Skip to main content

Showing 1–21 of 21 results for author: Yamashita, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.13841  [pdf, other

    cs.LG cs.AI

    Integrating Wearable Sensor Data and Self-reported Diaries for Personalized Affect Forecasting

    Authors: Zhongqi Yang, Yuning Wang, Ken S. Yamashita, Maryam Sabah, Elahe Khatibi, Iman Azimi, Nikil Dutt, Jessica L. Borelli, Amir M. Rahmani

    Abstract: Emotional states, as indicators of affect, are pivotal to overall health, making their accurate prediction before onset crucial. Current studies are primarily centered on immediate short-term affect detection using data from wearable and mobile devices. These studies typically focus on objective sensory measures, often neglecting other forms of self-reported information like diaries and notes. In… ▽ More

    Submitted 23 March, 2024; v1 submitted 16 March, 2024; originally announced March 2024.

    Comments: Accepted by Connected Health: Applications, Systems and Engineering Technologies (CHASE) 2024

  2. arXiv:2312.04527  [pdf, other

    cs.CV

    Correspondences of the Third Kind: Camera Pose Estimation from Object Reflection

    Authors: Kohei Yamashita, Vincent Lepetit, Ko Nishino

    Abstract: Computer vision has long relied on two kinds of correspondences: pixel correspondences in images and 3D correspondences on object surfaces. Is there another kind, and if there is, what can they do for us? In this paper, we introduce correspondences of the third kind we call reflection correspondences and show that they can help estimate camera pose by just looking at objects without relying on the… ▽ More

    Submitted 7 December, 2023; originally announced December 2023.

  3. arXiv:2311.07110  [pdf, other

    eess.SY cs.CR cs.LG

    Adversarial Purification for Data-Driven Power System Event Classifiers with Diffusion Models

    Authors: Yuanbin Cheng, Koji Yamashita, Jim Follum, Nanpeng Yu

    Abstract: The global deployment of the phasor measurement units (PMUs) enables real-time monitoring of the power system, which has stimulated considerable research into machine learning-based models for event detection and classification. However, recent studies reveal that machine learning-based methods are vulnerable to adversarial attacks, which can fool the event classifiers by adding small perturbation… ▽ More

    Submitted 13 November, 2023; originally announced November 2023.

  4. arXiv:2310.17632  [pdf, other

    cs.CV

    DeepShaRM: Multi-View Shape and Reflectance Map Recovery Under Unknown Lighting

    Authors: Kohei Yamashita, Shohei Nobuhara, Ko Nishino

    Abstract: Geometry reconstruction of textureless, non-Lambertian objects under unknown natural illumination (i.e., in the wild) remains challenging as correspondences cannot be established and the reflectance cannot be expressed in simple analytical forms. We derive a novel multi-view method, DeepShaRM, that achieves state-of-the-art accuracy on this challenging task. Unlike past methods that formulate this… ▽ More

    Submitted 26 October, 2023; originally announced October 2023.

    Comments: 3DV 2024

  5. arXiv:2306.05698  [pdf, other

    cs.CR cs.LG

    JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its Application to Malicious Website Detection

    Authors: Chika Komiya, Naoto Yanai, Kyosuke Yamashita, Shingo Okamura

    Abstract: Machine learning is often used for malicious website detection, but an approach incorporating WebAssembly as a feature has not been explored due to a limited number of samples, to the best of our knowledge. In this paper, we propose JABBERWOCK (JAvascript-Based Binary EncodeR by WebAssembly Optimization paCKer), a tool to generate WebAssembly datasets in a pseudo fashion via JavaScript. Loosely sp… ▽ More

    Submitted 9 June, 2023; originally announced June 2023.

    Comments: Accepted in DCDS 2023 (co-located in DSN 2023)

  6. arXiv:2306.04250  [pdf, ps, other

    cs.CR cs.SE

    An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities in Ethereum Smart Contracts

    Authors: Chihiro Kado, Naoto Yanai, Jason Paul Cruz, Kyosuke Yamashita, Shingo Okamura

    Abstract: Vulnerabilities of Ethereum smart contracts often cause serious financial damage. Whereas the Solidity compiler has been updated to prevent vulnerabilities, its effectiveness has not been revealed so far, to the best of our knowledge. In this paper, we shed light on the impact of compiler versions of vulnerabilities of Ethereum smart contracts. To this end, we collected 503,572 contracts with Soli… ▽ More

    Submitted 7 June, 2023; originally announced June 2023.

