,土井祐介訳) プリンスティスホール,1997 (共著)
  4. Fuzzy Logic for biginners , Masao Mukaidono (著), Hiroaki Kikuchi (訳), 2001.
  5. 情報セキュリティ (IT Text) , 宮地 充子 , 菊池 浩明, オーム社,2003.
  6. 情報セキュリティ事典, 土居 範久 (監修), 佐々木 良一 (編集), 岡本 栄司 (編集), 寺田 真敏 (編集), 内田 勝也 (編集), 菊池 浩明 (編集), 村山 優子 (編集), 共立出版, 2003.
  7. Javaによる情報メディアアルゴリズム入門 , 大原 茂之 (著), 浜本 和彦 (著), 山本 宙 (著), 菊池 浩明 (著), 日新出版, 2004 (共著). < /li>
  8. IT Textネットワークセキュリティ, 菊池浩明,上原哲太郎, オーム社, 2017年.第一版 正誤表
  9. 図解 コンピュータ概論[ソフトウェア・通信ネットワーク] 改訂4版 , 橋本 洋志,? 菊池 浩明,? 横田 祥, オーム社, 2017年.

博士・修士・卒業論文

  1. 東海大学 菊池研究室 (2003年度 ~ 2012年度)
  2. 明治大学 (2016年度~)

論文(査読付き)

    2017年度

  1. Chun-I Fan, Yi-Fan Tseng, Jheng-Jia Huang, Shih-Fen Chen, Hiroaki Kikuchi:, "Multireceiver Predicate Encryption for Online Social Networks", IEEE Trans. Signal and Information Processing over Networks 3(2): 388-403 (2017) doi
  2. 新原 功一 , 山田 道洋 , 菊池 浩明, "共有アカウント利用時における不正行為の誘発要因", 情報処理学会論文誌,58(12), pp. 1875-1889, 2017. doi
  3. Hiroaki KIKUCHI, Takayasu YAMAGUCHI, Koki HAMADA, Yuji YAMAOKA, Hidenobu OGURI, Jun SAKUMA, Study on Record Linkage of Anonymizied Data, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Volume E101.A (2018), Issue 1, pp. 19-28, 2018. doi
  4. 重本 倫宏, 藤井 翔太, 来間 一郎, 鬼頭 哲郎, 仲小路 博史, 藤井 康広, 菊池 浩明, ホワイトリストを用いた自律進化型防御システムの開発, 情報処理学会論文誌,59(3),pp. 1050-1060, 2018. doi
  5. Kikuchi H., Koichi N., Yamada M., How Much is Risk Increased by Sharing Credential in Group?, International Workshop on Security and Trust Management (STM 2017), Lecture Notes in Computer Science, vol 10547, Springer, pp 103-117, 2017. doi
  6. Satoshi Ito, Hiroaki Kikuchi, "Risk of Re-identification Based on Euclidean distance in Anonymized Data PWSCUP2015", Advances in Network-Based Information Systems. NBiS 2017, Lecture Notes on Data Engineering and Communications Technologies, vol 7. pp. 901-913, Springer, 2017. doi
  7. Hiroaki Kikuchi, Study from Data Anonymization Competition of Online Retail Data Workshop on Design Issues for a data Anonymization Competition (WODIAC), 2017. doi
  8. Niihara K., Yamada M., Kikuchi H., Sharing or Non-sharing Credentials: A Study of What Motivates People to Be Malicious Insiders, Human Aspects of Information Security, Privacy and Trust, HAS 2017, Lecture Notes in Computer Science, vol 10292, pp. 353-365, Springer, 2017. doi
  9. Yamada M., Niihara K., Kikuchi H. Decision Tree Analysis on Environmental Factors of Insider Threats, HCI International 2017 ? Posters' Extended Abstracts, HCI 2017, Communications in Computer and Information Science, vol 714. Springer, pp. 658-662, 2017. doi
  10. Satoshi Ito, Hiroaki Kikuchi, Risk of Re-Identification Based on Euclidean Distance in Anonymized Data PWSCUP2015, Advances in Network-Based Information Systems (NBiS 2017), Lecture Notes on Data Engineering and Communications Technologies, vol 7, pp. 901-913, Springer, 2017. doi
  11. H. Kikuchi, C. Hamanaga, H. Yasunaga, H. Matsui and H. Hashimoto, " Privacy-Preserving Multiple Linear Regression of Vertically Partitioned Real Medical Datasets," 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), Taipei, 2017, pp. 1042-1049, 2017. doi
  12. M. Yamaguchi and H. Kikuchi, Audio-CAPTCHA with distinction between random phoneme sequences and words spoken by multi-speaker 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Banff, AB, pp. 3071-3076, 2017. doi
  13. 2016年度

