Zum Hauptinhalt springen

Showing 1–17 of 17 results for author: Esaki, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.11308  [pdf, other

    cs.LG cs.DC

    Detection of Global Anomalies on Distributed IoT Edges with Device-to-Device Communication

    Authors: Hideya Ochiai, Riku Nishihata, Eisuke Tomiyama, Yuwei Sun, Hiroshi Esaki

    Abstract: Anomaly detection is an important function in IoT applications for finding outliers caused by abnormal events. Anomaly detection sometimes comes with high-frequency data sampling which should be carried out at Edge devices rather than Cloud. In this paper, we consider the case that multiple IoT devices are installed in a single remote site and that they collaboratively detect anomalies from the ob… ▽ More

    Submitted 15 July, 2024; originally announced July 2024.

    Comments: 6 pages, 3 figures, ACM MobiHoc AIoT 2023 (accepted)

  2. arXiv:2407.08384  [pdf, other

    cs.RO cs.CV

    Accurate Cooperative Localization Utilizing LiDAR-equipped Roadside Infrastructure for Autonomous Driving

    Authors: Yuze Jiang, Ehsan Javanmardi, Manabu Tsukada, Hiroshi Esaki

    Abstract: Recent advancements in LiDAR technology have significantly lowered costs and improved both its precision and resolution, thereby solidifying its role as a critical component in autonomous vehicle localization. Using sophisticated 3D registration algorithms, LiDAR now facilitates vehicle localization with centimeter-level accuracy. However, these high-precision techniques often face reliability cha… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

    Comments: Accepted by IEEE Intelligent Transportation Systems Conference (ITSC) 2024

  3. arXiv:2403.14020  [pdf, other

    cs.CR cs.NI

    Zero-Knowledge Proof of Distinct Identity: a Standard-compatible Sybil-resistant Pseudonym Extension for C-ITS

    Authors: Ye Tao, Hongyi Wu, Ehsan Javanmardi, Manabu Tsukada, Hiroshi Esaki

    Abstract: Pseudonyms are widely used in Cooperative Intelligent Transport Systems (C-ITS) to protect the location privacy of vehicles. However, the unlinkability nature of pseudonyms also enables Sybil attacks, where a malicious vehicle can pretend to be multiple vehicles at the same time. In this paper, we propose a novel protocol called zero-knowledge Proof of Distinct Identity (zk-PoDI,) which allows a v… ▽ More

    Submitted 3 May, 2024; v1 submitted 20 March, 2024; originally announced March 2024.

    Comments: Accepted for publication at IEEE IV 2024

  4. arXiv:2312.07948  [pdf, other

    cs.NI cs.CR

    Zero-Knowledge Proof of Traffic: A Deterministic and Privacy-Preserving Cross Verification Mechanism for Cooperative Perception Data

    Authors: Ye Tao, Ehsan Javanmardi, Pengfei Lin, Jin Nakazato, Yuze Jiang, Manabu Tsukada, Hiroshi Esaki

    Abstract: Cooperative perception is crucial for connected automated vehicles in intelligent transportation systems (ITSs); however, ensuring the authenticity of perception data remains a challenge as the vehicles cannot verify events that they do not witness independently. Various studies have been conducted on establishing the authenticity of data, such as trust-based statistical methods and plausibility-b… ▽ More

    Submitted 13 December, 2023; originally announced December 2023.

  5. Roadside LiDAR Assisted Cooperative Localization for Connected Autonomous Vehicles

    Authors: Yuze Jiang, Ehsan Javanmardi, Jin Nakazato, Manabu Tsukada, Hiroshi Esaki

    Abstract: Advancements in LiDAR technology have led to more cost-effective production while simultaneously improving precision and resolution. As a result, LiDAR has become integral to vehicle localization, achieving centimeter-level accuracy through techniques like Normal Distributions Transform (NDT) and other advanced 3D registration algorithms. Nonetheless, these approaches are reliant on high-definitio… ▽ More

    Submitted 11 July, 2024; v1 submitted 14 November, 2023; originally announced November 2023.

