Skip to main content

Showing 1–24 of 24 results for author: Kera, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.19615  [pdf, other

    cs.LG physics.ao-ph

    VarteX: Enhancing Weather Forecast through Distributed Variable Representation

    Authors: Ayumu Ueyama, Kazuhiko Kawamoto, Hiroshi Kera

    Abstract: Weather forecasting is essential for various human activities. Recent data-driven models have outperformed numerical weather prediction by utilizing deep learning in forecasting performance. However, challenges remain in efficiently handling multiple meteorological variables. This study proposes a new variable aggregation scheme and an efficient learning framework for that challenge. Experiments s… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

    Comments: ICML 2024, Workshop on Machine Learning for Earth System Modeling

  2. arXiv:2403.08227  [pdf, other

    cs.CV

    Matching Non-Identical Objects

    Authors: Yusuke Marumo, Kazuhiko Kawamoto, Hiroshi Kera

    Abstract: Not identical but similar objects are everywhere in the world. Examples include four-legged animals such as dogs and cats, cars of different models, akin flowers in various colors, and countless others. In this study, we address a novel task of matching such non-identical objects. We propose a simple weighting scheme of descriptors that enhances various sparse image matching methods, which were or… ▽ More

    Submitted 18 March, 2024; v1 submitted 13 March, 2024; originally announced March 2024.

    Comments: 10+7 pages, 10 figures, 4 tables

  3. arXiv:2402.10470  [pdf, other

    cs.LG cs.CV stat.ML

    Theoretical Understanding of Learning from Adversarial Perturbations

    Authors: Soichiro Kumano, Hiroshi Kera, Toshihiko Yamasaki

    Abstract: It is not fully understood why adversarial examples can deceive neural networks and transfer between different networks. To elucidate this, several studies have hypothesized that adversarial perturbations, while appearing as noises, contain class features. This is supported by empirical evidence showing that networks trained on mislabeled adversarial examples can still generalize well to correctly… ▽ More

    Submitted 16 February, 2024; originally announced February 2024.

    Comments: ICLR24

  4. arXiv:2401.03785  [pdf, other

    cs.CV cs.LG

    Identifying Important Group of Pixels using Interactions

    Authors: Kosuke Sumiyasu, Kazuhiko Kawamoto, Hiroshi Kera

    Abstract: To better understand the behavior of image classifiers, it is useful to visualize the contribution of individual pixels to the model prediction. In this study, we propose a method, MoXI ($\textbf{Mo}$del e$\textbf{X}$planation by $\textbf{I}$nteractions), that efficiently and accurately identifies a group of pixels with high prediction confidence. The proposed method employs game-theoretic concept… ▽ More

    Submitted 12 April, 2024; v1 submitted 8 January, 2024; originally announced January 2024.

    Comments: CVPR 2024

  5. arXiv:2311.12904  [pdf, ps, other

    math.AC cs.LG

    Learning to Compute Gröbner Bases

    Authors: Hiroshi Kera, Yuki Ishihara, Yuta Kambe, Tristan Vaccon, Kazuhiro Yokoyama

    Abstract: Solving a polynomial system, or computing an associated Gröbner basis, has been a fundamental task in computational algebra. However, it is also known for its notoriously expensive computational cost - doubly exponential time complexity in the number of variables in the worst case. In this paper, we achieve for the first time Gröbner basis computation through the training of a Transformer. The tra… ▽ More

    Submitted 12 February, 2024; v1 submitted 21 November, 2023; originally announced November 2023.

    Comments: 42 pages, 24 tables

  6. arXiv:2305.17939  [pdf, other

    cs.CV

    Fourier Analysis on Robustness of Graph Convolutional Neural Networks for Skeleton-based Action Recognition

    Authors: Nariki Tanaka, Hiroshi Kera, Kazuhiko Kawamoto

    Abstract: Using Fourier analysis, we explore the robustness and vulnerability of graph convolutional neural networks (GCNs) for skeleton-based action recognition. We adopt a joint Fourier transform (JFT), a combination of the graph Fourier transform (GFT) and the discrete Fourier transform (DFT), to examine the robustness of adversarially-trained GCNs against adversarial attacks and common corruptions. Expe… ▽ More

    Submitted 30 December, 2023; v1 submitted 29 May, 2023; originally announced May 2023.

