Skip to main content

Showing 1–3 of 3 results for author: Yamaoka, Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.04150  [pdf, other

    cs.CV cs.LG

    Learning from Similarity Proportion Loss for Classifying Skeletal Muscle Recovery Stages

    Authors: Yu Yamaoka, Weng Ian Chan, Shigeto Seno, Soichiro Fukada, Hideo Matsuda

    Abstract: Evaluating the regeneration process of damaged muscle tissue is a fundamental analysis in muscle research to measure experimental effect sizes and uncover mechanisms behind muscle weakness due to aging and disease. The conventional approach to assessing muscle tissue regeneration involves whole-slide imaging and expert visual inspection of the recovery stages based on the morphological information… ▽ More

    Submitted 8 May, 2025; v1 submitted 7 May, 2025; originally announced May 2025.

    Comments: MICCAI2024 workshop ADSMI in Morocco (oral) [Peer-reviewed]

  2. arXiv:2309.01332  [pdf, other

    cs.CR

    Synchro: Block-generation Protocol to Synchronously Process Cross-shard Transactions in State Sharding

    Authors: Takaki Asanuma, Takeshi Miyamae, Yuji Yamaoka

    Abstract: Traditional blockchains cannot achieve the same transaction throughput as Web2, so their use cases are limited. Therefore, state sharding has been proposed to improve transaction throughput by dividing the blockchain network and managing states and transactions in parallel. However, Nightshade in the NEAR Protocol, a type of state sharding, provides a rollback protocol to cancel the generation of… ▽ More

    Submitted 3 September, 2023; originally announced September 2023.

  3. arXiv:2107.10407  [pdf, other

    cs.CR cs.DB

    Designing a Location Trace Anonymization Contest

    Authors: Takao Murakami, Hiromi Arai, Koki Hamada, Takuma Hatano, Makoto Iguchi, Hiroaki Kikuchi, Atsushi Kuromasa, Hiroshi Nakagawa, Yuichi Nakamura, Kenshiro Nishiyama, Ryo Nojima, Hidenobu Oguri, Chiemi Watanabe, Akira Yamada, Takayasu Yamaguchi, Yuji Yamaoka

    Abstract: For a better understanding of anonymization methods for location traces, we have designed and held a location trace anonymization contest that deals with a long trace (400 events per user) and fine-grained locations (1024 regions). In our contest, each team anonymizes her original traces, and then the other teams perform privacy attacks against the anonymized traces. In other words, both defense a… ▽ More

    Submitted 5 September, 2022; v1 submitted 21 July, 2021; originally announced July 2021.

    Comments: Accepted at PoPETs (Proceedings on Privacy Enhancing Technologies) 2023