Skip to main content

Showing 1–21 of 21 results for author: Kuribayashi, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.17579  [pdf, ps, other

    cs.LG

    Ownership Verification of DNN Models Using White-Box Adversarial Attacks with Specified Probability Manipulation

    Authors: Teruki Sano, Minoru Kuribayashi, Masao Sakai, Shuji Ishobe, Eisuke Koizumi

    Abstract: In this paper, we propose a novel framework for ownership verification of deep neural network (DNN) models for image classification tasks. It allows verification of model identity by both the rightful owner and third party without presenting the original model. We assume a gray-box scenario where an unauthorized user owns a model that is illegally copied from the original model, provides services… ▽ More

    Submitted 23 May, 2025; originally announced May 2025.

    Comments: Accepted to EUSIPCO 2025

  2. WanderGuide: Indoor Map-less Robotic Guide for Exploration by Blind People

    Authors: Masaki Kuribayashi, Kohei Uehara, Allan Wang, Shigeo Morishima, Chieko Asakawa

    Abstract: Blind people have limited opportunities to explore an environment based on their interests. While existing navigation systems could provide them with surrounding information while navigating, they have limited scalability as they require preparing prebuilt maps. Thus, to develop a map-less robot that assists blind people in exploring, we first conducted a study with ten blind participants at a sho… ▽ More

    Submitted 12 February, 2025; originally announced February 2025.

  3. arXiv:2502.03804  [pdf, other

    cs.HC cs.AI

    Understanding and Supporting Formal Email Exchange by Answering AI-Generated Questions

    Authors: Yusuke Miura, Chi-Lan Yang, Masaki Kuribayashi, Keigo Matsumoto, Hideaki Kuzuoka, Shigeo Morishima

    Abstract: Replying to formal emails is time-consuming and cognitively demanding, as it requires crafting polite phrasing and providing an adequate response to the sender's demands. Although systems with Large Language Models (LLMs) were designed to simplify the email replying process, users still need to provide detailed prompts to obtain the expected output. Therefore, we proposed and evaluated an LLM-powe… ▽ More

    Submitted 6 February, 2025; v1 submitted 6 February, 2025; originally announced February 2025.

  4. arXiv:2412.05277  [pdf, other

    cs.CV

    Text to Blind Motion

    Authors: Hee Jae Kim, Kathakoli Sengupta, Masaki Kuribayashi, Hernisa Kacorri, Eshed Ohn-Bar

    Abstract: People who are blind perceive the world differently than those who are sighted, which can result in distinct motion characteristics. For instance, when crossing at an intersection, blind individuals may have different patterns of movement, such as veering more from a straight path or using touch-based exploration around curbs and obstacles. These behaviors may appear less predictable to motion mod… ▽ More

    Submitted 6 December, 2024; originally announced December 2024.

    Comments: Accepted at NeurIPS 2024

  5. arXiv:2409.09996  [pdf, other

    cs.CR cs.AI cs.LG

    FreeMark: A Non-Invasive White-Box Watermarking for Deep Neural Networks

    Authors: Yuzhang Chen, Jiangnan Zhu, Yujie Gu, Minoru Kuribayashi, Kouichi Sakurai

    Abstract: Deep neural networks (DNNs) have achieved significant success in real-world applications. However, safeguarding their intellectual property (IP) remains extremely challenging. Existing DNN watermarking for IP protection often require modifying DNN models, which reduces model performance and limits their practicality. This paper introduces FreeMark, a novel DNN watermarking framework that leverag… ▽ More

    Submitted 16 September, 2024; originally announced September 2024.

  6. arXiv:2408.13201  [pdf, other

    cs.SD cs.IR cs.LG eess.AS

    EAViT: External Attention Vision Transformer for Audio Classification

    Authors: Aquib Iqbal, Abid Hasan Zim, Md Asaduzzaman Tonmoy, Limengnan Zhou, Asad Malik, Minoru Kuribayashi

    Abstract: This paper presents the External Attention Vision Transformer (EAViT) model, a novel approach designed to enhance audio classification accuracy. As digital audio resources proliferate, the demand for precise and efficient audio classification systems has intensified, driven by the need for improved recommendation systems and user personalization in various applications, including music streaming p… ▽ More

    Submitted 23 August, 2024; originally announced August 2024.

  7. arXiv:2405.07060  [pdf, other

    cs.RO

    Memory-Maze: Scenario Driven Benchmark and Visual Language Navigation Model for Guiding Blind People

    Authors: Masaki Kuribayashi, Kohei Uehara, Allan Wang, Daisuke Sato, Simon Chu, Shigeo Morishima

    Abstract: Visual Language Navigation (VLN) powered navigation robots have the potential to guide blind people by understanding and executing route instructions provided by sighted passersby. This capability allows robots to operate in environments that are often unknown a priori. Existing VLN models are insufficient for the scenario of navigation guidance for blind people, as they need to understand routes… ▽ More

    Submitted 11 May, 2024; originally announced May 2024.

