Skip to main content

Showing 1–26 of 26 results for author: Kawamoto, Y

Searching in archive cs. Search in all archives.
.
  1. IRS-aided Near-field Communication: Prospects and Challenges with Codebook Approach

    Authors: Ryuhei Hibi, Hiroaki Hashida, Yuichi Kawamoto, Nei Kato

    Abstract: Intelligent reflecting surfaces (IRSs) are gaining attention as a low-cost solution to the coverage reduction in high-frequency bands used in next-generation communications. IRSs achieve low costs by controlling only the reflection of radio waves. However, to improve further the propagation environment, larger IRS sizes are required owing to their inability to amplify and retransmit signals. As th… ▽ More

    Submitted 16 October, 2024; originally announced October 2024.

    Comments: IEEE Wireless Communications https://www.comsoc.org/publications/magazines/ieee-wireless-communications/paper-submission "first submission"

  2. arXiv:2405.17492  [pdf, ps, other

    cs.SE cs.AI cs.LO

    StatWhy: Formal Verification Tool for Statistical Hypothesis Testing Programs

    Authors: Yusuke Kawamoto, Kentaro Kobayashi, Kohei Suenaga

    Abstract: Statistical methods have been widely misused and misinterpreted in various scientific fields, raising significant concerns about the integrity of scientific research. To mitigate this problem, we propose a tool-assisted method for formally specifying and automatically verifying the correctness of statistical programs. In this method, programmers are required to annotate the source code of the stat… ▽ More

    Submitted 1 June, 2025; v1 submitted 25 May, 2024; originally announced May 2024.

    Comments: Accepted to CAV 2025 (the 37th International Conference on Computer Aided Verification)

  3. arXiv:2310.00973  [pdf, other

    cs.SE

    Model-Checking in the Loop Model-Based Testing for Automotive Operating Systems

    Authors: Toshiaki Aoki, Aritoshi Hata, Kazusato Kanamori, Satoshi Tanaka, Yuta Kawamoto, Yasuhiro Tanase, Masumi Imai, Fumiya Shigemitsu, Masaki Gondo, Tomoji Kishi

    Abstract: While vehicles have primarily been controlled through mechanical means in years past, an increasing number of embedded control systems are being installed and used, keeping pace with advances in electronic control technology and performance. Automotive systems consist of multiple components developed by a range of vendors. To accelerate developments in embedded control systems, industrial standard… ▽ More

    Submitted 2 October, 2023; originally announced October 2023.

  4. A Survey on Multi-AP Coordination Approaches over Emerging WLANs: Future Directions and Open Challenges

    Authors: Shikhar Verma, Tiago Koketsu Rodrigues, Yuichi Kawamoto, Mostafa M. Fouda, Nei Kato

    Abstract: Recent advancements in wireless local area network (WLAN) technology include IEEE 802.11be and 802.11ay, often known as Wi-Fi 7 and WiGig, respectively. The goal of these developments is to provide Extremely High Throughput (EHT) and low latency to meet the demands of future applications like as 8K videos, augmented and virtual reality, the Internet of Things, telesurgery, and other developing tec… ▽ More

    Submitted 19 December, 2023; v1 submitted 7 June, 2023; originally announced June 2023.

    Comments: The reason for the replacement of the previous version of the paper is due to a change in the author's list. As a result, a new version has been created, which serves as the final draft version before acceptance. This updated version contains all the latest changes and improvements made to the paper

  5. arXiv:2303.15731  [pdf, other

    cs.NI

    Smart Handover with Predicted User Behavior using Convolutional Neural Networks for WiGig Systems

    Authors: Tiago Koketsu Rodrigues, Shikhar Verma, Yuichi Kawamoto, Nei Kato, Mostafa M. Fouda, Muhammad Ismail

    Abstract: WiGig networks and 60 GHz frequency communications have a lot of potential for commercial and personal use. They can offer extremely high transmission rates but at the cost of low range and penetration. Due to these issues, WiGig systems are unstable and need to rely on frequent handovers to maintain high-quality connections. However, this solution is problematic as it forces users into bad connec… ▽ More

    Submitted 28 March, 2023; originally announced March 2023.

