Skip to main content

Showing 1–5 of 5 results for author: Matsuo, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2502.04706  [pdf, ps, other

    cs.CL cs.HC

    Enhancing Impression Change Prediction in Speed Dating Simulations Based on Speakers' Personalities

    Authors: Kazuya Matsuo, Yoko Ishii, Atsushi Otsuka, Ryo Ishii, Hiroaki Sugiyama, Masahiro Mizukami, Tsunehiro Arimoto, Narichika Nomoto, Yoshihide Sato, Tetsuya Yamaguchi

    Abstract: This paper focuses on simulating text dialogues in which impressions between speakers improve during speed dating. This simulation involves selecting an utterance from multiple candidates generated by a text generation model that replicates a specific speaker's utterances, aiming to improve the impression of the speaker. Accurately selecting an utterance that improves the impression is crucial for… ▽ More

    Submitted 7 February, 2025; originally announced February 2025.

  2. arXiv:2411.16052  [pdf, ps, other

    hep-th cs.LG

    Machine-learning emergent spacetime from linear response in future tabletop quantum gravity experiments

    Authors: Koji Hashimoto, Koshiro Matsuo, Masaki Murata, Gakuto Ogiwara, Daichi Takeda

    Abstract: We introduce a novel interpretable Neural Network (NN) model designed to perform precision bulk reconstruction under the AdS/CFT correspondence. According to the correspondence, a specific condensed matter system on a ring is holographically equivalent to a gravitational system on a bulk disk, through which tabletop quantum gravity experiments may be possible as reported in arXiv:2211.13863. The p… ▽ More

    Submitted 24 November, 2024; originally announced November 2024.

    Comments: 24 pages, 10 figures

    Report number: KUNS-3024

  3. arXiv:2411.14942  [pdf, other

    hep-th cs.AI cs.LG

    Comparative Study of Neural Network Methods for Solving Topological Solitons

    Authors: Koji Hashimoto, Koshiro Matsuo, Masaki Murata, Gakuto Ogiwara

    Abstract: Topological solitons, which are stable, localized solutions of nonlinear differential equations, are crucial in various fields of physics and mathematics, including particle physics and cosmology. However, solving these solitons presents significant challenges due to the complexity of the underlying equations and the computational resources required for accurate solutions. To address this, we have… ▽ More

    Submitted 22 November, 2024; originally announced November 2024.

    Comments: 12 pages, 4 figures

    Report number: KUNS-3025

  4. arXiv:2409.00887  [pdf, other

    cs.CL cs.AI

    User-Specific Dialogue Generation with User Profile-Aware Pre-Training Model and Parameter-Efficient Fine-Tuning

    Authors: Atsushi Otsuka, Kazuya Matsuo, Ryo Ishii, Narichika Nomoto, Hiroaki Sugiyama

    Abstract: This paper addresses user-specific dialogs. In contrast to previous research on personalized dialogue focused on achieving virtual user dialogue as defined by persona descriptions, user-specific dialogue aims to reproduce real-user dialogue beyond persona-based dialogue. Fine-tuning using the target user's dialogue history is an efficient learning method for a user-specific model. However, it is p… ▽ More

    Submitted 1 September, 2024; originally announced September 2024.

  5. arXiv:2405.04355  [pdf, other

    cs.CR

    SmmPack: Obfuscation for SMM Modules with TPM Sealed Key

    Authors: Kazuki Matsuo, Satoshi Tanda, Kuniyasu Suzaki, Yuhei Kawakoya, Tatsuya Mori

    Abstract: System Management Mode (SMM) is the highest-privileged operating mode of x86 and x86-64 processors. Through SMM exploitation, attackers can tamper with the Unified Extensible Firmware Interface (UEFI) firmware, disabling the security mechanisms implemented by the operating system and hypervisor. Vulnerabilities enabling SMM code execution are often reported as Common Vulnerabilities and Exposures… ▽ More

    Submitted 8 May, 2024; v1 submitted 7 May, 2024; originally announced May 2024.

    Comments: 21 pages, 7 figures, 4 tables. Accepted at the 21st Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2024)