Skip to main content

Showing 1–15 of 15 results for author: Otsuka, A

.
  1. arXiv:2502.04706  [pdf, ps, other

    cs.CL cs.HC

    Enhancing Impression Change Prediction in Speed Dating Simulations Based on Speakers' Personalities

    Authors: Kazuya Matsuo, Yoko Ishii, Atsushi Otsuka, Ryo Ishii, Hiroaki Sugiyama, Masahiro Mizukami, Tsunehiro Arimoto, Narichika Nomoto, Yoshihide Sato, Tetsuya Yamaguchi

    Abstract: This paper focuses on simulating text dialogues in which impressions between speakers improve during speed dating. This simulation involves selecting an utterance from multiple candidates generated by a text generation model that replicates a specific speaker's utterances, aiming to improve the impression of the speaker. Accurately selecting an utterance that improves the impression is crucial for… ▽ More

    Submitted 7 February, 2025; originally announced February 2025.

  2. arXiv:2409.00887  [pdf, other

    cs.CL cs.AI

    User-Specific Dialogue Generation with User Profile-Aware Pre-Training Model and Parameter-Efficient Fine-Tuning

    Authors: Atsushi Otsuka, Kazuya Matsuo, Ryo Ishii, Narichika Nomoto, Hiroaki Sugiyama

    Abstract: This paper addresses user-specific dialogs. In contrast to previous research on personalized dialogue focused on achieving virtual user dialogue as defined by persona descriptions, user-specific dialogue aims to reproduce real-user dialogue beyond persona-based dialogue. Fine-tuning using the target user's dialogue history is an efficient learning method for a user-specific model. However, it is p… ▽ More

    Submitted 1 September, 2024; originally announced September 2024.

  3. arXiv:2403.01896  [pdf, other

    cs.LG cs.CR stat.ML

    Robustness bounds on the successful adversarial examples in probabilistic models: Implications from Gaussian processes

    Authors: Hiroaki Maeshima, Akira Otsuka

    Abstract: Adversarial example (AE) is an attack method for machine learning, which is crafted by adding imperceptible perturbation to the data inducing misclassification. In the current paper, we investigated the upper bound of the probability of successful AEs based on the Gaussian Process (GP) classification, a probabilistic inference model. We proved a new upper bound of the probability of a successful A… ▽ More

    Submitted 19 March, 2025; v1 submitted 4 March, 2024; originally announced March 2024.

  4. arXiv:2211.13110  [pdf, other

    cs.LG cs.CR

    Compiler Provenance Recovery for Multi-CPU Architectures Using a Centrifuge Mechanism

    Authors: Yuhei Otsubo, Akira Otsuka, Mamoru Mimura

    Abstract: Bit-stream recognition (BSR) has many applications, such as forensic investigations, detection of copyright infringement, and malware analysis. We propose the first BSR that takes a bare input bit-stream and outputs a class label without any preprocessing. To achieve our goal, we propose a centrifuge mechanism, where the upstream layers (sub-net) capture global features and tell the downstream lay… ▽ More

    Submitted 23 November, 2022; v1 submitted 21 November, 2022; originally announced November 2022.

    Comments: 8 pages, 4 figures, 5 tables

  5. Magnetic field-driven transition between valence bond solid and antiferromagnetic order in distorted triangular lattice

    Authors: Yasuhiro Shimizu, Mitsuhiko Maesato, Makoto Yoshida, Masashi Takigawa, Masayuki Itoh, Akihiro Otsuka, Hideki Yamochi, Yukihiro Yoshida, Genta Kawaguchi, David Graf, Gunzi Saito

    Abstract: A molecular Mott insulator $κ$-(ET)$_2$B(CN)$_4$ [ET = bis(ethylenedithio)tetrathiafulvalene] with a distorted triangular lattice exhibits a quantum disordered state with gapped spin excitation in the ground state. $^{13}$C nuclear magnetic resonance, magnetization, and magnetic torque measurements reveal that magnetic field suppresses valence bond order and induces long-range magnetic order above… ▽ More

    Submitted 22 March, 2021; originally announced March 2021.