    Comments: Submitted to IEEE Network

  6. arXiv:2301.07474  [pdf, other

    cs.CR cs.AI cs.LG cs.SE

    Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy

    Authors: Yusuke Kawamoto, Kazumasa Miyake, Koichi Konishi, Yutaka Oiwa

    Abstract: In this article, we propose the Artificial Intelligence Security Taxonomy to systematize the knowledge of threats, vulnerabilities, and security controls of machine-learning-based (ML-based) systems. We first classify the damage caused by attacks against ML-based systems, define ML-specific security, and discuss its characteristics. Next, we enumerate all relevant assets and stakeholders and provi… ▽ More

    Submitted 18 January, 2023; v1 submitted 18 January, 2023; originally announced January 2023.

  7. Formalizing Statistical Causality via Modal Logic

    Authors: Yusuke Kawamoto, Tetsuya Sato, Kohei Suenaga

    Abstract: We propose a formal language for describing and explaining statistical causality. Concretely, we define Statistical Causality Language (StaCL) for expressing causal effects and specifying the requirements for causal inference. StaCL incorporates modal operators for interventions to express causal properties between probability distributions in different possible worlds in a Kripke model. We formal… ▽ More

    Submitted 17 September, 2023; v1 submitted 30 October, 2022; originally announced October 2022.

    Comments: Full version for the paper accepted at JELIA 2023 (the 18th European Conference on Logics in Artificial Intelligence)

    Journal ref: Proc. of the 18th European Conference on Logics in Artificial Intelligence (JELIA 2023), Lecture Notes in Computer Science, Vol.14281, pp.681-696, 2023

  8. Sound and Relatively Complete Belief Hoare Logic for Statistical Hypothesis Testing Programs

    Authors: Yusuke Kawamoto, Tetsuya Sato, Kohei Suenaga

    Abstract: We propose a new approach to formally describing the requirement for statistical inference and checking whether a program uses the statistical method appropriately. Specifically, we define belief Hoare logic (BHL) for formalizing and reasoning about the statistical beliefs acquired via hypothesis testing. This program logic is sound and relatively complete with respect to a Kripke model for hypoth… ▽ More

    Submitted 8 November, 2023; v1 submitted 15 August, 2022; originally announced August 2022.

    Comments: Accepted to the journal Artificial Intelligence (AI); an extended version of the KR'21 conference paper https://proceedings.kr.org/2021/39/

    Journal ref: Artificial Intelligence, Vol.326, 104045, Elsevier, 2024

  9. arXiv:2205.15141  [pdf, other

    cs.AI

    Theme Aspect Argumentation Model for Handling Fallacies

    Authors: Ryuta Arisaka, Ryoma Nakai, Yusuke Kawamoto, Takayuki Ito

    Abstract: From daily discussions to marketing ads to political statements, information manipulation is rife. It is increasingly more important that we have the right set of tools to defend ourselves from manipulative rhetoric, or fallacies. Suitable techniques to automatically identify fallacies are being investigated in natural language processing research. However, a fallacy in one context may not be a fa… ▽ More

    Submitted 25 October, 2023; v1 submitted 30 May, 2022; originally announced May 2022.

  10. arXiv:2012.12060  [pdf, other

    cs.CR cs.AI cs.GT cs.IT econ.TH

    Information Leakage Games: Exploring Information as a Utility Function

    Authors: Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, Catuscia Palamidessi

    Abstract: A common goal in the areas of secure information flow and privacy is to build effective defenses against unwanted leakage of information. To this end, one must be able to reason about potential attacks and their interplay with possible defenses. In this paper, we propose a game-theoretic framework to formalize strategies of attacker and defender in the context of information leakage, and provide a… ▽ More

    Submitted 28 January, 2022; v1 submitted 22 December, 2020; originally announced December 2020.

    Comments: The journal version of GameSec'17 paper (arXiv:1705.05030), accepted in ACM Transactions on Privacy and Security (TOPS)

    Journal ref: ACM Trans. Priv. Secur. 25, 3, Article 20 (August 2022), pp. 1-36

  11. TransMIA: Membership Inference Attacks Using Transfer Shadow Training

    Authors: Seira Hidano, Takao Murakami, Yusuke Kawamoto

    Abstract: Transfer learning has been widely studied and gained increasing popularity to improve the accuracy of machine learning models by transferring some knowledge acquired in different training. However, no prior work has pointed out that transfer learning can strengthen privacy attacks on machine learning models. In this paper, we propose TransMIA (Transfer learning-based Membership Inference Attacks),… ▽ More

    Submitted 23 April, 2021; v1 submitted 30 November, 2020; originally announced November 2020.