    Comments: Accepted by 2023 International Conference on Intelligent Computing and its Emerging Applications

  6. arXiv:2306.05738  [pdf, other

    cs.NI

    Flowsim: A Modular Simulation Platform for Microscopic Behavior Analysis of City-Scale Connected Autonomous Vehicles

    Authors: Ye Tao, Ehsan Javanmardi, Jin Nakazato, Manabu Tsukada, Hiroshi Esaki

    Abstract: As connected autonomous vehicles (CAVs) become increasingly prevalent, there is a growing need for simulation platforms that can accurately evaluate CAV behavior in large-scale environments. In this paper, we propose Flowsim, a novel simulator specifically designed to meet these requirements. Flowsim offers a modular and extensible architecture that enables the analysis of CAV behaviors in large-s… ▽ More

    Submitted 9 June, 2023; originally announced June 2023.

  7. arXiv:2211.07875  [pdf, other

    cs.NI cs.CR

    zk-PoT: Zero-Knowledge Proof of Traffic for Privacy Enabled Cooperative Perception

    Authors: Ye Tao, Yuze Jiang, Pengfei Lin, Manabu Tsukada, Hiroshi Esaki

    Abstract: Cooperative perception is an essential and widely discussed application of connected automated vehicles. However, the authenticity of perception data is not ensured, because the vehicles cannot independently verify the event they did not see. Many methods, including trust-based (i.e., statistical) approaches and plausibility-based methods, have been proposed to determine data authenticity. However… ▽ More

    Submitted 14 November, 2022; originally announced November 2022.

    Comments: IEEE Consumer Communications & Networking Conference (CCNC) 2023

  8. arXiv:2211.03489  [pdf, other

    cs.LG cs.CR cs.NI

    Resilience of Wireless Ad Hoc Federated Learning against Model Poisoning Attacks

    Authors: Naoya Tezuka, Hideya Ochiai, Yuwei Sun, Hiroshi Esaki

    Abstract: Wireless ad hoc federated learning (WAFL) is a fully decentralized collaborative machine learning framework organized by opportunistically encountered mobile nodes. Compared to conventional federated learning, WAFL performs model training by weakly synchronizing the model parameters with others, and this shows great resilience to a poisoned model injected by an attacker. In this paper, we provide… ▽ More

    Submitted 7 November, 2022; originally announced November 2022.

    Comments: 10 pages, 7 figures, to be published in IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications 2022

  9. arXiv:2205.11779  [pdf, other

    cs.LG cs.AI cs.NI

    Wireless Ad Hoc Federated Learning: A Fully Distributed Cooperative Machine Learning

    Authors: Hideya Ochiai, Yuwei Sun, Qingzhe Jin, Nattanon Wongwiwatchai, Hiroshi Esaki

    Abstract: Privacy-sensitive data is stored in autonomous vehicles, smart devices, or sensor nodes that can move around with making opportunistic contact with each other. Federation among such nodes was mainly discussed in the context of federated learning with a centralized mechanism in many works. However, because of multi-vendor issues, those nodes do not want to rely on a specific server operated by a th… ▽ More

    Submitted 7 October, 2022; v1 submitted 24 May, 2022; originally announced May 2022.

    Comments: 14 pages, 8 figures, 2 tables

  10. WebRTC-based measurement tool for peer-to-peer applications and preliminary findings with real users

    Authors: Kosuke Nakagawa, Manabu Tsukada, Keiichi Shima, Hiroshi Esaki

    Abstract: Direct peer-to-peer (P2P) communication is often used to minimize the end-to-end latency for real-time applications that require accurate synchronization, such as remote musical ensembles. However, there are few studies on the performance of P2P communication between home network environments, thus hindering the deployment of services that require synchronization. In this study, we developed a P2P… ▽ More

    Submitted 3 December, 2021; originally announced December 2021.

    Comments: Accepted to 16th Asian Internet Engineering Conference (AINTEC), 2021

  11. arXiv:2112.02161  [pdf, other

    cs.NI

    MAC address randomization tolerant crowd monitoring system using Wi-Fi packets

    Authors: Yuyi Cai, Manabu Tsukada, Hideya Ochiai, Hiroshi Esaki

    Abstract: Media access control (MAC) addresses inside Wi-Fi packets can be used for beneficial activities such as crowdedness estimation, marketing, and hazard maps. However, the MAC address randomization systems introduced around 2014 make all conventional MAC-address-based crowd monitoring systems count the same device more than once. Therefore, there is a need to create a new crowd monitoring system tole… ▽ More

    Submitted 3 December, 2021; originally announced December 2021.