  7. arXiv:2211.04972  [pdf, ps, other

    cs.RO

    Hibikino-Musashi@Home 2018 Team Description Paper

    Authors: Yutaro Ishida, Sansei Hori, Yuichiro Tanaka, Yuma Yoshimoto, Kouhei Hashimoto, Gouki Iwamoto, Yoshiya Aratani, Kenya Yamashita, Shinya Ishimoto, Kyosuke Hitaka, Fumiaki Yamaguchi, Ryuhei Miyoshi, Kentaro Honda, Yushi Abe, Yoshitaka Kato, Takashi Morie, Hakaru Tamukoh

    Abstract: Our team, Hibikino-Musashi@Home (the shortened name is HMA), was founded in 2010. It is based in the Kitakyushu Science and Research Park, Japan. We have participated in the RoboCup@Home Japan open competition open platform league every year since 2010. Moreover, we participated in the RoboCup 2017 Nagoya as open platform league and domestic standard platform league teams. Currently, the Hibikino-… ▽ More

    Submitted 9 November, 2022; originally announced November 2022.

    Comments: 8 pages, 5 figures, RoboCup@Home

  8. arXiv:2210.14204  [pdf, other

    eess.SY cs.LG

    pmuBAGE: The Benchmarking Assortment of Generated PMU Data for Power System Events

    Authors: Brandon Foggo, Koji Yamashita, Nanpeng Yu

    Abstract: This paper introduces pmuGE (phasor measurement unit Generator of Events), one of the first data-driven generative model for power system event data. We have trained this model on thousands of actual events and created a dataset denoted pmuBAGE (the Benchmarking Assortment of Generated PMU Events). The dataset consists of almost 1000 instances of labeled event data to encourage benchmark evaluatio… ▽ More

    Submitted 25 October, 2022; originally announced October 2022.

    Comments: 13 pages. arXiv admin note: substantial text overlap with arXiv:2204.01095

  9. arXiv:2207.11876  [pdf, other

    cs.CV

    nLMVS-Net: Deep Non-Lambertian Multi-View Stereo

    Authors: Kohei Yamashita, Yuto Enyo, Shohei Nobuhara, Ko Nishino

    Abstract: We introduce a novel multi-view stereo (MVS) method that can simultaneously recover not just per-pixel depth but also surface normals, together with the reflectance of textureless, complex non-Lambertian surfaces captured under known but natural illumination. Our key idea is to formulate MVS as an end-to-end learnable network, which we refer to as nLMVS-Net, that seamlessly integrates radiometric… ▽ More

    Submitted 10 November, 2022; v1 submitted 24 July, 2022; originally announced July 2022.

    Comments: Accepted to WACV 2023

  10. arXiv:2204.01095  [pdf, other

    cs.LG

    pmuBAGE: The Benchmarking Assortment of Generated PMU Data for Power System Events -- Part I: Overview and Results

    Authors: Brandon Foggo, Koji Yamashita, Nanpeng Yu

    Abstract: We present pmuGE (phasor measurement unit Generator of Events), one of the first data-driven generative model for power system event data. We have trained this model on thousands of actual events and created a dataset denoted pmuBAGE (the Benchmarking Assortment of Generated PMU Events). The dataset consists of almost 1000 instances of labeled event data to encourage benchmark evaluations on phaso… ▽ More

    Submitted 3 April, 2022; originally announced April 2022.

  11. arXiv:2112.06695  [pdf, other

    cs.NI eess.SP

    Bi-directional Beamforming Feedback-based Firmware-agnostic WiFi Sensing: An Empirical Study

    Authors: S. Kondo, S. Itahara, K. Yamashita, K. Yamamoto, Y. Koda, T. Nishio, A. Taya

    Abstract: In the field of WiFi sensing, as an alternative sensing source of the channel state information (CSI) matrix, the use of a beamforming feedback matrix (BFM)that is a right singular matrix of the CSI matrix has attracted significant interest owing to its wide availability regarding the underlying WiFi systems. In the IEEE 802.11ac/ax standard, the station (STA) transmits a BFM to an access point (A… ▽ More

    Submitted 27 February, 2022; v1 submitted 13 December, 2021; originally announced December 2021.

