Skip to main content

Showing 1–50 of 85 results for author: Sato, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.17606  [pdf, ps, other

    cs.HC

    Full-body WPT: wireless powering with meandered e-textiles

    Authors: Ryo Takahashi, Takashi Sato, Wakako Yukita, Tomoyuki Yokota, Takao Someya, Yoshihiro Kawahara

    Abstract: We present Full-body WPT, wireless power networking around the human body using a meandered textile coil. Unlike traditional inductive systems that emit strong fields into the deep tissue inside the body, the meander coil enables localized generation of strong magnetic field constrained to the skin surface, even when scaled to the size of the human body. Such localized inductive system enhances bo… ▽ More

    Submitted 21 June, 2025; originally announced June 2025.

  2. arXiv:2506.16800  [pdf, ps, other

    cs.AR

    Lookup Table-based Multiplication-free All-digital DNN Accelerator Featuring Self-Synchronous Pipeline Accumulation

    Authors: Hiroto Tagata, Takashi Sato, Hiromitsu Awano

    Abstract: Deep neural networks (DNNs) have been widely applied in our society, yet reducing power consumption due to large-scale matrix computations remains a critical challenge. MADDNESS is a known approach to improving energy efficiency by substituting matrix multiplication with table lookup operations. Previous research has employed large analog computing circuits to convert inputs into LUT addresses, wh… ▽ More

    Submitted 20 June, 2025; originally announced June 2025.

  3. arXiv:2506.10269  [pdf, ps, other

    cs.LG math.OC

    Interior-Point Vanishing Problem in Semidefinite Relaxations for Neural Network Verification

    Authors: Ryota Ueda, Takami Sato, Ken Kobayashi, Kazuhide Nakata

    Abstract: Semidefinite programming (SDP) relaxation has emerged as a promising approach for neural network verification, offering tighter bounds than other convex relaxation methods for deep neural networks (DNNs) with ReLU activations. However, we identify a critical limitation in the SDP relaxation when applied to deep networks: interior-point vanishing, which leads to the loss of strict feasibility -- a… ▽ More

    Submitted 11 June, 2025; originally announced June 2025.

    Comments: 17 pages, 2 figures. Version revised after ICML 2025 reviews

    MSC Class: 90C22; 68T05 ACM Class: I.2.6; G.1.6

  4. Fast Parameter Optimization of Delayed Feedback Reservoir with Backpropagation and Gradient Descent

    Authors: Sosei Ikeda, Hiromitsu Awano, Takashi Sato

    Abstract: A delayed feedback reservoir (DFR) is a reservoir computing system well-suited for hardware implementations. However, achieving high accuracy in DFRs depends heavily on selecting appropriate hyperparameters. Conventionally, due to the presence of a non-linear circuit block in the DFR, the grid search has only been the preferred method, which is computationally intensive and time-consuming and thus… ▽ More

    Submitted 16 April, 2025; originally announced April 2025.

    Comments: arXiv admin note: substantial text overlap with arXiv:2504.11970

  5. Hardware-Friendly Delayed-Feedback Reservoir for Multivariate Time-Series Classification

    Authors: Sosei Ikeda, Hiromitsu Awano, Takashi Sato

    Abstract: Reservoir computing (RC) is attracting attention as a machine-learning technique for edge computing. In time-series classification tasks, the number of features obtained using a reservoir depends on the length of the input series. Therefore, the features must be converted to a constant-length intermediate representation (IR), such that they can be processed by an output layer. Existing conversion… ▽ More

    Submitted 16 April, 2025; originally announced April 2025.

  6. Online Training and Inference System on Edge FPGA Using Delayed Feedback Reservoir

    Authors: Sosei Ikeda, Hiromitsu Awano, Takashi Sato

    Abstract: A delayed feedback reservoir (DFR) is a hardwarefriendly reservoir computing system. Implementing DFRs in embedded hardware requires efficient online training. However, two main challenges prevent this: hyperparameter selection, which is typically done by offline grid search, and training of the output linear layer, which is memory-intensive. This paper introduces a fast and accurate parameter opt… ▽ More

    Submitted 16 April, 2025; originally announced April 2025.

  7. arXiv:2502.13641  [pdf, other

    cs.RO

    SLAMSpoof: Practical LiDAR Spoofing Attacks on Localization Systems Guided by Scan Matching Vulnerability Analysis

    Authors: Rokuto Nagata, Kenji Koide, Yuki Hayakawa, Ryo Suzuki, Kazuma Ikeda, Ozora Sako, Qi Alfred Chen, Takami Sato, Kentaro Yoshioka

    Abstract: Accurate localization is essential for enabling modern full self-driving services. These services heavily rely on map-based traffic information to reduce uncertainties in recognizing lane shapes, traffic light locations, and traffic signs. Achieving this level of reliance on map information requires centimeter-level localization accuracy, which is currently only achievable with LiDAR sensors. Howe… ▽ More

    Submitted 19 February, 2025; originally announced February 2025.

