Skip to main content

Showing 1–13 of 13 results for author: Sugawara, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.13096  [pdf, other

    cs.MA cs.AI cs.LG

    Reducing Redundant Computation in Multi-Agent Coordination through Locally Centralized Execution

    Authors: Yidong Bai, Toshiharu Sugawara

    Abstract: In multi-agent reinforcement learning, decentralized execution is a common approach, yet it suffers from the redundant computation problem. This occurs when multiple agents redundantly perform the same or similar computation due to overlap** observations. To address this issue, this study introduces a novel method referred to as locally centralized team transformer (LCTT). LCTT establishes a loc… ▽ More

    Submitted 19 April, 2024; originally announced April 2024.

    Comments: 6 pages, 5 figures, Under review

  2. arXiv:2404.11815  [pdf, other

    cs.CR

    AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management

    Authors: Jennifer Sheldon, Weidong Zhu, Adnan Abdullah, Sri Hrushikesh Varma Bhupathiraju, Takeshi Sugawara, Kevin R. B. Butler, Md Jahidul Islam, Sara Rampazzi

    Abstract: Underwater datacenters (UDCs) hold promise as next-generation data storage due to their energy efficiency and environmental sustainability benefits. While the natural cooling properties of water save power, the isolated aquatic environment and long-range sound propagation in water create unique vulnerabilities which differ from those of on-land data centers. Our research discovers the unique vulne… ▽ More

    Submitted 7 May, 2024; v1 submitted 17 April, 2024; originally announced April 2024.

    Comments: Accepted to IEEE S&P 2024

  3. Invisible Reflections: Leveraging Infrared Laser Reflections to Target Traffic Sign Perception

    Authors: Takami Sato, Sri Hrushikesh Varma Bhupathiraju, Michael Clifford, Takeshi Sugawara, Qi Alfred Chen, Sara Rampazzi

    Abstract: All vehicles must follow the rules that govern traffic behavior, regardless of whether the vehicles are human-driven or Connected Autonomous Vehicles (CAVs). Road signs indicate locally active rules, such as speed limits and requirements to yield or stop. Recent research has demonstrated attacks, such as adding stickers or projected colored patches to signs, that cause CAV misinterpretation, resul… ▽ More

    Submitted 7 January, 2024; originally announced January 2024.

    Comments: The first two authors are co-first. Accepted to NDSS '24

  4. arXiv:2310.04805  [pdf, other

    cs.SI cs.AI cs.GT cs.MA

    User's Position-Dependent Strategies in Consumer-Generated Media with Monetary Rewards

    Authors: Shintaro Ueki, Fujio Toriumi, Toshiharu Sugawara

    Abstract: Numerous forms of consumer-generated media (CGM), such as social networking services (SNS), are widely used. Their success relies on users' voluntary participation, often driven by psychological rewards like recognition and connection from reactions by other users. Furthermore, a few CGM platforms offer monetary rewards to users, serving as incentives for sharing items such as articles, images, an… ▽ More

    Submitted 7 October, 2023; originally announced October 2023.

    Comments: Accepted to The 2023 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2023), 9 pages, 6 figures, 2 tables

    ACM Class: I.2.11; J.4

  5. arXiv:2306.00492  [pdf, other

    cs.SI cs.AI cs.GT cs.MA

    Effect of Monetary Reward on Users' Individual Strategies Using Co-Evolutionary Learning

    Authors: Shintaro Ueki, Fujio Toriumi, Toshiharu Sugawara

    Abstract: Consumer generated media (CGM), such as social networking services rely on the voluntary activity of users to prosper, garnering the psychological rewards of feeling connected with other people through comments and reviews received online. To attract more users, some CGM have introduced monetary rewards (MR) for posting activity and quality articles and comments. However, the impact of MR on the a… ▽ More

    Submitted 1 June, 2023; originally announced June 2023.

    Comments: Accepted to 9th International Conference on Computational Social Science (IC2S2 2023) 5 figures, 3 tables, 4 pages

    ACM Class: I.2.11; J.4

  6. arXiv:2304.10375  [pdf, other

    cs.LG cs.AI cs.MA

    Interpretability for Conditional Coordinated Behavior in Multi-Agent Reinforcement Learning

    Authors: Yoshinari Motokawa, Toshiharu Sugawara

    Abstract: We propose a model-free reinforcement learning architecture, called distributed attentional actor architecture after conditional attention (DA6-X), to provide better interpretability of conditional coordinated behaviors. The underlying principle involves reusing the saliency vector, which represents the conditional states of the environment, such as the global position of agents. Hence, agents wit… ▽ More

    Submitted 20 April, 2023; originally announced April 2023.