  8. arXiv:2302.14197  [pdf, other

    cs.CV

    Image-Based Virtual Try-on System With Clothing-Size Adjustment

    Authors: Minoru Kuribayashi, Koki Nakai, Nobuo Funabiki

    Abstract: The conventional image-based virtual try-on method cannot generate fitting images that correspond to the clothing size because the system cannot accurately reflect the body information of a person. In this study, an image-based virtual try-on system that could adjust the clothing size was proposed. The size information of the person and clothing were used as the input for the proposed method to vi… ▽ More

    Submitted 27 February, 2023; originally announced February 2023.

  9. arXiv:2302.11361  [pdf, other

    cs.CV cs.MM

    HDR image watermarking using saliency detection and quantization index modulation

    Authors: Ahmed Khan, Minoru Kuribayashi, KokSheik Wong, Vishnu Monn Baskaran

    Abstract: High-dynamic range (HDR) images are circulated rapidly over the internet with risks of being exploited for unauthorized usage. To protect these images, some HDR image based watermarking (HDR-IW) methods were put forward. However, they inherited the same problem faced by conventional IW methods for standard dynamic range (SDR) images, where only trade-offs among conflicting requirements are managed… ▽ More

    Submitted 23 February, 2023; v1 submitted 22 February, 2023; originally announced February 2023.

  10. Reversible Data Hiding in Encrypted Text Using Paillier Cryptosystem

    Authors: Asad Malik, Aeyan Ashraf, Hanzhou Wu, Minoru Kuribayashi

    Abstract: Reversible Data Hiding in Encrypted Domain (RDHED) is an innovative method that can keep cover information secret and allows the data hider to insert additional information into it. This article presents a novel data hiding technique in an encrypted text called Reversible Data Hiding in Encrypted Text (RDHET). Initially, the original text is converted into their ASCII values. After that, the Paill… ▽ More

    Submitted 23 September, 2022; originally announced September 2022.

    Journal ref: APSIPA Annual Summit and Conference 2022

  11. arXiv:2208.07070  [pdf

    cs.CV eess.SP

    A Vision Transformer-Based Approach to Bearing Fault Classification via Vibration Signals

    Authors: Abid Hasan Zim, Aeyan Ashraf, Aquib Iqbal, Asad Malik, Minoru Kuribayashi

    Abstract: Rolling bearings are the most crucial components of rotating machinery. Identifying defective bearings in a timely manner may prevent the malfunction of an entire machinery system. The mechanical condition monitoring field has entered the big data phase as a result of the fast advancement of machine parts. When working with large amounts of data, the manual feature extraction approach has the draw… ▽ More

    Submitted 20 September, 2022; v1 submitted 15 August, 2022; originally announced August 2022.

  12. arXiv:2107.02961  [pdf, ps, other

    cs.CR cs.LG

    Immunization of Pruning Attack in DNN Watermarking Using Constant Weight Code

    Authors: Minoru Kuribayashi, Tatsuya Yasui, Asad Malik, Nobuo Funabiki

    Abstract: To ensure protection of the intellectual property rights of DNN models, watermarking techniques have been investigated to insert side-information into the models without seriously degrading the performance of original task. One of the threats for the DNN watermarking is the pruning attack such that less important neurons in the model are pruned to make it faster and more compact as well as to remo… ▽ More

    Submitted 6 July, 2021; originally announced July 2021.

  13. arXiv:1912.05391  [pdf, other

    cs.LG stat.ML

    Detecting and Correcting Adversarial Images Using Image Processing Operations

    Authors: Huy H. Nguyen, Minoru Kuribayashi, Junichi Yamagishi, Isao Echizen

    Abstract: Deep neural networks (DNNs) have achieved excellent performance on several tasks and have been widely applied in both academia and industry. However, DNNs are vulnerable to adversarial machine learning attacks, in which noise is added to the input to change the network output. We have devised an image-processing-based method to detect adversarial images based on our observation that adversarial no… ▽ More

    Submitted 30 December, 2019; v1 submitted 11 December, 2019; originally announced December 2019.

    Comments: Fixing incorrect results by removing the CNN detector part

  14. arXiv:1904.00349  [pdf, ps, other

    cs.IT

    Efficient and error-tolerant schemes for non-adaptive complex group testing and its application in complex disease genetics

    Authors: Thach V. Bui, Minoru Kuribayashi, Mahdi Cheraghchi, Isao Echizen

    Abstract: The goal of combinatorial group testing is to efficiently identify up to $d$ defective items in a large population of $n$ items, where $d \ll n$. Defective items satisfy certain properties while the remaining items in the population do not. To efficiently identify defective items, a subset of items is pooled and then tested. In this work, we consider complex group testing (CmplxGT) in which a set… ▽ More

    Submitted 31 March, 2019; originally announced April 2019.

