Skip to main content

Showing 1–12 of 12 results for author: Fukushima, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.11262  [pdf, other

    cs.LG cond-mat.stat-mech cs.AI hep-th

    Understanding Diffusion Models by Feynman's Path Integral

    Authors: Yuji Hirono, Akinori Tanaka, Kenji Fukushima

    Abstract: Score-based diffusion models have proven effective in image generation and have gained widespread usage; however, the underlying factors contributing to the performance disparity between stochastic and deterministic (i.e., the probability flow ODEs) sampling schemes remain unclear. We introduce a novel formulation of diffusion models using Feynman's path integral, which is a formulation originally… ▽ More

    Submitted 17 March, 2024; originally announced March 2024.

    Comments: 27 pages, 14 figures

    Report number: RIKEN-iTHEMS-Report-24

  2. arXiv:2312.07022  [pdf, other

    cs.CR cs.LG

    EdgePruner: Poisoned Edge Pruning in Graph Contrastive Learning

    Authors: Hiroya Kato, Kento Hasegawa, Seira Hidano, Kazuhide Fukushima

    Abstract: Graph Contrastive Learning (GCL) is unsupervised graph representation learning that can obtain useful representation of unknown nodes. The node representation can be utilized as features of downstream tasks. However, GCL is vulnerable to poisoning attacks as with existing learning models. A state-of-the-art defense cannot sufficiently negate adverse effects by poisoned graphs although such a defen… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

  3. arXiv:2306.01273  [pdf, other

    cs.CL

    VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations

    Authors: Hoang-Quoc Nguyen-Son, Seira Hidano, Kazuhide Fukushima, Shinsaku Kiyomoto, Isao Echizen

    Abstract: Adversarial attacks reveal serious flaws in deep learning models. More dangerously, these attacks preserve the original meaning and escape human recognition. Existing methods for detecting these attacks need to be trained using original/adversarial data. In this paper, we propose detection without training by voting on hard labels from predictions of transformations, namely, VoteTRANS. Specificall… ▽ More

    Submitted 2 June, 2023; originally announced June 2023.

    Comments: Findings of ACL 2023 (long paper)

  4. arXiv:2211.06400  [pdf, other

    physics.acc-ph cs.LG

    Prior-mean-assisted Bayesian optimization application on FRIB Front-End tunning

    Authors: Kilean Hwang, Tomofumi Maruta, Alexander Plastun, Kei Fukushima, Tong Zhang, Qiang Zhao, Peter Ostroumov, Yue Hao

    Abstract: Bayesian optimization~(BO) is often used for accelerator tuning due to its high sample efficiency. However, the computational scalability of training over large data-set can be problematic and the adoption of historical data in a computationally efficient way is not trivial. Here, we exploit a neural network model trained over historical data as a prior mean of BO for FRIB Front-End tuning.

    Submitted 11 November, 2022; originally announced November 2022.

  5. arXiv:2112.02213  [pdf, other

    cs.CR

    Node-wise Hardware Trojan Detection Based on Graph Learning

    Authors: Kento Hasegawa, Kazuki Yamashita, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa

    Abstract: In the fourth industrial revolution, securing the protection of the supply chain has become an ever-growing concern. One such cyber threat is a hardware Trojan (HT), a malicious modification to an IC. HTs are often identified in the hardware manufacturing process, but should be removed earlier, when the design is being specified. Machine learning-based HT detection in gate-level netlists is an eff… ▽ More

    Submitted 15 March, 2022; v1 submitted 3 December, 2021; originally announced December 2021.

  6. arXiv:2110.05748  [pdf, other

    cs.CL

    SEPP: Similarity Estimation of Predicted Probabilities for Defending and Detecting Adversarial Text

    Authors: Hoang-Quoc Nguyen-Son, Seira Hidano, Kazuhide Fukushima, Shinsaku Kiyomoto

    Abstract: There are two cases describing how a classifier processes input text, namely, misclassification and correct classification. In terms of misclassified texts, a classifier handles the texts with both incorrect predictions and adversarial texts, which are generated to fool the classifier, which is called a victim. Both types are misunderstood by the victim, but they can still be recognized by other c… ▽ More

    Submitted 12 October, 2021; v1 submitted 12 October, 2021; originally announced October 2021.