    Comments: 8 pages, 10 figures

    Journal ref: Phys. Rev. Research 3, 023145 (2021)

  6. arXiv:2010.16024  [pdf, other

    cs.CR

    Evaluation of vulnerability reproducibility in container-based Cyber Range

    Authors: Ryotaro Nakata, Akira Otsuka

    Abstract: A cyber range, a practical and highly educational information security exercise system, is difficult to implement in educational institutions because of the high cost of implementing and maintaining it. Therefore, there is a need for a cyber range that can be adopted and maintained at a low cost. Recently, container type virtualization is gaining attention as it can create a high-speed and high-de… ▽ More

    Submitted 5 November, 2020; v1 submitted 29 October, 2020; originally announced October 2020.

    Comments: 14 pages, 7 figures, 9 tables

  7. arXiv:2001.07331  [pdf, ps, other

    cs.CL

    Length-controllable Abstractive Summarization by Guiding with Summary Prototype

    Authors: Itsumi Saito, Kyosuke Nishida, Kosuke Nishida, Atsushi Otsuka, Hisako Asano, Junji Tomita, Hiroyuki Shindo, Yuji Matsumoto

    Abstract: We propose a new length-controllable abstractive summarization model. Recent state-of-the-art abstractive summarization models based on encoder-decoder models generate only one summary per source text. However, controllable summarization, especially of the length, is an important aspect for practical applications. Previous studies on length-controllable abstractive summarization incorporate length… ▽ More

    Submitted 20 January, 2020; originally announced January 2020.

  8. arXiv:1905.08511  [pdf, ps, other

    cs.CL

    Answering while Summarizing: Multi-task Learning for Multi-hop QA with Evidence Extraction

    Authors: Kosuke Nishida, Kyosuke Nishida, Masaaki Nagata, Atsushi Otsuka, Itsumi Saito, Hisako Asano, Junji Tomita

    Abstract: Question answering (QA) using textual sources for purposes such as reading comprehension (RC) has attracted much attention. This study focuses on the task of explainable multi-hop QA, which requires the system to return the answer with evidence sentences by reasoning and gathering disjoint pieces of the reference texts. It proposes the Query Focused Extractor (QFE) model for evidence extraction an… ▽ More

    Submitted 28 May, 2019; v1 submitted 21 May, 2019; originally announced May 2019.

    Comments: Accepted as a long paper at ACL 2019

  9. A molecular diamond lattice antiferromagnet as a Dirac semimetal candidate

    Authors: Yasuhiro Shimizu, Akihiro Otsuka, Mitsuhiko Maesato, Masahisa Tsuchiizu, Akiko Nakao, Hideki Yamochi, Takaaki Hiramatsu, Yukihiro Yoshida, Gunzi Saito

    Abstract: The ground state of a molecular diamond-lattice compound (ET)Ag$_4$(CN)$_5$ is investigated by the magnetization and nuclear magnetic resonance spectroscopy. We found that the system exhibits antiferromagnetic long-range ordering with weak ferromagnetism at a high temperature of 102 K owing to the strong electron correlation. The spin susceptibility is well fitted into the diamond-lattice Heisenbe… ▽ More

    Submitted 27 February, 2019; originally announced February 2019.

    Comments: 5 pages, 4 figures

    Journal ref: Phys. Rev. B 99, 174417 (2019)

  10. arXiv:1901.02262  [pdf, ps, other

    cs.CL

    Multi-style Generative Reading Comprehension

    Authors: Kyosuke Nishida, Itsumi Saito, Kosuke Nishida, Kazutoshi Shinoda, Atsushi Otsuka, Hisako Asano, Junji Tomita

    Abstract: This study tackles generative reading comprehension (RC), which consists of answering questions based on textual evidence and natural language generation (NLG). We propose a multi-style abstractive summarization model for question answering, called Masque. The proposed model has two key characteristics. First, unlike most studies on RC that have focused on extracting an answer span from the provid… ▽ More

    Submitted 27 May, 2019; v1 submitted 8 January, 2019; originally announced January 2019.