    Comments: 7pages, 6figures, accepted at IEEE International Conference on Robotics and Automation (ICRA) 2025

  8. arXiv:2412.02391  [pdf, other

    cs.NI

    Hamiltonian Monte Carlo-Based Near-Optimal MIMO Signal Detection

    Authors: Junichiro Hagiwara, Toshihiko Nishimura, Takanori Sato, Yasutaka Ogawa, Takeo Ohgane

    Abstract: Multiple-input multiple-output (MIMO) technology is essential for the optimal functioning of next-generation wireless networks; however, enhancing its signal-detection performance for improved spectral efficiency is challenging. Here, we propose an approach that transforms the discrete MIMO detection problem into a continuous problem while leveraging the efficient Hamiltonian Monte Carlo algorithm… ▽ More

    Submitted 8 December, 2024; v1 submitted 3 December, 2024; originally announced December 2024.

    Comments: This work has been submitted to the IEEE for possible publication

  9. Friction jointing of distributed rigid capacitors to stretchable liquid metal coil for full-body wireless charging clothing

    Authors: Takashi Sato, Shinto Watanabe, Ryo Takahashi, Wakako Yukita, Tomoyuki Yokota, Takao Someya, Yoshihito Kawahara, Eiji Iwase, Junya Kurumida

    Abstract: For full-body wireless power transfer (WPT), a liquid metal (LM)-based meandered textile coil has been proposed. Multiple rigid capacitors must be inserted in a long coil for efficiency; however, the conventional adhesive jointing suffers from the fragile connection between a rubber tube filled with LM and the capacitor due to the poor adhesion of the rubbers. This paper presents a friction-based… ▽ More

    Submitted 2 December, 2024; originally announced December 2024.

    Comments: 4 pages, 8 figures, Proceedings of the 38th IEEE International Conference on Micro Electro Mechanical Systems (IEEE MEMS2025)

    Journal ref: IEEE MEMS (2025)

  10. arXiv:2410.15386  [pdf, ps, other

    cs.LO cs.CR cs.PL

    Formalization of Differential Privacy in Isabelle/HOL

    Authors: Tetsuya Sato, Yasuhiko Minamide

    Abstract: Differential privacy is a statistical definition of privacy that has attracted the interest of both academia and industry. Its formulations are easy to understand, but the differential privacy of databases is complicated to determine. One of the reasons for this is that small changes in database programs can break their differential privacy. Therefore, formal verification of differential privacy h… ▽ More

    Submitted 20 October, 2024; originally announced October 2024.

    Comments: Draft version

  11. Revisiting Physical-World Adversarial Attack on Traffic Sign Recognition: A Commercial Systems Perspective

    Authors: Ningfei Wang, Shaoyuan Xie, Takami Sato, Yunpeng Luo, Kaidi Xu, Qi Alfred Chen

    Abstract: Traffic Sign Recognition (TSR) is crucial for safe and correct driving automation. Recent works revealed a general vulnerability of TSR models to physical-world adversarial attacks, which can be low-cost, highly deployable, and capable of causing severe attack effects such as hiding a critical traffic sign or spoofing a fake one. However, so far existing works generally only considered evaluating… ▽ More

    Submitted 15 September, 2024; originally announced September 2024.

    Comments: Accepted by NDSS 2025

  12. arXiv:2409.01575  [pdf, other

    cs.CL

    An Implementation of Werewolf Agent That does not Truly Trust LLMs

    Authors: Takehiro Sato, Shintaro Ozaki, Daisaku Yokoyama

    Abstract: Werewolf is an incomplete information game, which has several challenges when creating a computer agent as a player given the lack of understanding of the situation and individuality of utterance (e.g., computer agents are not capable of characterful utterance or situational lying). We propose a werewolf agent that solves some of those difficulties by combining a Large Language Model (LLM) and a r… ▽ More

    Submitted 2 September, 2024; originally announced September 2024.

  13. arXiv:2405.20774  [pdf, other

    cs.CR cs.AI

    Can We Trust Embodied Agents? Exploring Backdoor Attacks against Embodied LLM-based Decision-Making Systems

    Authors: Ruochen Jiao, Shaoyuan Xie, Justin Yue, Takami Sato, Lixu Wang, Yixuan Wang, Qi Alfred Chen, Qi Zhu

    Abstract: Large Language Models (LLMs) have shown significant promise in real-world decision-making tasks for embodied artificial intelligence, especially when fine-tuned to leverage their inherent common sense and reasoning abilities while being tailored to specific applications. However, this fine-tuning process introduces considerable safety and security vulnerabilities, especially in safety-critical cyb… ▽ More

    Submitted 30 April, 2025; v1 submitted 27 May, 2024; originally announced May 2024.