    Comments: 18 pages, 13 figures

  7. arXiv:2305.08439  [pdf, other

    cs.CV

    Exploiting Frequency Spectrum of Adversarial Images for General Robustness

    Authors: Chun Yang Tan, Kazuhiko Kawamoto, Hiroshi Kera

    Abstract: In recent years, there has been growing concern over the vulnerability of convolutional neural networks (CNNs) to image perturbations. However, achieving general robustness against different types of perturbations remains challenging, in which enhancing robustness to some perturbations (e.g., adversarial perturbations) may degrade others (e.g., common corruptions). In this paper, we demonstrate th… ▽ More

    Submitted 15 May, 2023; originally announced May 2023.

    Comments: 15 pages and 5 figures. arXiv admin note: text overlap with arXiv:2203.07138

  8. arXiv:2301.08874  [pdf, other

    cs.CV

    Improving Zero-Shot Action Recognition using Human Instruction with Text Description

    Authors: Nan Wu, Hiroshi Kera, Kazuhiko Kawamoto

    Abstract: Zero-shot action recognition, which recognizes actions in videos without having received any training examples, is gaining wide attention considering it can save labor costs and training time. Nevertheless, the performance of zero-shot learning is still unsatisfactory, which limits its practical application. To solve this problem, this study proposes a framework to improve zero-shot action recogni… ▽ More

    Submitted 12 June, 2023; v1 submitted 20 January, 2023; originally announced January 2023.

    Comments: 18 pages, 9 figures

  9. arXiv:2210.16171  [pdf, other

    cs.LG cs.SC

    Vanishing Component Analysis with Contrastive Normalization

    Authors: Ryosuke Masuya, Yuichi Ike, Hiroshi Kera

    Abstract: Vanishing component analysis (VCA) computes approximate generators of vanishing ideals of samples, which are further used for extracting nonlinear features of the samples. Recent studies have shown that normalization of approximate generators plays an important role and different normalization leads to generators of different properties. In this paper, inspired by recent self-supervised frameworks… ▽ More

    Submitted 27 October, 2022; originally announced October 2022.

    Comments: 22pages, 1 figure

  10. arXiv:2210.03349  [pdf, other

    cs.CV

    Game-Theoretic Understanding of Misclassification

    Authors: Kosuke Sumiyasu, Kazuhiko Kawamoto, Hiroshi Kera

    Abstract: This paper analyzes various types of image misclassification from a game-theoretic view. Particularly, we consider the misclassification of clean, adversarial, and corrupted images and characterize it through the distribution of multi-order interactions. We discover that the distribution of multi-order interactions varies across the types of misclassification. For example, misclassified adversaria… ▽ More

    Submitted 7 October, 2022; originally announced October 2022.

    Comments: 15 pages, 8 figures

  11. arXiv:2207.01236  [pdf, other

    cs.LG math.OC

    Approximate Vanishing Ideal Computations at Scale

    Authors: Elias Wirth, Hiroshi Kera, Sebastian Pokutta

    Abstract: The vanishing ideal of a set of points $X = \{\mathbf{x}_1, \ldots, \mathbf{x}_m\}\subseteq \mathbb{R}^n$ is the set of polynomials that evaluate to $0$ over all points $\mathbf{x} \in X$ and admits an efficient representation by a finite subset of generators. In practice, to accommodate noise in the data, algorithms that construct generators of the approximate vanishing ideal are widely studied b… ▽ More

    Submitted 10 February, 2023; v1 submitted 4 July, 2022; originally announced July 2022.

  12. arXiv:2205.14629  [pdf, other

    cs.CV

    Superclass Adversarial Attack

    Authors: Soichiro Kumano, Hiroshi Kera, Toshihiko Yamasaki

    Abstract: Adversarial attacks have only focused on changing the predictions of the classifier, but their danger greatly depends on how the class is mistaken. For example, when an automatic driving system mistakes a Persian cat for a Siamese cat, it is hardly a problem. However, if it mistakes a cat for a 120km/h minimum speed sign, serious problems can arise. As a step** stone to more threatening adversar… ▽ More

    Submitted 14 July, 2022; v1 submitted 29 May, 2022; originally announced May 2022.