  14. Khamphao Sisaat , Surin Kittitornkun, Hiroaki Kikuchi, Chaxiong Yukonhiatou, Masato Terada, Hiroshi Ishii, A Spatio-Temporal malware and country clustering algorithm: 2012 IIJ MITF case study, International Journal of Information Security, pp 1-15, Springer, 2016. doi
  15. 新原 功一, 菊池 浩明, eラーニングをモデルとした内部犯行の予測因子の識別,情報処理学会論文誌, Vol. 57, No. 9, pp. 2064 - 2076, 2016. doi
  16. Hiroaki Kikuchi, Katsumi Takahashi, "Zipf Distribution Model for Quantifying Risk of Re-identification from Trajectory Data", Journal of Information Processing, Vol. 24 (2016) No. 5 pp. 816-823., 2016 (Best Paper Award) doi
  17. 菊池 浩明, 匿名加工・再識別コンテストIce and Fire:匿名加工方式とその安全性を評価する試み, 情報処理学会論文誌,57(9), pp. 1900-1910, IPSJ, 2016. doi
  18. H. Kikuchi, K. Sasa and Y. Shimizu, Interactive History Sniffing Attack with Amida Lottery, Fukuoka, 2016, 016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 599-602, IEEE, 2016. doi
  19. Hirofumi Nakakoji, Yasuhiro Fujii, Yoshiaki Isobe, Tomohiro Shigemoto, Tetsuro Kito, Naoki Hayashi, Nobutaka Kawaguchi, Naoki Shimotsuma, Hiroaki Kikuchi, Proposal and Evaluation of Cyber Defense System Using Blacklist Refined Based on Authentication Results, 2016 19th International Conference on Network-Based Information Systems (NBiS), pp. 135-139, IEEE, 2016. doi
  20. H. Kikuchi, H. Yasunaga, H. Matsui and C. I. Fan, Efficient Privacy-Preserving Logistic Regression with Iteratively Re-weighted Least Squares, 2016 11th Asia Joint Conference on Information Security (AsiaJCIS), pp. 48-54, IEEE, 2016. doi
  21. C. I. Fan, J. S. Wang, J. J. Huang, Y. F. Tseng, W. S. Juang and H. Kikuchi, Flexible Authentication Protocol with Key Reconstruction in WBAN Environments, 2016 6th International Conference on IT Convergence and Security (ICITCS), pp. 1-5, IEEE, 2016. doi
  22. H. Kikuchi, T. Yamaguchi, K. Hamada, Y. Yamaoka, H. Oguri and J. Sakuma, Ice and Fire: Quantifying the Risk of Re-identification and Utility in Data Anonymization, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), pp. 1035-1042, IEEE, 2016. doi
  23. Hiroaki Kikuchi, Takayasu Yamaguchi, Koki Hamada, Yuji Yamaoka, Hidenobu Oguri, Jun Sakuma: A Study from the Data Anonymization Competition Pwscup 2015 Data Privacy Management and Security Assurance (DPM 2016), LNCS, volume 9963, pp. 230-237, Springer, 2016. doi
  24. Koichi Niihara, Hiroaki Kikuchi: Primary Factors of Malicious Insider in E-learning Model. HCI (26) 2016: 482-487
  25. Jheng-Jia Huang, Wen-Shenq Juang, Chun-I Fan, Yi-Fan Tseng, Hiroaki Kikuchi, Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments, MobiQuitous (Adjunct Proceedings) 2016: 88-93, 2016.
  26. 2015年度