    Comments: Accepted paper at ICLR 2025, 31 pages, including main paper, references, and appendix

  14. Invisible Reflections: Leveraging Infrared Laser Reflections to Target Traffic Sign Perception

    Authors: Takami Sato, Sri Hrushikesh Varma Bhupathiraju, Michael Clifford, Takeshi Sugawara, Qi Alfred Chen, Sara Rampazzi

    Abstract: All vehicles must follow the rules that govern traffic behavior, regardless of whether the vehicles are human-driven or Connected Autonomous Vehicles (CAVs). Road signs indicate locally active rules, such as speed limits and requirements to yield or stop. Recent research has demonstrated attacks, such as adding stickers or projected colored patches to signs, that cause CAV misinterpretation, resul… ▽ More

    Submitted 7 January, 2024; originally announced January 2024.

    Comments: The first two authors are co-first. Accepted to NDSS '24

  15. PlaNet-S: Automatic Semantic Segmentation of Placenta

    Authors: Shinnosuke Yamamoto, Isso Saito, Eichi Takaya, Ayaka Harigai, Tomomi Sato, Tomoya Kobayashi, Kei Takase, Takuya Ueda

    Abstract: [Purpose] To develop a fully automated semantic placenta segmentation model that integrates the U-Net and SegNeXt architectures through ensemble learning. [Methods] A total of 218 pregnant women with suspected placental anomalies who underwent magnetic resonance imaging (MRI) were enrolled, yielding 1090 annotated images for developing a deep learning model for placental segmentation. The images w… ▽ More

    Submitted 26 June, 2024; v1 submitted 18 December, 2023; originally announced December 2023.

    Comments: 11 pages, 5 figures, Shinnosuke Yamamoto and Isso Saito equally contributed to this work. In the original submission, there was a typographical error in the reported standard deviation for the Intersection over Union (IoU) values of the PlaNet-S model. The standard deviation was incorrectly listed as 0.01 instead of the correct value of 0.1. This has been corrected in the revised version. J Digit Imaging. Inform. med. (2025)

  16. arXiv:2310.07170  [pdf, other

    cs.CL

    PHALM: Building a Knowledge Graph from Scratch by Prompting Humans and a Language Model

    Authors: Tatsuya Ide, Eiki Murata, Daisuke Kawahara, Takato Yamazaki, Shengzhe Li, Kenta Shinzato, Toshinori Sato

    Abstract: Despite the remarkable progress in natural language understanding with pretrained Transformers, neural language models often do not handle commonsense knowledge well. Toward commonsense-aware models, there have been attempts to obtain knowledge, ranging from automatic acquisition to crowdsourcing. However, it is difficult to obtain a high-quality knowledge base at a low cost, especially from scrat… ▽ More

    Submitted 10 October, 2023; originally announced October 2023.

  17. arXiv:2308.15692  [pdf, other

    cs.CV cs.CR

    Intriguing Properties of Diffusion Models: An Empirical Study of the Natural Attack Capability in Text-to-Image Generative Models

    Authors: Takami Sato, Justin Yue, Nanze Chen, Ningfei Wang, Qi Alfred Chen

    Abstract: Denoising probabilistic diffusion models have shown breakthrough performance to generate more photo-realistic images or human-level illustrations than the prior models such as GANs. This high image-generation capability has stimulated the creation of many downstream applications in various areas. However, we find that this technology is actually a double-edged sword: We identify a new type of atta… ▽ More

    Submitted 1 May, 2024; v1 submitted 29 August, 2023; originally announced August 2023.

  18. arXiv:2308.11894  [pdf, other

    cs.CR cs.CV

    Does Physical Adversarial Example Really Matter to Autonomous Driving? Towards System-Level Effect of Adversarial Object Evasion Attack

    Authors: Ningfei Wang, Yunpeng Luo, Takami Sato, Kaidi Xu, Qi Alfred Chen

    Abstract: In autonomous driving (AD), accurate perception is indispensable to achieving safe and secure driving. Due to its safety-criticality, the security of AD perception has been widely studied. Among different attacks on AD perception, the physical adversarial object evasion attacks are especially severe. However, we find that all existing literature only evaluates their attack effect at the targeted A… ▽ More

    Submitted 22 August, 2023; originally announced August 2023.