  15. arXiv:1901.02283  [pdf, ps, other

    cs.IT

    Improved encoding and decoding for non-adaptive threshold group testing

    Authors: Thach V. Bui, Minoru Kuribayashi, Mahdi Cheraghchi, Isao Echizen

    Abstract: The goal of threshold group testing is to identify up to $d$ defective items among a population of $n$ items, where $d$ is usually much smaller than $n$. A test is positive if it has at least $u$ defective items and negative otherwise. Our objective is to identify defective items in sublinear time the number of items, e.g., $\mathrm{poly}(d, \ln{n}),$ by using the number of tests as low as possibl… ▽ More

    Submitted 8 January, 2019; originally announced January 2019.

  16. arXiv:1810.01086  [pdf, other

    cs.IT

    A framework for generalized group testing with inhibitors and its potential application in neuroscience

    Authors: Thach V. Bui, Minoru Kuribayashi, Mahdi Cheraghchi, Isao Echizen

    Abstract: The main goal of group testing with inhibitors (GTI) is to efficiently identify a small number of defective items and inhibitor items in a large set of items. A test on a subset of items is positive if the subset satisfies some specific properties. Inhibitor items cancel the effects of defective items, which often make the outcome of a test containing defective items negative. Different GTI models… ▽ More

    Submitted 10 February, 2019; v1 submitted 2 October, 2018; originally announced October 2018.

  17. arXiv:1805.11748  [pdf, other

    cs.IT

    Sublinear decoding schemes for non-adaptive group testing with inhibitors

    Authors: Thach V. Bui, Minoru Kuribayashi, Tetsuya Kojima, Isao Echizen

    Abstract: Identification of up to $d$ defective items and up to $h$ inhibitors in a set of $n$ items is the main task of non-adaptive group testing with inhibitors. To efficiently reduce the cost of this Herculean task, a subset of the $n$ items is formed and then tested. This is called \textit{group testing}. A test outcome on a subset of items is positive if the subset contains at least one defective item… ▽ More

    Submitted 9 January, 2019; v1 submitted 29 May, 2018; originally announced May 2018.

    Journal ref: Theory and Applications of Models of Computation (TAMC 2019)

  18. Efficient (nonrandom) construction and decoding for non-adaptive group testing

    Authors: Thach V. Bui, Minoru Kuribayashi, Tetsuya Kojima, Roghayyeh Haghvirdinezhad, Isao Echizen

    Abstract: The task of non-adaptive group testing is to identify up to $d$ defective items from $N$ items, where a test is positive if it contains at least one defective item, and negative otherwise. If there are $t$ tests, they can be represented as a $t \times N$ measurement matrix. We have answered the question of whether there exists a scheme such that a larger measurement matrix, built from a given… ▽ More

    Submitted 8 October, 2018; v1 submitted 11 April, 2018; originally announced April 2018.

    Journal ref: Journal of Information Processing (2019)

  19. arXiv:1803.06105  [pdf, other

    cs.IT

    Efficient Decoding Schemes for Noisy Non-Adaptive Group Testing when Noise Depends on Number of Items in Test

    Authors: Thach V. Bui, Tetsuya Kojima, Minoru Kuribayashi, Isao Echizen

    Abstract: The goal of non-adaptive group testing is to identify at most $d$ defective items from $N$ items, in which a test of a subset of $N$ items is positive if it contains at least one defective item, and negative otherwise. However, in many cases, especially in biological screening, the outcome is unreliable due to biochemical interaction; i.e., \textit{noise.} Consequently, a positive result can chang… ▽ More

    Submitted 16 March, 2018; originally announced March 2018.

  20. arXiv:1712.07509  [pdf, other

    cs.IT

    Efficiently Decodable Non-Adaptive Threshold Group Testing

    Authors: Thach V. Bui, Minoru Kuribayashi, Mahdi Cheraghchi, Isao Echizen

    Abstract: We consider non-adaptive threshold group testing for identification of up to $d$ defective items in a set of $n$ items, where a test is positive if it contains at least $2 \leq u \leq d$ defective items, and negative otherwise. The defective items can be identified using… ▽ More

    Submitted 24 September, 2018; v1 submitted 20 December, 2017; originally announced December 2017.

  21. arXiv:1701.06989   

    cs.IT

    Non-Adaptive Group Testing Framework based on Concatenation Code

    Authors: Thach V. Bui, Minoru Kuribayashi, Isao Echizen

    Abstract: We consider an efficiently decodable non-adaptive group testing (NAGT) problem that meets theoretical bounds. The problem is to find a few specific items (at most $d$) satisfying certain characteristics in a colossal number of $N$ items as quickly as possible. Those $d$ specific items are called \textit{defective items}. The idea of NAGT is to pool a group of items, which is called \textit{a test}… ▽ More

    Submitted 17 November, 2017; v1 submitted 24 January, 2017; originally announced January 2017.

    Comments: Some proofs of this paper were incorrect. I do not know when I can find the correct proofs for them. Therefore, it's better to withdraw this version