  27. 仲小路 博史 , 重本 倫宏 , 鬼頭 哲郎 , 林 直樹 , 寺田 真敏 , 菊池 浩明, "多種環境マルウェア動的解析システムの提案および評価", 情報処理学会論文誌,56(9),pp. 1730-1744, 2015. doi
  28. 山口 通智 , 岡本 健 , 菊池 浩明, "機械合成文の不自然度相対識別問題に基づくCAPTCHAの提案", 情報処理学会論文誌,56(9),pp. 1834-1845 , 2015. doi
  29. 金子 洋平 , 齋藤 孝道 , 菊池 浩明, "暗号モジュールを搭載したプロセッサにおける暗号処理のオフローディング方式の効率化の提案と評価", 情報処理学会論文誌,56(9),pp. 1846-1856, 2015. doi
  30. Hiroaki KIKUCHI, Kouichi ITOH, Mebae USHIDA, Hiroshi TSUDA, Yuji YAMAOKA, Privacy-Preserving Decision Tree Learning with Boolean Target Class, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E98.A, No. 11, pp. 2291-2300, 2015. doi
  31. Yoichi Hayashi, Yuki Tanaka, Tomohiro Takagi, Takamichi Saito, Hideaki Iiduka, Hiroaki Kikuchi, Guido Bologna, Sushmita Mitra, "RECURSIVE-RULE EXTRACTION ALGORITHM WITH J48GRAFT AND APPLICATIONS TO GENERATING CREDIT SCORES", Journal of Artifical Intelligence and soft computing research (JAISCR), 2016, Vol. 6, No. 1, pp. 35-44, 2015. doi
  32. Masafumi Kosugi, Tsuyoshi Suzuki, Osamu Uchida, Hiroaki Kikuchi:, "SWIPASS: Image-Based User Authentication for Touch Screen Devices", Journal of Information Processing (JIP), Vol. 24, No. 2, pp. 227-236, 2016. doi
  33. Michitomo Yamaguchi, Takeshi Okamoto, Hiroaki Kikuchi, CAPTCHA System by Differentiating the Awkwardness of Objects, 2015 18th International Conference on Network-Based Information Systems (NBiS), pp. 257-263, IEEE, 2015. doi
  34. Hiroaki Kikuchi, Hideki Hashimoto, Hideo Yasunaga, Privacy-Preserving Epidemiological Analysis for a Distributed Database of Hospitals, 2015 10th Asia Joint Conference on Information Security (AsiaJCIS), pp. 85-90, IEEE, 2015. doi
  35. Hiroaki Kikuchi, Hiroaki Matsumoto, Hiroshi Ishii, Automated Detection of Drive-By Download Attack, 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 511-515, IEEE, 2015. doi
  36. Hiroaki Kikuchi, Katsumi Takahashi Zipf, distribution model for quantifying risk of re-identification from trajectory data, 2015 13th Annual Conference on Privacy, Security and Trust (PST), pp. 14-21, IEEE, 2015. doi
  37. Niihara K., Kikuchi H., Primary Factors of Malicious Insider in E-learning Model, HCI International 2016 ? Posters' Extended Abstracts, HCI 2016, Communications in Computer and Information Science, vol 617, pp. 482-487, Springer, 2016. doi
  38. 2014年度