    Comments: ICML Workshop 2022 on Adversarial Machine Learning Frontiers

  13. Adversarial Body Shape Search for Legged Robots

    Authors: Takaaki Azakami, Hiroshi Kera, Kazuhiko Kawamoto

    Abstract: We propose an evolutionary computation method for an adversarial attack on the length and thickness of parts of legged robots by deep reinforcement learning. This attack changes the robot body shape and interferes with walking-we call the attacked body as adversarial body shape. The evolutionary computation method searches adversarial body shape by minimizing the expected cumulative reward earned… ▽ More

    Submitted 20 May, 2022; originally announced May 2022.

    Comments: 6 pages, 7 figures

  14. Adversarial joint attacks on legged robots

    Authors: Takuto Otomo, Hiroshi Kera, Kazuhiko Kawamoto

    Abstract: We address adversarial attacks on the actuators at the joints of legged robots trained by deep reinforcement learning. The vulnerability to the joint attacks can significantly impact the safety and robustness of legged robots. In this study, we demonstrate that the adversarial perturbations to the torque control signals of the actuators can significantly reduce the rewards and cause walking instab… ▽ More

    Submitted 20 May, 2022; originally announced May 2022.

    Comments: 6 pages, 8 figures

  15. arXiv:2203.07138  [pdf, other

    cs.CV eess.IV

    Adversarial amplitude swap towards robust image classifiers

    Authors: Chun Yang Tan, Kazuhiko Kawamoto, Hiroshi Kera

    Abstract: The vulnerability of convolutional neural networks (CNNs) to image perturbations such as common corruptions and adversarial perturbations has recently been investigated from the perspective of frequency. In this study, we investigate the effect of the amplitude and phase spectra of adversarial images on the robustness of CNN classifiers. Extensive experiments revealed that the images generated by… ▽ More

    Submitted 1 April, 2022; v1 submitted 14 March, 2022; originally announced March 2022.

    Comments: 13+6 pages (main+supplement), 3 figures

  16. arXiv:2111.10005  [pdf, other

    cs.RO cs.AI

    Reinforcement Learning with Adaptive Curriculum Dynamics Randomization for Fault-Tolerant Robot Control

    Authors: Wataru Okamoto, Hiroshi Kera, Kazuhiko Kawamoto

    Abstract: This study is aimed at addressing the problem of fault tolerance of quadruped robots to actuator failure, which is critical for robots operating in remote or extreme environments. In particular, an adaptive curriculum reinforcement learning algorithm with dynamics randomization (ACDR) is established. The ACDR algorithm can adaptively train a quadruped robot in random actuator failure conditions an… ▽ More

    Submitted 18 November, 2021; originally announced November 2021.

    Comments: 8 pages, 9 figures. This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  17. arXiv:2109.05919  [pdf, other

    cs.CV cs.NE

    Evolving Architectures with Gradient Misalignment toward Low Adversarial Transferability

    Authors: Kevin Richard G. Operiano, Wanchalerm Pora, Hitoshi Iba, Hiroshi Kera

    Abstract: Deep neural network image classifiers are known to be susceptible not only to adversarial examples created for them but even those created for others. This phenomenon poses a potential security risk in various black-box systems relying on image classifiers. The reason behind such transferability of adversarial examples is not yet fully understood and many studies have proposed training methods to… ▽ More

    Submitted 13 September, 2021; originally announced September 2021.

    Comments: 23 pages, 4 figures

  18. arXiv:2109.05830  [pdf, other

    cs.CV cs.AI cs.CR cs.LG

    Adversarial Bone Length Attack on Action Recognition

    Authors: Nariki Tanaka, Hiroshi Kera, Kazuhiko Kawamoto

    Abstract: Skeleton-based action recognition models have recently been shown to be vulnerable to adversarial attacks. Compared to adversarial attacks on images, perturbations to skeletons are typically bounded to a lower dimension of approximately 100 per frame. This lower-dimensional setting makes it more difficult to generate imperceptible perturbations. Existing attacks resolve this by exploiting the temp… ▽ More

    Submitted 25 March, 2022; v1 submitted 13 September, 2021; originally announced September 2021.