    Comments: 10 pages, 7 figures

  12. arXiv:2112.02213  [pdf, other

    cs.CR

    Node-wise Hardware Trojan Detection Based on Graph Learning

    Authors: Kento Hasegawa, Kazuki Yamashita, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa

    Abstract: In the fourth industrial revolution, securing the protection of the supply chain has become an ever-growing concern. One such cyber threat is a hardware Trojan (HT), a malicious modification to an IC. HTs are often identified in the hardware manufacturing process, but should be removed earlier, when the design is being specified. Machine learning-based HT detection in gate-level netlists is an eff… ▽ More

    Submitted 15 March, 2022; v1 submitted 3 December, 2021; originally announced December 2021.

  13. Frame-Capture-Based CSI Recomposition Pertaining to Firmware-Agnostic WiFi Sensing

    Authors: Ryosuke Hanahara, Sohei Itahara, Kota Yamashita, Yusuke Koda, Akihito Taya, Takayuki Nishio, Koji Yamamoto

    Abstract: With regard to the implementation of WiFi sensing agnostic according to the availability of channel state information (CSI), we investigate the possibility of estimating a CSI matrix based on its compressed version, which is known as beamforming feedback matrix (BFM). Being different from the CSI matrix that is processed and discarded in physical layer components, the BFM can be captured using a m… ▽ More

    Submitted 29 October, 2021; originally announced October 2021.

    Journal ref: Proc. IEEE 19th Annual Consumer Communications & Networking Conference (CCNC 2022)

  14. arXiv:2110.14211  [pdf, other

    eess.SP cs.NI

    Beamforming Feedback-based Model-Driven Angle of Departure Estimation Toward Legacy Support in WiFi Sensing: An Experimental Study

    Authors: Sohei Itahara, Sota Kondo, Kota Yamashita, Takayuki Nishio, Koji Yamamoto, Yusuke Koda

    Abstract: This study experimentally validated the possibility of angle of departure (AoD) estimation using multiple signal classification (MUSIC) with only WiFi control frames for beamforming feedback (BFF), defined in IEEE 802.11ac/ax. The examined BFF-based MUSIC is a model-driven algorithm, which does not require a pre-obtained database. This contrasts with most existing BFF-based sensing techniques, whi… ▽ More

    Submitted 2 February, 2022; v1 submitted 27 October, 2021; originally announced October 2021.

    Comments: Submitted to IEEE Access

  15. arXiv:2005.11054  [pdf

    cs.DC

    Reasonableness discussion and analysis for Hyperledger Fabric configuration

    Authors: Song Hua, Shenbin Zhang, Bingfeng Pi, Jun Sun, Kazuhiro Yamashita, Yoshihide Nomura

    Abstract: Blockchain, as a distributed ledger technology, becomes more and more popular in both industry and academia. Each peer in blockchain system maintains a copy of ledger and makes sure of data consistency through consensus protocol. Blockchain system can provide many benefits such as immutability, transparency and security. Hyperledger Fabric is permissioned blockchain platform hosted by Linux founda… ▽ More

    Submitted 22 May, 2020; originally announced May 2020.

    Comments: 8 pages, 5 figures

  16. arXiv:2004.08381  [pdf, ps, other

    cs.DS cs.DM

    Enumerating Chemical Graphs with Two Disjoint Cycles Satisfying Given Path Frequency Specifications

    Authors: Kyousuke Yamashita, Ryuji Masui, Xiang Zhou, Chenxi Wang, Aleksandar Shurbevski, Hiroshi Nagamochi, Tatsuya Akutsu

    Abstract: Enumerating chemical graphs satisfying given constraints is a fundamental problem in mathematical and computational chemistry, and plays an essential part in a recently proposed framework for the inverse QSAR/QSPR. In this paper, constraints are given by feature vectors each of which consists of the frequencies of paths in a given set of paths. We consider the problem of enumerating chemical graph… ▽ More

    Submitted 18 April, 2020; originally announced April 2020.