  39. Hiroaki Kikuchi, Jun Sakuma, Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection "Journal of Information Processing, Vol. 22 (2014) No. 2 pp. 388-400. doi
  40. Hiroaki Kikuchi, Kouichi Itoh, Mebae Ushida, Yuji Yamaoka, Takanori OIKAW, Secret Sharing Scheme with Efficient Keyword Search for Cloud Storage, 2014 9th Asia Joint Conference on Information Security (AsiaJCIS 2014), pp. 164-169, IEEE, 2014. doi
  41. Michitomo Yamaguchi, Toru Nakata, Hajime Watanabe, Takeshi Okamoto, Hiroaki Kikuchi, Vulnerability of the Conventional Accessible CAPTCHA used by the White House and an Alternative Approach for Visually Impaired People, 2014 IEEE International Conference on Systems, Man, and Cybernetics, pp. 4004-4009, IEEE, 2014. doi
  42. Michitomo Yamaguchi, Toru Nakata, Takeshi Okamoto, Hiroaki Kikuchi, An Accessible CAPTCHA System for People with Visual Disability ? Generation of Human/Computer Distinguish Test with Documents on the Net, 8th International Conference, UAHCI 2014, Held as Part of HCI International 2014, pp. 119-130, Springer, 2014. doi
  43. Hiroaki Kikuchi, Tomohiro Arimizu, On the Vulnerability of Ghost Domain Names, 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2014), pp. 584-587, IEEE, 2014. doi
  44. Hiroaki Kikuchi, Tomoki Sato, Jun Sakuma, "Privacy-Preserving Hypothesis Testing for the Analysis of Epidemiological Medical Data", 2014 IEEE 28th International Conference on the Advanced Information Networking and Applications (AINA) , pp. 359 - 365, IEEE, 2014. doi
  45. Hiroaki Kikuchi, Tomoki Sato, Jun Sakuma, "Privacy-preserving Dose-Response Relationship Test", The 17th International Conference on Network-Based Information Systems (NBiS 2014), pp. 506-510, 2014. doi
  46. Hiroaki Kikuchi, Shigeta Ikuji, Manami Inoue, Privacy-Preserving Protocol for Reduced Cancer Risk on Daily Physical Activity, THE 2014 International Conference on Security & Management (SAM), pp. 246-254, 2014.
  47. Hiroaki Kikuchi, Hideki Hashimoto, Hideo Yasunaga, Takamichi Saito, Scalability of Privacy-Preserving Linear Regression in Epidemiological Studies, The 29th IEEE International Conference on the Advanced Information Networking and Applications (AINA), IEEE, 2015. doi
  48. Yohei Kaneko, Takamichi Saito, Hiroaki Kikuchi, Cryptographic Operation Load-balancing Between Cryptographic Module and CPU, The 29th IEEE International Conference on the Advanced Information Networking and Applications (AINA), IEEE, 2015. doi
  49. 2013年度

  50. 鴨志田 芳典 , 菊池 浩明, マルコフ連鎖による合成文章の不自然さを用いたCAPTCHAの提案と安全性評価, 情報処理学会論文誌,54(9), pp. 2156-2166, 2013年9月
  51. Masayuki Ohrui, Hiroaki Kikuchi, NurRohmanRosyid, Masato Terada, Mining Botnet Coordinated Attacks using Apriori-PrefixSpan Hybrid Algorithm, 情報処理学会論文誌,54(9), 2013年9月
  52. Hiroaki Kikuchi , Anna Mochizuki, Privacy-preserving Collaborative Filtering Using Randomized Response, 情報処理学会論文誌,54(9), 2013年9月
  53. Khamphao SISAAT Hiroaki KIKUCHI Shunji MATSUO Masato TERADA Masashi FUJIWARA Surin KITTITORNKUN, Time Zone Correlation Analysis of Malware/Bot Downloads, IEICE TRANSACTIONS on Communications Vol.E96-B No.7 pp.1753-1763 2013年 9月
  54. 2012年度

  55. Hiroaki KIKUCHI Daisuke KAGAWA Anirban BASU Kazuhiko ISHII Masayuki TERADA Sadayuki HONGO, Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets, IEICE Trans. on Fundamentals, Vol. E96-A, No. 1, pp. 111-120, 2013.
  56. Hiroaki Kikuchi and Hiroatsu Kizawa, Privacy-Preserving Collaborative Filtering Schemes With Sampling Users Journal of Japan Society for Fuzzy Theory and Intelligent Informatics, Vol. 24, No. 3, pp. 753-762, 2012.
  57. Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi, Theo Dimitrakos and Srijith K Nair, Privacy preserving collaborative filtering for SaaS enabling PaaS clouds, Journal of Cloud Computing: Advances, Systems and Applications, Springer, Vol. 1, No. 8, pp. 1-14, 2012.
  58. 西垣 正勝 , 渡邊 幸聖 , 小田 雅洋 , 米山 裕太 , 山本 匠 , 高橋 健太 , 尾形 わかは , 菊池 浩明, 曖昧性を含んだ多項式による特徴量関数の秘匿評価を利用したテンプレート保護型生体認証, 情報処理学会論文誌,Vol. 53, No. 9, pp. 2254-2266, 2012.
  59. Naoki Hiroguchi, Khamphao Sisaat, Hiroaki Kikuchi, and Surin Kittitornkun, Geographical Visualization of Malware Download for Anomaly Detection, Seventh Asia Joint Conference on Information Security (AsiaJCIS 2012), IEEE, pp. 74-78, 2012.
  60. Tomoki Sato Hiroaki Kikuchi, Synthesis of Secure Passwords, Seventh Asia Joint Conference on Information Security (AsiaJCIS 2012), IEEE, pp. 35-37, 2012.
  61. Anirban Basu, Jaideep Vaidya, Hiroaki Kikuch, Perturbation Based Privacy Preserving Slope One Predictors for Collaborative Filtering, Proc. of 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Trust Management VI, Springer, pp. 17-35, 2012.
  62. H. Kikuchi, Anna Mochizuki, Privacy-Preserving Collaborative Filtering using Randomized Response, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2012), pp. 671-676, IEEE, 2012.
  63. H. Kikuchi, Yoshiki Aoki, Msayuki Terada, Kazuhiko Ishii, Kimihiko Sekino, Accuracy of Privacy-preserving Collaborative Filtering Based on Quasi-homomorphic Similarity, 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing (ATC 2012), pp. 555-562, IEEE, 2012.
  64. Yoshifumi Kamoshida, H. Kikuchi, Word Salad CAPTCHA - Application and Evaluation of Synthesized Sentences 15th International Conference on Network-Based Information Systems (NBiS 2012), pp. 799-804, IEEE, 2012.
  65. Hiroaki Kikuchi, Kouichi Ito, Mebae Ushida, Hiroshi Tsuda, Yuji Yamaoka, Privacy-Preserving Distributed Decision Tree Learning with Boolean Class Attributes The 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013).