    Comments: PACLIC 35 (2021) (Oral)

  7. arXiv:2104.03632  [pdf, other

    cond-mat.dis-nn cond-mat.stat-mech cs.LG stat.ML

    Can a CNN trained on the Ising model detect the phase transition of the $q$-state Potts model?

    Authors: Kimihiko Fukushima, Kazumitsu Sakai

    Abstract: Employing a deep convolutional neural network (deep CNN) trained on spin configurations of the 2D Ising model and the temperatures, we examine whether the deep CNN can detect the phase transition of the 2D $q$-state Potts model. To this end, we generate binarized images of spin configurations of the $q$-state Potts model ($q\ge 3$) by replacing the spin variables… ▽ More

    Submitted 30 June, 2021; v1 submitted 8 April, 2021; originally announced April 2021.

    Comments: 13 pages, v3: minor corrections, published version

    Journal ref: Prog. Theor. Exp. Phys. 2021, 061A01

  8. arXiv:2101.08156  [pdf, other

    nucl-th astro-ph.HE astro-ph.IM cs.LG hep-ph

    Extensive Studies of the Neutron Star Equation of State from the Deep Learning Inference with the Observational Data Augmentation

    Authors: Yuki Fujimoto, Kenji Fukushima, Koichi Murase

    Abstract: We discuss deep learning inference for the neutron star equation of state (EoS) using the real observational data of the mass and the radius. We make a quantitative comparison between the conventional polynomial regression and the neural network approach for the EoS parametrization. For our deep learning method to incorporate uncertainties in observation, we augment the training data with noise fl… ▽ More

    Submitted 20 January, 2021; originally announced January 2021.

    Comments: 45 pages, 25 figures

    Journal ref: JHEP 03 (2021) 273

  9. arXiv:2012.15423  [pdf, other

    cs.CR

    Lattice-based Signcryption with Equality Test in Standard Model

    Authors: Huy Quoc Le, Dung Hoang Duong, Partha Sarathi Roy, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto

    Abstract: A signcryption, which is an integration of a public key encryption and a digital signature, can provide confidentiality and authenticity simultaneously. Additionally, a signcryption associated with equality test allows a third party (e.g., a cloud server) to check whether or not two ciphertexts are encrypted from the same message without knowing the message. This application plays an important rol… ▽ More

    Submitted 30 December, 2020; originally announced December 2020.

  10. arXiv:2005.05308  [pdf, ps, other

    cs.CR

    Lattice-based public key encryption with equality test supporting flexible authorization in standard model

    Authors: Dung Hoang Duong, Kazuhide Fukushima, Shinsaku Kiyomoto, Partha Sarathi Roy, Arnaud Sipasseuth, Willy Susilo

    Abstract: Public key encryption with equality test (PKEET) supports to check whether two ciphertexts encrypted under different public keys contain the same message or not. PKEET has many interesting applications such as keyword search on encrypted data, encrypted data partitioning for efficient encrypted data management, personal health record systems, spam filtering in encrypted email systems and so on. Ho… ▽ More

    Submitted 9 May, 2020; originally announced May 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:2005.03178

  11. arXiv:2005.03178  [pdf, ps, other

    cs.CR

    CCA2-secure Lattice-based Public Key Encryption with Equality Test in Standard Model

    Authors: Dung Hoang Duong, Partha Sarathi Roy, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto, Arnaud Sipasseuth

    Abstract: With the rapid growth of cloud storage and cloud computing services, many organisations and users choose to store the data on a cloud server for saving costs. However, due to security concerns, data of users would be encrypted before sending to the cloud. However, this hinders a problem of computation on encrypted data in the cloud, especially in the case of performing data matching in various med… ▽ More

    Submitted 31 January, 2021; v1 submitted 6 May, 2020; originally announced May 2020.

    Comments: 23 pages, full version of https://link.springer.com/chapter/10.1007%2F978-3-030-21548-4_8

  12. arXiv:1908.00281  [pdf, other

    cs.LG hep-th

    Featuring the topology with the unsupervised machine learning

    Authors: Kenji Fukushima, Shotaro Shiba Funai, Hideaki Iida

    Abstract: Images of line drawings are generally composed of primitive elements. One of the most fundamental elements to characterize images is the topology; line segments belong to a category different from closed circles, and closed circles with different winding degrees are nonequivalent. We investigate images with nontrivial winding using the unsupervised machine learning. We build an autoencoder model w… ▽ More

    Submitted 1 August, 2019; originally announced August 2019.

    Comments: 14 pages, 7 figures