    Comments: Accepted by ICCV 2023

  19. arXiv:2308.03293  [pdf, other

    cs.CL

    Dialogue Systems Can Generate Appropriate Responses without the Use of Question Marks? -- Investigation of the Effects of Question Marks on Dialogue Systems

    Authors: Tomoya Mizumoto, Takato Yamazaki, Katsumasa Yoshikawa, Masaya Ohagi, Toshiki Kawamoto, Toshinori Sato

    Abstract: When individuals engage in spoken discourse, various phenomena can be observed that differ from those that are apparent in text-based conversation. While written communication commonly uses a question mark to denote a query, in spoken discourse, queries are frequently indicated by a rising intonation at the end of a sentence. However, numerous speech recognition engines do not append a question ma… ▽ More

    Submitted 7 August, 2023; originally announced August 2023.

  20. arXiv:2307.11094  [pdf, other

    cs.AR cs.LG cs.NE

    Modular DFR: Digital Delayed Feedback Reservoir Model for Enhancing Design Flexibility

    Authors: Sosei Ikeda, Hiromitsu Awano, Takashi Sato

    Abstract: A delayed feedback reservoir (DFR) is a type of reservoir computing system well-suited for hardware implementations owing to its simple structure. Most existing DFR implementations use analog circuits that require both digital-to-analog and analog-to-digital converters for interfacing. However, digital DFRs emulate analog nonlinear components in the digital domain, resulting in a lack of design fl… ▽ More

    Submitted 5 July, 2023; originally announced July 2023.

    Comments: 20 pages, 11 figures. Accepted for publication in the International Conference on Compilers, Architectures, and Synthesis for Embedded Systems (CASES) 2023. Will appear in ACM Transactions on Embedded Computing Systems (TECS)

  21. arXiv:2306.06821  [pdf, ps, other

    cs.AI

    Towards end-to-end ASP computation

    Authors: Taisuke Sato, Akihiro Takemura, Katsumi Inoue

    Abstract: We propose an end-to-end approach for answer set programming (ASP) and linear algebraically compute stable models satisfying given constraints. The idea is to implement Lin-Zhao's theorem \cite{Lin04} together with constraints directly in vector spaces as numerical minimization of a cost function constructed from a matricized normal logic program, loop formulas in Lin-Zhao's theorem and constraint… ▽ More

    Submitted 13 June, 2023; v1 submitted 11 June, 2023; originally announced June 2023.

    Comments: 29 pages, 9 figures

    ACM Class: I.2.4

  22. arXiv:2303.10555  [pdf, other

    cs.CR cs.CV cs.LG

    LiDAR Spoofing Meets the New-Gen: Capability Improvements, Broken Assumptions, and New Attack Strategies

    Authors: Takami Sato, Yuki Hayakawa, Ryo Suzuki, Yohsuke Shiiki, Kentaro Yoshioka, Qi Alfred Chen

    Abstract: LiDAR (Light Detection And Ranging) is an indispensable sensor for precise long- and wide-range 3D sensing, which directly benefited the recent rapid deployment of autonomous driving (AD). Meanwhile, such a safety-critical application strongly motivates its security research. A recent line of research finds that one can manipulate the LiDAR point cloud and fool object detectors by firing malicious… ▽ More

    Submitted 7 February, 2024; v1 submitted 18 March, 2023; originally announced March 2023.

    Comments: The first 3 authors are co-first

    Journal ref: Network and Distributed System Security (NDSS) Symposium 2024

  23. arXiv:2303.05000  [pdf, other

    cs.LG

    Learning Representation for Anomaly Detection of Vehicle Trajectories

    Authors: Ruochen Jiao, Juyang Bai, Xiangguo Liu, Takami Sato, Xiaowei Yuan, Qi Alfred Chen, Qi Zhu

    Abstract: Predicting the future trajectories of surrounding vehicles based on their history trajectories is a critical task in autonomous driving. However, when small crafted perturbations are introduced to those history trajectories, the resulting anomalous (or adversarial) trajectories can significantly mislead the future trajectory prediction module of the ego vehicle, which may result in unsafe planning… ▽ More

    Submitted 8 March, 2023; originally announced March 2023.

    Comments: 8 pages paper, in anomaly detection of vehicle trajectory

  24. Near-optimal stochastic MIMO signal detection with a mixture of t-distribution prior

    Authors: Junichiro Hagiwara, Kazushi Matsumura, Hiroki Asumi, Yukiko Kasuga, Toshihiko Nishimura, Takanori Sato, Yasutaka Ogawa, Takeo Ohgane

    Abstract: Multiple-input multiple-output (MIMO) systems will play a crucial role in future wireless communication, but improving their signal detection performance to increase transmission efficiency remains a challenge. To address this issue, we propose extending the discrete signal detection problem in MIMO systems to a continuous one and applying the Hamiltonian Monte Carlo method, an efficient Markov ch… ▽ More

    Submitted 7 March, 2024; v1 submitted 9 January, 2023; originally announced January 2023.