    Comments: IJCNN 2021 conference paper

    Journal ref: Proceedings of the 2021 International Joint Conference on Neural Networks (IJCNN 2021), pp.1-10, 2021

  12. arXiv:2010.09393  [pdf, other

    cs.CR cs.DB cs.IR cs.IT cs.LG

    Locality Sensitive Hashing with Extended Differential Privacy

    Authors: Natasha Fernandes, Yusuke Kawamoto, Takao Murakami

    Abstract: Extended differential privacy, a generalization of standard differential privacy (DP) using a general metric, has been widely studied to provide rigorous privacy guarantees while keeping high utility. However, existing works on extended DP are limited to few metrics, such as the Euclidean metric. Consequently, they have only a small number of applications, such as location-based services and docum… ▽ More

    Submitted 12 August, 2021; v1 submitted 19 October, 2020; originally announced October 2020.

    Comments: ESORICS 2021 (the 26th European Symposium on Research in Computer Security)

    Journal ref: Proceedings of the 26th European Symposium on Research in Computer Security (ESORICS 2021), Part II, Lecture Notes in Computer Science Vol. 12973, pp.563-583, 2021

  13. arXiv:2004.12734  [pdf, other

    cs.LO cs.AI cs.CR cs.LG cs.SE

    An Epistemic Approach to the Formal Specification of Statistical Machine Learning

    Authors: Yusuke Kawamoto

    Abstract: We propose an epistemic approach to formalizing statistical properties of machine learning. Specifically, we introduce a formal model for supervised learning based on a Kripke model where each possible world corresponds to a possible dataset and modal operators are interpreted as transformation and testing on datasets. Then we formalize various notions of the classification performance, robustness… ▽ More

    Submitted 20 September, 2020; v1 submitted 27 April, 2020; originally announced April 2020.

    Comments: Accepted in Software and Systems Modeling https://rdcu.be/b7ssR This paper is the journal version of the SEFM'19 conference paper arxiv:1907.10327

    Journal ref: Software and Systems Modeling, Vol.20, No.2, pp.293-310, September 2020

  14. arXiv:1911.04226  [pdf, other

    cs.CR cs.DB cs.LG

    Privacy-Preserving Multiple Tensor Factorization for Synthesizing Large-Scale Location Traces with Cluster-Specific Features

    Authors: Takao Murakami, Koki Hamada, Yusuke Kawamoto, Takuma Hatano

    Abstract: With the widespread use of LBSs (Location-based Services), synthesizing location traces plays an increasingly important role in analyzing spatial big data while protecting user privacy. In particular, a synthetic trace that preserves a feature specific to a cluster of users (e.g., those who commute by train, those who go shopping) is important for various geo-data analysis tasks and for providing… ▽ More

    Submitted 18 November, 2020; v1 submitted 11 November, 2019; originally announced November 2019.

    Comments: This is a full version of the paper accepted at PETS 2021 (The 21st Privacy Enhancing Technologies Symposium)

  15. arXiv:1907.10327  [pdf, ps, other

    cs.LO cs.AI cs.CR cs.LG cs.SE

    Towards Logical Specification of Statistical Machine Learning

    Authors: Yusuke Kawamoto

    Abstract: We introduce a logical approach to formalizing statistical properties of machine learning. Specifically, we propose a formal model for statistical classification based on a Kripke model, and formalize various notions of classification performance, robustness, and fairness of classifiers by using epistemic logic. Then we show some relationships among properties of classifiers and those between clas… ▽ More

    Submitted 28 March, 2020; v1 submitted 24 July, 2019; originally announced July 2019.

    Comments: SEFM'19 conference paper (full version with errors corrected)

    Journal ref: Extended version published in Software and Systems Modeling, Vol.20, No.2, pp.293-310, 2021 (https://rdcu.be/b7ssR)

  16. Statistical Epistemic Logic

    Authors: Yusuke Kawamoto

    Abstract: We introduce a modal logic for describing statistical knowledge, which we call statistical epistemic logic. We propose a Kripke model dealing with probability distributions and stochastic assignments, and show a stochastic semantics for the logic. To our knowledge, this is the first semantics for modal logic that can express the statistical knowledge dependent on non-deterministic inputs and the s… ▽ More

    Submitted 12 July, 2019; originally announced July 2019.