    Comments: 12 pages, 8 figures, accepted to AAAI2022

  19. Adversarially Trained Object Detector for Unsupervised Domain Adaptation

    Authors: Kazuma Fujii, Hiroshi Kera, Kazuhiko Kawamoto

    Abstract: Unsupervised domain adaptation, which involves transferring knowledge from a label-rich source domain to an unlabeled target domain, can be used to substantially reduce annotation costs in the field of object detection. In this study, we demonstrate that adversarial training in the source domain can be employed as a new approach for unsupervised domain adaptation. Specifically, we establish that a… ▽ More

    Submitted 25 November, 2021; v1 submitted 13 September, 2021; originally announced September 2021.

    Comments: 10 pages, 6 figures. This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  20. arXiv:2101.00401  [pdf, other

    cs.SC cs.LG math.AC

    Border basis computation with gradient-weighted normalization

    Authors: Hiroshi Kera

    Abstract: Normalization of polynomials plays a vital role in the approximate basis computation of vanishing ideals. Coefficient normalization, which normalizes a polynomial with its coefficient norm, is the most common method in computer algebra. This study proposes the gradient-weighted normalization method for the approximate border basis computation of vanishing ideals, inspired by recent developments in… ▽ More

    Submitted 30 June, 2022; v1 submitted 2 January, 2021; originally announced January 2021.

    Comments: 20 pages, 1 figure

  21. arXiv:2101.00243  [pdf, other

    cs.SC math.AC

    Monomial-agnostic computation of vanishing ideals

    Authors: Hiroshi Kera, Yoshihiko Hasegawa

    Abstract: In the last decade, the approximate basis computation of vanishing ideals has been studied extensively in computational algebra and data-driven applications such as machine learning. However, symbolic computation and the dependency on term order remain essential gaps between the two fields. In this study, we present the first $\textit{monomial-agnostic}$ basis computation, which works fully numeri… ▽ More

    Submitted 31 December, 2023; v1 submitted 1 January, 2021; originally announced January 2021.

    Comments: 25 pages, 1 figures

  22. arXiv:2012.03843  [pdf, other

    cs.CV

    Are DNNs fooled by extremely unrecognizable images?

    Authors: Soichiro Kumano, Hiroshi Kera, Toshihiko Yamasaki

    Abstract: Fooling images are a potential threat to deep neural networks (DNNs). These images are not recognizable to humans as natural objects, such as dogs and cats, but are misclassified by DNNs as natural-object classes with high confidence scores. Despite their original design concept, existing fooling images retain some features that are characteristic of the target objects if looked into closely. Henc… ▽ More

    Submitted 26 March, 2022; v1 submitted 7 December, 2020; originally announced December 2020.

  23. arXiv:1911.04174  [pdf, other

    stat.ML cs.LG

    Gradient Boosts the Approximate Vanishing Ideal

    Authors: Hiroshi Kera, Yoshihiko Hasegawa

    Abstract: In the last decade, the approximate vanishing ideal and its basis construction algorithms have been extensively studied in computer algebra and machine learning as a general model to reconstruct the algebraic variety on which noisy data approximately lie. In particular, the basis construction algorithms developed in machine learning are widely used in applications across many fields because of the… ▽ More

    Submitted 11 November, 2019; originally announced November 2019.

    Comments: 9+10 pages, 1+4 figures, AAAI'20

  24. arXiv:1901.08798  [pdf, other

    stat.ML cs.LG

    Spurious Vanishing Problem in Approximate Vanishing Ideal

    Authors: Hiroshi Kera, Yoshihiko Hasegawa

    Abstract: Approximate vanishing ideal is a concept from computer algebra that studies the algebraic varieties behind perturbed data points. To capture the nonlinear structure of perturbed points, the introduction of approximation to exact vanishing ideals plays a critical role. However, such an approximation also gives rise to a theoretical problem---the spurious vanishing problem---in the basis constructio… ▽ More

    Submitted 7 November, 2019; v1 submitted 25 January, 2019; originally announced January 2019.

    Comments: 30 pages, 4 figures