    Comments: Published in the 2023 IEEE Global Communications Conference (GLOBECOM)

  25. Formalizing Statistical Causality via Modal Logic

    Authors: Yusuke Kawamoto, Tetsuya Sato, Kohei Suenaga

    Abstract: We propose a formal language for describing and explaining statistical causality. Concretely, we define Statistical Causality Language (StaCL) for expressing causal effects and specifying the requirements for causal inference. StaCL incorporates modal operators for interventions to express causal properties between probability distributions in different possible worlds in a Kripke model. We formal… ▽ More

    Submitted 17 September, 2023; v1 submitted 30 October, 2022; originally announced October 2022.

    Comments: Full version for the paper accepted at JELIA 2023 (the 18th European Conference on Logics in Artificial Intelligence)

    Journal ref: Proc. of the 18th European Conference on Logics in Artificial Intelligence (JELIA 2023), Lecture Notes in Computer Science, Vol.14281, pp.681-696, 2023

  26. arXiv:2210.10400  [pdf, other

    cs.CL

    Tourist Guidance Robot Based on HyperCLOVA

    Authors: Takato Yamazaki, Katsumasa Yoshikawa, Toshiki Kawamoto, Masaya Ohagi, Tomoya Mizumoto, Shuta Ichimura, Yusuke Kida, Toshinori Sato

    Abstract: This paper describes our system submitted to Dialogue Robot Competition 2022. Our proposed system is a combined model of rule-based and generation-based dialog systems. The system utilizes HyperCLOVA, a Japanese foundation model, not only to generate responses but also summarization, search information, etc. We also used our original speech recognition system, which was fine-tuned for this dialog… ▽ More

    Submitted 19 October, 2022; originally announced October 2022.

    Comments: This paper is part of the proceedings of the Dialogue Robot Competition 2022

  27. arXiv:2209.12419  [pdf, ps, other

    cs.CV cs.LG

    Feature-based model selection for object detection from point cloud data

    Authors: Kairi Tokuda, Ryoichi Shinkuma, Takehiro Sato, Eiji Oki

    Abstract: Smart monitoring using three-dimensional (3D) image sensors has been attracting attention in the context of smart cities. In smart monitoring, object detection from point cloud data acquired by 3D image sensors is implemented for detecting moving objects such as vehicles and pedestrians to ensure safety on the road. However, the features of point cloud data are diversified due to the characteristi… ▽ More

    Submitted 26 September, 2022; originally announced September 2022.

    Comments: Submitted to IEICE Transactions on Communications

  28. Sound and Relatively Complete Belief Hoare Logic for Statistical Hypothesis Testing Programs

    Authors: Yusuke Kawamoto, Tetsuya Sato, Kohei Suenaga

    Abstract: We propose a new approach to formally describing the requirement for statistical inference and checking whether a program uses the statistical method appropriately. Specifically, we define belief Hoare logic (BHL) for formalizing and reasoning about the statistical beliefs acquired via hypothesis testing. This program logic is sound and relatively complete with respect to a Kripke model for hypoth… ▽ More

    Submitted 8 November, 2023; v1 submitted 15 August, 2022; originally announced August 2022.

    Comments: Accepted to the journal Artificial Intelligence (AI); an extended version of the KR'21 conference paper https://proceedings.kr.org/2021/39/

    Journal ref: Artificial Intelligence, Vol.326, 104045, Elsevier, 2024

  29. arXiv:2206.08288  [pdf, other

    cs.CL

    Balancing Cost and Quality: An Exploration of Human-in-the-loop Frameworks for Automated Short Answer Scoring

    Authors: Hiroaki Funayama, Tasuku Sato, Yuichiroh Matsubayashi, Tomoya Mizumoto, Jun Suzuki, Kentaro Inui

    Abstract: Short answer scoring (SAS) is the task of grading short text written by a learner. In recent years, deep-learning-based approaches have substantially improved the performance of SAS models, but how to guarantee high-quality predictions still remains a critical issue when applying such models to the education field. Towards guaranteeing high-quality predictions, we present the first study of explor… ▽ More

    Submitted 16 June, 2022; originally announced June 2022.

    Comments: 12pages, To be published in proceedings of AIED2022

  30. Divergences on Monads for Relational Program Logics

    Authors: Tetsuya Sato, Shin-ya Katsumata

    Abstract: Several relational program logics have been introduced for integrating reasoning about relational properties of programs and measurement of quantitative difference between computational effects. Towards a general framework for such logics, in this paper, we formalize quantitative difference between computational effects as divergence on monad, then develop a relational program logic acRL that supp… ▽ More

    Submitted 12 June, 2022; originally announced June 2022.