    Journal ref: The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy, Lecture Notes in Computer Science, Vol.11760, pp.344-362, 2019

  17. arXiv:1907.05991  [pdf, ps, other

    cs.CR cs.DB cs.IT cs.LG

    Local Distribution Obfuscation via Probability Coupling

    Authors: Yusuke Kawamoto, Takao Murakami

    Abstract: We introduce a general model for the local obfuscation of probability distributions by probabilistic perturbation, e.g., by adding differentially private noise, and investigate its theoretical properties. Specifically, we relax a notion of distribution privacy (DistP) by generalizing it to divergence, and propose local obfuscation mechanisms that provide divergence distribution privacy. To provide… ▽ More

    Submitted 30 September, 2019; v1 submitted 12 July, 2019; originally announced July 2019.

    Comments: Full version of Allerton 2019 paper (This paper extends some part of the unpublished v3 of arXiv:1812.00939, while v4 of arXiv:1812.00939 extends the other part and is published in ESORICS'19.)

    Journal ref: Proceedings of the 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton 2019), pp.718-725, IEEE, 2019

  18. Local Obfuscation Mechanisms for Hiding Probability Distributions

    Authors: Yusuke Kawamoto, Takao Murakami

    Abstract: We introduce a formal model for the information leakage of probability distributions and define a notion called distribution privacy as the local differential privacy for probability distributions. Roughly, the distribution privacy of a local obfuscation mechanism means that the attacker cannot significantly gain any information on the distribution of the mechanism's input by observing its output.… ▽ More

    Submitted 6 August, 2019; v1 submitted 3 December, 2018; originally announced December 2018.

    Comments: Full version of Proc. ESORICS 2019 (with a longer appendix)

    Journal ref: Proceedings of the 24th European Symposium on Research in Computer Security (ESORICS 2019), Part I, Lecture Notes in Computer Science, Vol.11735, pp.128-148, 2019

  19. Hybrid Statistical Estimation of Mutual Information and its Application to Information Flow

    Authors: Fabrizio Biondi, Yusuke Kawamoto, Axel Legay, Louis-Marie Traonouez

    Abstract: Analysis of a probabilistic system often requires to learn the joint probability distribution of its random variables. The computation of the exact distribution is usually an exhaustive precise analysis on all executions of the system. To avoid the high computational cost of such an exhaustive search, statistical analysis has been studied to efficiently obtain approximate estimates by analyzing on… ▽ More

    Submitted 8 September, 2018; originally announced September 2018.

    Comments: Accepted by Formal Aspects of Computing

    Journal ref: Formal Aspects of Computing, 31(2), pp.165-206, 2019

  20. arXiv:1807.11317  [pdf, ps, other

    cs.DB cs.CR cs.IT

    Utility-Optimized Local Differential Privacy Mechanisms for Distribution Estimation

    Authors: Takao Murakami, Yusuke Kawamoto

    Abstract: LDP (Local Differential Privacy) has been widely studied to estimate statistics of personal data (e.g., distribution underlying the data) while protecting users' privacy. Although LDP does not require a trusted third party, it regards all personal data equally sensitive, which causes excessive obfuscation hence the loss of utility. In this paper, we introduce the notion of ULDP (Utility-optimized… ▽ More

    Submitted 26 May, 2019; v1 submitted 30 July, 2018; originally announced July 2018.

    Comments: Accepted to USENIX Security 2019

  21. On the Anonymization of Differentially Private Location Obfuscation

    Authors: Yusuke Kawamoto, Takao Murakami

    Abstract: Obfuscation techniques in location-based services (LBSs) have been shown useful to hide the concrete locations of service users, whereas they do not necessarily provide the anonymity. We quantify the anonymity of the location data obfuscated by the planar Laplacian mechanism and that by the optimal geo-indistinguishable mechanism of Bordenabe et al. We empirically show that the latter provides str… ▽ More

    Submitted 23 July, 2018; originally announced July 2018.