    Comments: arXiv admin note: text overlap with arXiv:2004.06367

  17. arXiv:2003.10094  [pdf, other

    cs.NI eess.SP

    Penalized and Decentralized Contextual Bandit Learning for WLAN Channel Allocation with Contention-Driven Feature Extraction

    Authors: Kota Yamashita, Shotaro Kamiya, Koji Yamamoto, Yusuke Koda, Takayuki Nishio, Masahiro Morikura

    Abstract: In this study, a contextual multi-armed bandit (CMAB)-based decentralized channel exploration framework disentangling a channel utility function (i.e., reward) with respect to contending neighboring access points (APs) is proposed. The proposed framework enables APs to evaluate observed rewards compositionally for contending APs, allowing both robustness against reward fluctuation due to neighbori… ▽ More

    Submitted 1 December, 2021; v1 submitted 23 March, 2020; originally announced March 2020.

    Comments: 12 pages, 6 figures, 3 Tables

  18. arXiv:1912.04663  [pdf, other

    cs.CV

    3D-GMNet: Single-View 3D Shape Recovery as A Gaussian Mixture

    Authors: Kohei Yamashita, Shohei Nobuhara, Ko Nishino

    Abstract: In this paper, we introduce 3D-GMNet, a deep neural network for 3D object shape reconstruction from a single image. As the name suggests, 3D-GMNet recovers 3D shape as a Gaussian mixture. In contrast to voxels, point clouds, or meshes, a Gaussian mixture representation provides an analytical expression with a small memory footprint while accurately representing the target 3D shape. At the same tim… ▽ More

    Submitted 15 August, 2020; v1 submitted 10 December, 2019; originally announced December 2019.

    Comments: BMVC 2020

  19. arXiv:1912.04526  [pdf

    cs.DC cs.NI

    Ledgerdata Refiner: A Powerful Ledger Data Query Platform for Hyperledger Fabric

    Authors: Ence Zhou, Haoli Sun, Bingfeng Pi, Jun Sun, Kazuhiro Yamashita, Yoshihide Nomura

    Abstract: Blockchain is one of the most popular distributed ledger technologies. It can solve the trust issue among enterprises. Hyperledger Fabric is a permissioned blockchain aiming at enterprise-grade business applications. However, compared to traditional distributed database solutions, one issue of blockchain based application development is the limited data access. For Fabric, the ledger data can only… ▽ More

    Submitted 10 December, 2019; originally announced December 2019.

    Comments: 8 pages, 12 figures, 2 tables

  20. Impact Assessment of Hypothesized Cyberattacks on Interconnected Bulk Power Systems

    Authors: Chee-Wooi Ten, Koji Yamashita, Zhiyuan Yang, Athanasios V. Vasilakos, Andrew Ginter

    Abstract: The first-ever Ukraine cyberattack on power grid has proven its devastation by hacking into their critical cyber assets. With administrative privileges accessing substation networks/local control centers, one intelligent way of coordinated cyberattacks is to execute a series of disruptive switching executions on multiple substations using compromised supervisory control and data acquisition (SCADA… ▽ More

    Submitted 3 January, 2018; originally announced January 2018.

  21. arXiv:0805.0889  [pdf

    cs.OH

    In-Plane Bistable Nanowire For Memory Devices

    Authors: B. Charlot, W. Sun, K. Yamashita, H. Fujita, H. Toshiyoshi

    Abstract: We present a nanomechanical device design to be used in a non-volatile mechanical memory point. The structure is composed of a suspended slender nanowire (width : 100nm, thickness 430nm length : 8 to 30$μ$m) clamped at its both ends. Electrodes are placed on each sides of the nanowire and are used to actuate the structure (writing, erasing) and to measure the position through a capactive bridge… ▽ More

    Submitted 7 May, 2008; originally announced May 2008.

    Comments: Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/handle/2042/16838)

    Journal ref: Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2008, Nice : France (2008)