    Comments: Preprint

  31. arXiv:2206.05399  [pdf, other

    cs.CL

    Building a Personalized Dialogue System with Prompt-Tuning

    Authors: Tomohito Kasahara, Daisuke Kawahara, Nguyen Tung, Shengzhe Li, Kenta Shinzato, Toshinori Sato

    Abstract: Dialogue systems without consistent responses are not fascinating. In this study, we build a dialogue system that can respond based on a given character setting (persona) to bring consistency. Considering the trend of the rapidly increasing scale of language models, we propose an approach that uses prompt-tuning, which has low learning costs, on pre-trained large-scale language models. The results… ▽ More

    Submitted 10 June, 2022; originally announced June 2022.

    Comments: Accepted to NAACL 2022 SRW

  32. arXiv:2205.14230  [pdf, other

    cs.LG cs.CV cs.RO

    Semi-supervised Semantics-guided Adversarial Training for Trajectory Prediction

    Authors: Ruochen Jiao, Xiangguo Liu, Takami Sato, Qi Alfred Chen, Qi Zhu

    Abstract: Predicting the trajectories of surrounding objects is a critical task for self-driving vehicles and many other autonomous systems. Recent works demonstrate that adversarial attacks on trajectory prediction, where small crafted perturbations are introduced to history trajectories, may significantly mislead the prediction of future trajectories and induce unsafe planning. However, few works have add… ▽ More

    Submitted 20 March, 2023; v1 submitted 27 May, 2022; originally announced May 2022.

    Comments: 11 pages, adversarial training for trajectory prediction

  33. Operations Smart Contract to Realize Decentralized System Operations Workflow for Consortium Blockchain

    Authors: Tatsuya Sato, Taku Shimosawa, Yosuke Himura

    Abstract: Enterprises have paid attention to consortium blockchains like Hyperledger Fabric, which is one of the most promising platforms, for efficient decentralized transactions without depending on any particular organization. A consortium blockchain-based system will be typically built across multiple organizations. In such blockchain-based systems, system operations across multiple organizations in a d… ▽ More

    Submitted 10 May, 2022; originally announced May 2022.

    Journal ref: IEICE Transactions on Communications, 2022

  34. arXiv:2204.14117  [pdf, other

    cs.CV

    A Comparative Study of Meter Detection Methods for Automated Infrastructure Inspection

    Authors: Yusuke Ohtsubo, Takuto Sato, Hirohiko Sagawa

    Abstract: In order to read meter values from a camera on an autonomous inspection robot with positional errors, it is necessary to detect meter regions from the image. In this study, we developed shape-based, texture-based, and background information-based methods as meter area detection techniques and compared their effectiveness for meters of different shapes and sizes. As a result, we confirmed that the… ▽ More

    Submitted 24 April, 2022; originally announced April 2022.

    Comments: 2 pages, in Japanese language

  35. arXiv:2203.16851  [pdf, other

    cs.CV cs.CR cs.LG

    Towards Driving-Oriented Metric for Lane Detection Models

    Authors: Takami Sato, Qi Alfred Chen

    Abstract: After the 2017 TuSimple Lane Detection Challenge, its dataset and evaluation based on accuracy and F1 score have become the de facto standard to measure the performance of lane detection methods. While they have played a major role in improving the performance of lane detection methods, the validity of this evaluation method in downstream tasks has not been adequately researched. In this study, we… ▽ More

    Submitted 31 March, 2022; originally announced March 2022.

    Comments: Accepted to CVPR 2022. arXiv admin note: text overlap with arXiv:2107.02488

  36. arXiv:2203.05314  [pdf, other

    cs.CR cs.AI cs.RO

    SoK: On the Semantic AI Security in Autonomous Driving

    Authors: Junjie Shen, Ningfei Wang, Ziwen Wan, Yunpeng Luo, Takami Sato, Zhisheng Hu, Xinyang Zhang, Shengjian Guo, Zhenyu Zhong, Kang Li, Ziming Zhao, Chunming Qiao, Qi Alfred Chen

    Abstract: Autonomous Driving (AD) systems rely on AI components to make safety and correct driving decisions. Unfortunately, today's AI algorithms are known to be generally vulnerable to adversarial attacks. However, for such AI component-level vulnerabilities to be semantically impactful at the system level, it needs to address non-trivial semantic gaps both (1) from the system-level attack input spaces to… ▽ More

    Submitted 26 April, 2024; v1 submitted 10 March, 2022; originally announced March 2022.

    Comments: Project website: https://sites.google.com/view/cav-sec/pass

  37. arXiv:2201.02063  [pdf

    cs.NI

    Integrated ICN and CDN Slice as a Service

    Authors: Ilias Benkacem, M. Bagaa, T. Taleb, Q. N. Nguyen, T. Tsuda, T. Sato

    Abstract: In this article, we leverage Network Function Virtualization (NFV) and Multi-Access Edge Computing (MEC) technologies, proposing a system which integrates ICN (Information-Centric Network) with CDN (Content Delivery Network) to provide an efficient content delivery service. The proposed system combines the dynamic CDN slicing concept with the NDN (Named Data Network) based ICN slicing concept to a… ▽ More

    Submitted 3 January, 2022; originally announced January 2022.