論文(査読なし)

    2012年度

  1. 佐藤智貴,菊池浩明,佐久間淳, 傾向性の検定における秘匿疫学調査プロトコル, 暗号と情報セキュリティシンポジウム (SCIS 2013), pp. 1-4, 2013.
  2. 佐藤智貴,菊池浩明,佐久間淳, プライバシー保護確率検定システムの実装と評価, 信学技報, vol. 112, no. 315, ICSS2012-55, pp. 61-66, 2012.
  3. 菊池浩明, 利用者認証とフェールセーフ性について, 信学技報, vol. 112, no. 313, SSS2012-19, pp. 11-15, 2012.
  4. 菊池浩明,Anirban Basu, IFIP TM 2012参加報告, 研究報告コンピュータセキュリティ(CSEC), Vol. 2012-CSEC-58, No. 45, pp. 1-6, 2012.
  5. 菊池浩明,佐久間淳,三上春夫, プライバシーを保護したピロリ菌疫学調査, 2012年度人工知能学会全国大会(第26回), 3I2-OS-20-9, pp. 1-4, 2012.
  6. 小澤 友也, 菊池 浩明, ネットワークのサービス品質に対する対話型アプリケーションの要求条件の評価, マルチメディア、分散、協調とモバイルシンポジウム(DICOMO2012),pp. 1034 - 1039, IPSJ, 2012.
  7. 鴨志田 芳典, 菊池 浩明, マルコフ連鎖による合成文章の不自然さを用いたCAPTCHAの安全性評価と改良について マルチメディア、分散、協調とモバイルシンポジウム(DICOMO2012),pp. 205 - 212, IPSJ, 2012.
  8. 菊池浩明, 伊藤孝一, 牛田芽生恵, 津田宏, 山岡裕司, プライバシー保護決定木学習におけるエントロピーを近似する順序同型関数, コンピュータセキュリティシンポジウム (CSS 2012), pp 92-97, IPSJ, 2012. 菊池浩明,佐久間淳 Bloom Filter を用いた積集合サイズのベイズ推定とそのプライバシー保護疫学調査への応用 コンピュータセキュリティシンポジウム (CSS 2012), pp 216-223, IPSJ, 2012.
  9. 川村,生地,小柳,菊池, Hadoopを用いた大規模分散プライバシー保護システムと医療情報統合への応用 暗号と情報セキュリティシンポジウム (SCIS 2013), 1C1-5, pp. 1-6, 2013.

その他

  1. 安全だけど安心できない,安全でないけど安心できる , 三菱電機技法,巻頭言,Vol. 371,  7月号, 2012.
  2. 日本を元気にするICT:9.日本を元気にするセキュリティ技術, 情報処理, Vol. 53, No. 4, pp. 387-389, 2012.