Skip to main content

Showing 1–10 of 10 results for author: Otsuka, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.01896  [pdf, other

    cs.LG cs.CR stat.ML

    Robustness Bounds on the Successful Adversarial Examples: Theory and Practice

    Authors: Hiroaki Maeshima, Akira Otsuka

    Abstract: Adversarial example (AE) is an attack method for machine learning, which is crafted by adding imperceptible perturbation to the data inducing misclassification. In the current paper, we investigated the upper bound of the probability of successful AEs based on the Gaussian Process (GP) classification. We proved a new upper bound that depends on AE's perturbation norm, the kernel function used in G… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

  2. arXiv:2211.13110  [pdf, other

    cs.LG cs.CR

    Compiler Provenance Recovery for Multi-CPU Architectures Using a Centrifuge Mechanism

    Authors: Yuhei Otsubo, Akira Otsuka, Mamoru Mimura

    Abstract: Bit-stream recognition (BSR) has many applications, such as forensic investigations, detection of copyright infringement, and malware analysis. We propose the first BSR that takes a bare input bit-stream and outputs a class label without any preprocessing. To achieve our goal, we propose a centrifuge mechanism, where the upstream layers (sub-net) capture global features and tell the downstream lay… ▽ More

    Submitted 23 November, 2022; v1 submitted 21 November, 2022; originally announced November 2022.

    Comments: 8 pages, 4 figures, 5 tables

  3. arXiv:2010.16024  [pdf, other

    cs.CR

    Evaluation of vulnerability reproducibility in container-based Cyber Range

    Authors: Ryotaro Nakata, Akira Otsuka

    Abstract: A cyber range, a practical and highly educational information security exercise system, is difficult to implement in educational institutions because of the high cost of implementing and maintaining it. Therefore, there is a need for a cyber range that can be adopted and maintained at a low cost. Recently, container type virtualization is gaining attention as it can create a high-speed and high-de… ▽ More

    Submitted 5 November, 2020; v1 submitted 29 October, 2020; originally announced October 2020.

    Comments: 14 pages, 7 figures, 9 tables

  4. arXiv:2001.07331  [pdf, ps, other

    cs.CL

    Length-controllable Abstractive Summarization by Guiding with Summary Prototype

    Authors: Itsumi Saito, Kyosuke Nishida, Kosuke Nishida, Atsushi Otsuka, Hisako Asano, Junji Tomita, Hiroyuki Shindo, Yuji Matsumoto

    Abstract: We propose a new length-controllable abstractive summarization model. Recent state-of-the-art abstractive summarization models based on encoder-decoder models generate only one summary per source text. However, controllable summarization, especially of the length, is an important aspect for practical applications. Previous studies on length-controllable abstractive summarization incorporate length… ▽ More

    Submitted 20 January, 2020; originally announced January 2020.

  5. arXiv:1905.08511  [pdf, ps, other

    cs.CL

    Answering while Summarizing: Multi-task Learning for Multi-hop QA with Evidence Extraction

    Authors: Kosuke Nishida, Kyosuke Nishida, Masaaki Nagata, Atsushi Otsuka, Itsumi Saito, Hisako Asano, Junji Tomita

    Abstract: Question answering (QA) using textual sources for purposes such as reading comprehension (RC) has attracted much attention. This study focuses on the task of explainable multi-hop QA, which requires the system to return the answer with evidence sentences by reasoning and gathering disjoint pieces of the reference texts. It proposes the Query Focused Extractor (QFE) model for evidence extraction an… ▽ More

    Submitted 28 May, 2019; v1 submitted 21 May, 2019; originally announced May 2019.

    Comments: Accepted as a long paper at ACL 2019

  6. arXiv:1901.02262  [pdf, ps, other

    cs.CL

    Multi-style Generative Reading Comprehension

    Authors: Kyosuke Nishida, Itsumi Saito, Kosuke Nishida, Kazutoshi Shinoda, Atsushi Otsuka, Hisako Asano, Junji Tomita

    Abstract: This study tackles generative reading comprehension (RC), which consists of answering questions based on textual evidence and natural language generation (NLG). We propose a multi-style abstractive summarization model for question answering, called Masque. The proposed model has two key characteristics. First, unlike most studies on RC that have focused on extracting an answer span from the provid… ▽ More

    Submitted 27 May, 2019; v1 submitted 8 January, 2019; originally announced January 2019.

    Comments: Accepted as a long paper at ACL 2019

  7. Retrieve-and-Read: Multi-task Learning of Information Retrieval and Reading Comprehension

    Authors: Kyosuke Nishida, Itsumi Saito, Atsushi Otsuka, Hisako Asano, Junji Tomita

    Abstract: This study considers the task of machine reading at scale (MRS) wherein, given a question, a system first performs the information retrieval (IR) task of finding relevant passages in a knowledge source and then carries out the reading comprehension (RC) task of extracting an answer span from the passages. Previous MRS studies, in which the IR component was trained without considering answer spans,… ▽ More

    Submitted 31 August, 2018; originally announced August 2018.

    Comments: 10 pages, 6 figure. Accepted as a full paper at CIKM 2018

    Journal ref: CIKM 2018, October 22-26, 2018, Torino, Italy

  8. arXiv:1806.05328  [pdf, other

    cs.CR

    o-glasses: Visualizing x86 Code from Binary Using a 1d-CNN

    Authors: Yuhei Otsubo, Akira Otsuka, Mamoru Mimura, Takeshi Sakaki, Atsuhiro Goto

    Abstract: Malicious document files used in targeted attacks often contain a small program called shellcode. It is often hard to prepare a runnable environment for dynamic analysis of these document files because they exploit specific vulnerabilities. In these cases, it is necessary to identify the position of the shellcode in each document file to analyze it. If the exploit code uses executable scripts such… ▽ More

    Submitted 13 June, 2018; originally announced June 2018.

    Comments: 21 pages, 15 figures

    MSC Class: 94A99

  9. arXiv:1212.4195  [pdf, ps, other

    cs.CR

    Relations among Security Metrics for Template Protection Algorithms

    Authors: Manabu Inuma, Akira Otsuka

    Abstract: Many biometric template protection algorithms have been proposed mainly in two approaches: biometric feature transformation and biometric cryptosystem. Security evaluation of the proposed algorithms are often conducted in various inconsistent manner. Thus, it is strongly demanded to establish the common evaluation metrics for easier comparison among many algorithms. Simoens et al. and Nagar et al.… ▽ More

    Submitted 7 January, 2013; v1 submitted 17 December, 2012; originally announced December 2012.

  10. arXiv:0904.1284  [pdf, ps, other

    cs.CR cs.DS

    Theoretical framework for constructing matching algorithms in biometric authentication systems

    Authors: Manabu Inuma, Akira Otsuka, Hideki Imai

    Abstract: In this paper, we propose a theoretical framework to construct matching algorithms for any biometric authentication systems. Conventional matching algorithms are not necessarily secure against strong intentional impersonation attacks such as wolf attacks. The wolf attack is an attempt to impersonate a genuine user by presenting a "wolf" to a biometric authentication system without the knowledge… ▽ More

    Submitted 8 April, 2009; originally announced April 2009.