  38. arXiv:2108.06481  [pdf, ps, other

    cs.AI

    MatSat: a matrix-based differentiable SAT solver

    Authors: Taisuke Sato, Ryosuke Kojima

    Abstract: We propose a new approach to SAT solving which solves SAT problems in vector spaces as a cost minimization problem of a non-negative differentiable cost function J^sat. In our approach, a solution, i.e., satisfying assignment, for a SAT problem in n variables is represented by a binary vector u in {0,1}^n that makes J^sat(u) zero. We search for such u in a vector space R^n by cost minimization, i.… ▽ More

    Submitted 14 August, 2021; originally announced August 2021.

  39. arXiv:2107.04011  [pdf

    cs.CY cs.CL

    Meeting the SDGs : Enabling the Goals by Cooperation with Crowd using a Conversational AI Platform

    Authors: J. Haqbeen, T. Ito, S. Sahab, R. Hadfi, T. Sato, S. Okuhara

    Abstract: In this paper, we report about a large-scale online discussion with 1099 citizens on the Afghanistan Sustainable Development Goals.

    Submitted 9 June, 2021; originally announced July 2021.

    Comments: 7 pages, 6 figures, 1 table, To appear as a conference paper at KICSS 2020

  40. arXiv:2107.02488  [pdf, other

    cs.CV cs.CR

    On Robustness of Lane Detection Models to Physical-World Adversarial Attacks in Autonomous Driving

    Authors: Takami Sato, Qi Alfred Chen

    Abstract: After the 2017 TuSimple Lane Detection Challenge, its evaluation based on accuracy and F1 score has become the de facto standard to measure the performance of lane detection methods. In this work, we conduct the first large-scale empirical study to evaluate the robustness of state-of-the-art lane detection methods under physical-world adversarial attacks in autonomous driving. We evaluate 4 major… ▽ More

    Submitted 6 July, 2021; originally announced July 2021.

  41. arXiv:2107.01155  [pdf, ps, other

    cs.LO cs.PL

    Higher-order probabilistic adversarial computations: Categorical semantics and program logics

    Authors: Alejandro Aguirre, Gilles Barthe, Marco Gaboardi, Deepak Garg, Shin-ya Katsumata, Tetsuya Sato

    Abstract: Adversarial computations are a widely studied class of computations where resource-bounded probabilistic adversaries have access to oracles, i.e., probabilistic procedures with private state. These computations arise routinely in several domains, including security, privacy and machine learning. In this paper, we develop program logics for reasoning about adversarial computations in a higher-order… ▽ More

    Submitted 2 July, 2021; originally announced July 2021.

    Comments: Full version of ICFP 21 paper

  42. arXiv:2106.05086  [pdf, ps, other

    cs.SI cs.CY cs.NI

    Design and Implementation of 5G eHealth Systems, Technologies, Use Cases and Future Challenges

    Authors: Di Zhang, Joel J. P. C. Rodrigues, Yunkai Zhai, Takuro Sato

    Abstract: Fifth generation (5G) aims to connect massive devices with even higher reliability, lower latency and even faster transmission speed, which are vital for implementing the e-health systems. However, the current efforts on 5G e-health systems are still not enough to accomplish its full blueprint. In this article, we first discuss the related technologies from physical layer, upper layer and cross la… ▽ More

    Submitted 10 July, 2021; v1 submitted 9 June, 2021; originally announced June 2021.

  43. arXiv:2105.04802  [pdf, ps, other

    cs.DS

    Tree Edit Distance with Variables. Measuring the Similarity between Mathematical Formulas

    Authors: Tatsuya Akutsu, Tomoya Mori, Naotoshi Nakamura, Satoshi Kozawa, Yuhei Ueno, Thomas N. Sato

    Abstract: In this article, we propose tree edit distance with variables, which is an extension of the tree edit distance to handle trees with variables and has a potential application to measuring the similarity between mathematical formulas, especially, those appearing in mathematical models of biological systems. We analyze the computational complexities of several variants of this new model. In particula… ▽ More

    Submitted 11 May, 2021; originally announced May 2021.