    Comments: Accepted as a long paper at ACL 2019

  11. Retrieve-and-Read: Multi-task Learning of Information Retrieval and Reading Comprehension

    Authors: Kyosuke Nishida, Itsumi Saito, Atsushi Otsuka, Hisako Asano, Junji Tomita

    Abstract: This study considers the task of machine reading at scale (MRS) wherein, given a question, a system first performs the information retrieval (IR) task of finding relevant passages in a knowledge source and then carries out the reading comprehension (RC) task of extracting an answer span from the passages. Previous MRS studies, in which the IR component was trained without considering answer spans,… ▽ More

    Submitted 31 August, 2018; originally announced August 2018.

    Comments: 10 pages, 6 figure. Accepted as a full paper at CIKM 2018

    Journal ref: CIKM 2018, October 22-26, 2018, Torino, Italy

  12. arXiv:1806.05328  [pdf, other

    cs.CR

    o-glasses: Visualizing x86 Code from Binary Using a 1d-CNN

    Authors: Yuhei Otsubo, Akira Otsuka, Mamoru Mimura, Takeshi Sakaki, Atsuhiro Goto

    Abstract: Malicious document files used in targeted attacks often contain a small program called shellcode. It is often hard to prepare a runnable environment for dynamic analysis of these document files because they exploit specific vulnerabilities. In these cases, it is necessary to identify the position of the shellcode in each document file to analyze it. If the exploit code uses executable scripts such… ▽ More

    Submitted 13 June, 2018; originally announced June 2018.

    Comments: 21 pages, 15 figures

    MSC Class: 94A99

  13. Pressure-Tuned Exchange Coupling of a Quantum Spin Liquid in the Molecular Triangular Lattice $κ$-(ET)$_2$Ag$_2$(CN)$_3$

    Authors: Yasuhiro Shimizu, Takaaki Hiramatsu, Mitsuhiko Maesato, Akihiro Otsuka, Hideki Yamochi, Akihiro Ono, Masayuki Itoh, Makoto Yoshida, Masashi Takigawa, Yukihiro Yoshida, Gunzi Saito

    Abstract: The effects of pressure on a quantum spin liquid are investigated in an organic Mott insulator $κ$-(ET)$_2$Ag$_2$(CN)$_3$ with a spin-1/2 triangular lattice. The application of negative chemical pressure to $κ$-(ET)$_2$Cu$_2$(CN)$_3$, which is a well-known sister Mott insulator, allows for extensive tuning of antiferromagnetic exchange coupling, with $J/k_{\rm B} = 175 - 310$ K, under hydrostatic… ▽ More

    Submitted 31 August, 2016; v1 submitted 5 April, 2016; originally announced April 2016.

    Comments: 6pages, 5 figures

    Journal ref: Phys. Rev. Lett. 117, 107203 (2016)

  14. arXiv:1212.4195  [pdf, ps, other

    cs.CR

    Relations among Security Metrics for Template Protection Algorithms

    Authors: Manabu Inuma, Akira Otsuka

    Abstract: Many biometric template protection algorithms have been proposed mainly in two approaches: biometric feature transformation and biometric cryptosystem. Security evaluation of the proposed algorithms are often conducted in various inconsistent manner. Thus, it is strongly demanded to establish the common evaluation metrics for easier comparison among many algorithms. Simoens et al. and Nagar et al.… ▽ More

    Submitted 7 January, 2013; v1 submitted 17 December, 2012; originally announced December 2012.

  15. arXiv:0904.1284  [pdf, ps, other

    cs.CR cs.DS

    Theoretical framework for constructing matching algorithms in biometric authentication systems

    Authors: Manabu Inuma, Akira Otsuka, Hideki Imai

    Abstract: In this paper, we propose a theoretical framework to construct matching algorithms for any biometric authentication systems. Conventional matching algorithms are not necessarily secure against strong intentional impersonation attacks such as wolf attacks. The wolf attack is an attempt to impersonate a genuine user by presenting a "wolf" to a biometric authentication system without the knowledge… ▽ More

    Submitted 8 April, 2009; originally announced April 2009.