    Comments: ISITA'18 conference paper

    Journal ref: Proceedings of the 2018 International Symposium on Information Theory and Its Applications (ISITA 2018), pp.159-163, 2018

  22. arXiv:1803.10042  [pdf, other

    cs.CR cs.GT cs.IT cs.LO

    A Game-Theoretic Approach to Information-Flow Control via Protocol Composition

    Authors: Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, Catuscia Palamidessi

    Abstract: In the inference attacks studied in Quantitative Information Flow (QIF), the attacker typically tries to interfere with the system in the attempt to increase its leakage of secret information. The defender, on the other hand, typically tries to decrease leakage by introducing some controlled noise. This noise introduction can be modeled as a type of protocol composition, i.e., a probabilistic choi… ▽ More

    Submitted 21 May, 2018; v1 submitted 27 March, 2018; originally announced March 2018.

    Comments: Published in the journal Entropy, an extended version of POST'18 conference paper (arXiv:1802.10465)

    Journal ref: Entropy 2018, 20(5), 382

  23. arXiv:1802.10465  [pdf, ps, other

    cs.CR cs.GT cs.IT cs.LO

    Leakage and Protocol Composition in a Game-Theoretic Perspective

    Authors: Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, Catuscia Palamidessi

    Abstract: In the inference attacks studied in Quantitative Information Flow (QIF), the adversary typically tries to interfere with the system in the attempt to increase its leakage of secret information. The defender, on the other hand, typically tries to decrease leakage by introducing some controlled noise. This noise introduction can be modeled as a type of protocol composition, i.e., a probabilistic cho… ▽ More

    Submitted 30 March, 2018; v1 submitted 27 February, 2018; originally announced February 2018.

    Comments: POST'18 conference paper (An extended version of this paper with proofs can be found in arXiv:1803.10042). This paper extends one half of the unpublished v1 of arXiv:1705.05030, while v2 of arXiv:1705.05030 extends the other half and is published in GameSec'17

    Journal ref: Proceedings of the 7th International Conference on Principles of Security and Trust (POST 2018), Lecture Notes in Computer Science, Vol.10804, pp. 134-159, 2018

  24. Information Leakage Games

    Authors: Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, Catuscia Palamidessi

    Abstract: We consider a game-theoretic setting to model the interplay between attacker and defender in the context of information flow, and to reason about their optimal strategies. In contrast with standard game theory, in our games the utility of a mixed strategy is a convex function of the distribution on the defender's pure actions, rather than the expected value of their utilities. Nevertheless, the im… ▽ More

    Submitted 21 August, 2017; v1 submitted 14 May, 2017; originally announced May 2017.

    Journal ref: Proc. GameSec'17, Lecture Notes in Computer Science, Vol.10575, pp.437-457, 2017; Extended journal version: ACM Transactions on Privacy and Security (TOPS), Vol.25, No.3:20, pp.1-36, 2022

  25. On the Compositionality of Quantitative Information Flow

    Authors: Yusuke Kawamoto, Konstantinos Chatzikokolakis, Catuscia Palamidessi

    Abstract: Information flow is the branch of security that studies the leakage of information due to correlation between secrets and observables. Since in general such correlation cannot be avoided completely, it is important to quantify the leakage. The most followed approaches to defining appropriate measures are those based on information theory. In particular, one of the most successful approaches is the… ▽ More

    Submitted 14 August, 2017; v1 submitted 1 November, 2016; originally announced November 2016.

    Journal ref: Logical Methods in Computer Science, Volume 13, Issue 3 (August 15, 2017) lmcs:2199

  26. arXiv:1509.08562  [pdf, ps, other

    cs.CR cs.IT cs.PL

    Quantitative Information Flow for Scheduler-Dependent Systems

    Authors: Yusuke Kawamoto, Thomas Given-Wilson

    Abstract: Quantitative information flow analyses measure how much information on secrets is leaked by publicly observable outputs. One area of interest is to quantify and estimate the information leakage of composed systems. Prior work has focused on running disjoint component systems in parallel and reasoning about the leakage compositionally, but has not explored how the component systems are run in paral… ▽ More

    Submitted 28 September, 2015; originally announced September 2015.

    Comments: In Proceedings QAPL 2015, arXiv:1509.08169

    ACM Class: D.4.6; H.1.1

    Journal ref: EPTCS 194, 2015, pp. 48-62