  44. arXiv:2104.11699  [pdf, ps, other

    cs.AI

    Secure Artificial Intelligence of Things for Implicit Group Recommendations

    Authors: Keping Yu, Zhiwei Guo, Yu Shen, Wei Wang, Jerry Chun-Wei Lin, Takuro Sato

    Abstract: The emergence of Artificial Intelligence of Things (AIoT) has provided novel insights for many social computing applications such as group recommender systems. As distance among people has been greatly shortened, it has been a more general demand to provide personalized services to groups instead of individuals. In order to capture group-level preference features from individuals, existing methods… ▽ More

    Submitted 23 April, 2021; originally announced April 2021.

  45. arXiv:2103.08373  [pdf, other

    cond-mat.dis-nn cs.LG quant-ph

    Assessment of image generation by quantum annealer

    Authors: Takehito Sato, Masayuki Ohzeki, Kazuyuki Tanaka

    Abstract: Quantum annealing was originally proposed as an approach for solving combinatorial optimisation problems using quantum effects. D-Wave Systems has released a production model of quantum annealing hardware. However, the inherent noise and various environmental factors in the hardware hamper the determination of optimal solutions. In addition, the freezing effect in regions with weak quantum fluctua… ▽ More

    Submitted 15 March, 2021; originally announced March 2021.

    Comments: 10 pages, 8 figures

  46. arXiv:2103.00345  [pdf, other

    cs.RO cs.CR cs.LG eess.SY

    End-to-end Uncertainty-based Mitigation of Adversarial Attacks to Automated Lane Centering

    Authors: Ruochen Jiao, Hengyi Liang, Takami Sato, Junjie Shen, Qi Alfred Chen, Qi Zhu

    Abstract: In the development of advanced driver-assistance systems (ADAS) and autonomous vehicles, machine learning techniques that are based on deep neural networks (DNNs) have been widely used for vehicle perception. These techniques offer significant improvement on average perception accuracy over traditional methods, however, have been shown to be susceptible to adversarial attacks, where small perturba… ▽ More

    Submitted 27 February, 2021; originally announced March 2021.

    Comments: 8 pages for conference

  47. arXiv:2010.09410  [pdf, other

    cs.CR

    Virtual Secure Platform: A Five-Stage Pipeline Processor over TFHE

    Authors: Kotaro Matsuoka, Ryotaro Banno, Naoki Matsumoto, Takashi Sato, Song Bian

    Abstract: We present Virtual Secure Platform (VSP), the first comprehensive platform that implements a multi-opcode general-purpose sequential processor over Fully Homomorphic Encryption (FHE) for Secure Multi-Party Computation (SMPC). VSP protects both the data and functions on which the data are evaluated from the adversary in a secure computation offloading situation like cloud computing. We proposed a c… ▽ More

    Submitted 19 October, 2020; originally announced October 2020.

    Comments: Accepted in USENIX Security '21. This is a long version

  48. arXiv:2010.00206  [pdf, other

    cs.CR

    An Anonymous Trust-Marking Scheme on Blockchain Systems

    Authors: Teppei Sato, Keita Emura, Tomoki Fujitani, Kazumasa Omote

    Abstract: During the Coincheck incident, which recorded the largest damages in cryptocurrency history in 2018, it was demonstrated that using Mosaic token can have a certain effect. Although it seems attractive to employ tokens as countermeasures for cryptocurrency leakage, Mosaic is a specific token for the New Economy Movement (NEM) cryptocurrency and is not employed for other blockchain systems or crypto… ▽ More

    Submitted 25 February, 2021; v1 submitted 1 October, 2020; originally announced October 2020.

    Comments: An extended abstract appeared at the 3rd IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2021. This is the full version

  49. arXiv:2009.06701  [pdf, other

    cs.CR cs.CV cs.LG

    Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack

    Authors: Takami Sato, Junjie Shen, Ningfei Wang, Yunhan Jack Jia, Xue Lin, Qi Alfred Chen

    Abstract: Automated Lane Centering (ALC) systems are convenient and widely deployed today, but also highly security and safety critical. In this work, we are the first to systematically study the security of state-of-the-art deep learning based ALC systems in their designed operational domains under physical-world adversarial attacks. We formulate the problem with a safety-critical attack goal, and a novel… ▽ More

    Submitted 13 June, 2021; v1 submitted 14 September, 2020; originally announced September 2020.

    Comments: Accepted to Usenix Security '21

  50. arXiv:2008.04538  [pdf, other

    cs.LG stat.ML

    FedNNNN: Norm-Normalized Neural Network Aggregation for Fast and Accurate Federated Learning

    Authors: Kenta Nagura, Song Bian, Takashi Sato

    Abstract: Federated learning (FL) is a distributed learning protocol in which a server needs to aggregate a set of models learned some independent clients to proceed the learning process. At present, model averaging, known as FedAvg, is one of the most widely adapted aggregation techniques. However, it is known to yield the models with degraded prediction accuracy and slow convergence. In this work, we find… ▽ More

    Submitted 11 August, 2020; originally announced August 2020.