    Comments: Accepted to The 2023 International Joint Conference on Neural Networks (IJCNN 2023)

  7. arXiv:2302.09250  [pdf, ps, other

    cs.MA cs.RO

    Distributed Planning with Asynchronous Execution with Local Navigation for Multi-agent Pickup and Delivery Problem

    Authors: Yuki Miyashita, Tomoki Yamauchi, Toshiharu Sugawara

    Abstract: We propose a distributed planning method with asynchronous execution for multi-agent pickup and delivery (MAPD) problems for environments with occasional delays in agents' activities and flexible endpoints. MAPD is a crucial problem framework with many applications; however, most existing studies assume ideal agent behaviors and environments, such as a fixed speed of agents, synchronized movements… ▽ More

    Submitted 18 February, 2023; originally announced February 2023.

    Comments: 11 pages, 12 figures. Accepted in AAMAS 2023 (The 22nd International Conference on Autonomous Agents and Multiagent Systems)

    ACM Class: I.2.11

  8. arXiv:2210.09482  [pdf, other

    cs.CR

    You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous Vehicles Driving Frameworks

    Authors: Yulong Cao, S. Hrushikesh Bhupathiraju, Pirouz Naghavi, Takeshi Sugawara, Z. Morley Mao, Sara Rampazzi

    Abstract: Autonomous Vehicles (AVs) increasingly use LiDAR-based object detection systems to perceive other vehicles and pedestrians on the road. While existing attacks on LiDAR-based autonomous driving architectures focus on lowering the confidence score of AV object detection models to induce obstacle misdetection, our research discovers how to leverage laser-based spoofing techniques to selectively remov… ▽ More

    Submitted 27 October, 2022; v1 submitted 17 October, 2022; originally announced October 2022.

    Comments: Accepted to the 32nd USENIX Security Symposium (2023)

  9. arXiv:2205.12504  [pdf, other

    cs.MA cs.AI

    Deadlock-Free Method for Multi-Agent Pickup and Delivery Problem Using Priority Inheritance with Temporary Priority

    Authors: Yukita Fujitani, Tomoki Yamauchi, Yuki Miyashita, Toshiharu Sugawara

    Abstract: This paper proposes a control method for the multi-agent pickup and delivery problem (MAPD problem) by extending the priority inheritance with backtracking (PIBT) method to make it applicable to more general environments. PIBT is an effective algorithm that introduces a priority to each agent, and at each timestep, the agents, in descending order of priority, decide their next neighboring location… ▽ More

    Submitted 25 May, 2022; originally announced May 2022.

    Comments: The paper was accepted at 26th International Conference on Knowledge-Based and Intelligent Information & Engineering Systems (KES 2022)

  10. arXiv:2205.09705  [pdf, other

    cs.AI

    Distributed Multi-Agent Deep Reinforcement Learning for Robust Coordination against Noise

    Authors: Yoshinari Motokawa, Toshiharu Sugawara

    Abstract: In multi-agent systems, noise reduction techniques are important for improving the overall system reliability as agents are required to rely on limited environmental information to develop cooperative and coordinated behaviors with the surrounding agents. However, previous studies have often applied centralized noise reduction methods to build robust and versatile coordination in noisy multi-agent… ▽ More

    Submitted 19 May, 2022; originally announced May 2022.

    Comments: Accepted to The 2022 International Joint Conference on Neural Networks (IJCNN 2022)

  11. arXiv:2201.06014  [pdf, other

    cs.MA cs.AI cs.RO

    Standby-Based Deadlock Avoidance Method for Multi-Agent Pickup and Delivery Tasks

    Authors: Tomoki Yamauchi, Yuki Miyashita, Toshiharu Sugawara

    Abstract: The multi-agent pickup and delivery (MAPD) problem, in which multiple agents iteratively carry materials without collisions, has received significant attention. However, many conventional MAPD algorithms assume a specifically designed grid-like environment, such as an automated warehouse. Therefore, they have many pickup and delivery locations where agents can stay for a lengthy period, as well as… ▽ More

    Submitted 18 January, 2022; v1 submitted 16 January, 2022; originally announced January 2022.

    Comments: Extended version of paper accepted at AAMAS 2022

  12. arXiv:2108.08972  [pdf, other

    cs.LG cs.CR eess.SP

    Application of Adversarial Examples to Physical ECG Signals

    Authors: Taiga Ono, Takeshi Sugawara, Jun Sakuma, Tatsuya Mori

    Abstract: This work aims to assess the reality and feasibility of the adversarial attack against cardiac diagnosis system powered by machine learning algorithms. To this end, we introduce adversarial beats, which are adversarial perturbations tailored specifically against electrocardiograms (ECGs) beat-by-beat classification system. We first formulate an algorithm to generate adversarial examples for the EC… ▽ More

    Submitted 19 August, 2021; originally announced August 2021.

  13. arXiv:2006.11946  [pdf, other

    cs.CR

    Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems

    Authors: Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, Kevin Fu

    Abstract: We propose a new class of signal injection attacks on microphones by physically converting light to sound. We show how an attacker can inject arbitrary audio signals to a target microphone by aiming an amplitude-modulated light at the microphone's aperture. We then proceed to show how this effect leads to a remote voice-command injection attack on voice-controllable systems. Examining various prod… ▽ More

    Submitted 21 June, 2020; originally announced June 2020.