    Comments: Accepted to 16th Asian Internet Engineering Conference (AINTEC), 2021

  12. arXiv:2111.03461  [pdf, other

    cs.CR cs.NI

    Misbehavior Detection Using Collective Perception under Privacy Considerations

    Authors: Manabu Tsukada, Shimpei Arii, Hideya Ochiai, Hiroshi Esaki

    Abstract: In cooperative ITS, security and privacy protection are essential. Cooperative Awareness Message (CAM) is a basic V2V message standard, and misbehavior detection is critical for protection against attacking CAMs from the inside system, in addition to node authentication by Public Key Infrastructure (PKI). On the contrary, pseudonym IDs, which have been introduced to protect privacy from tracking,… ▽ More

    Submitted 2 November, 2021; originally announced November 2021.

    Comments: Accepted to 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC)

  13. arXiv:2110.11106  [pdf, other

    cs.CV cs.LG

    Reinforcement Learning Based Optimal Camera Placement for Depth Observation of Indoor Scenes

    Authors: Yichuan Chen, Manabu Tsukada, Hiroshi Esaki

    Abstract: Exploring the most task-friendly camera setting -- optimal camera placement (OCP) problem -- in tasks that use multiple cameras is of great importance. However, few existing OCP solutions specialize in depth observation of indoor scenes, and most versatile solutions work offline. To this problem, an OCP online solution to depth observation of indoor scenes based on reinforcement learning is propos… ▽ More

    Submitted 21 October, 2021; originally announced October 2021.

    Comments: Accepted to IEEE International Conference on Networking, Sensing and Control (ICNSC) 2021

  14. arXiv:2108.09062  [pdf

    cs.CR

    Suspicious ARP Activity Detection and Clustering Based on Autoencoder Neural Networks

    Authors: Yuwei Sun, Hideya Ochiai, Hiroshi Esaki

    Abstract: The rapidly increasing number of smart devices on the Internet necessitates an efficient inspection system for safeguarding our networks from suspicious activities such as Address Resolution Protocol (ARP) probes. In this research, we analyze sequence data of ARP traffic on LAN based on the numerical count and degree of its packets. Moreover, a dynamic threshold is employed to detect underlying su… ▽ More

    Submitted 20 August, 2021; originally announced August 2021.

    Comments: 5 pages, 7 figures, submitted to 2022 IEEE Consumer Communications & Networking Conference

    ACM Class: C.2.0; I.5.4

  15. Decentralized Deep Learning for Multi-Access Edge Computing: A Survey on Communication Efficiency and Trustworthiness

    Authors: Yuwei Sun, Hideya Ochiai, Hiroshi Esaki

    Abstract: Wider coverage and a better solution to a latency reduction in 5G necessitate its combination with multi-access edge computing (MEC) technology. Decentralized deep learning (DDL) such as federated learning and swarm learning as a promising solution to privacy-preserving data processing for millions of smart edge devices, leverages distributed computing of multi-layer neural networks within the net… ▽ More

    Submitted 6 December, 2021; v1 submitted 30 July, 2021; originally announced August 2021.

    Comments: 11 pages, 8 figures, to appear in IEEE Transactions on Artificial Intelligence

    ACM Class: I.2.11

    Journal ref: IEEE Transactions on Artificial Intelligence (2021)

  16. arXiv:2107.06627  [pdf, other

    cs.RO

    AutoMCM: Maneuver Coordination Service with Abstracted Functions for Autonomous Driving

    Authors: Masaya Mizutani, Manabu Tsukada, Hiroshi Esaki

    Abstract: A cooperative intelligent transport system (C-ITS) uses vehicle-to-everything (V2X) technology to make self-driving vehicles safer and more efficient. Current C-ITS applications have mainly focused on real-time information sharing, such as for cooperative perception. In addition to better real-time perception, self-driving vehicles need to achieve higher safety and efficiency by coordinating actio… ▽ More

    Submitted 14 July, 2021; originally announced July 2021.

    Comments: Accepted to 24th IEEE International Conference on Intelligent Transportation (ITSC) 2021

  17. Software Defined Media: Virtualization of Audio-Visual Services

    Authors: Manabu Tsukada, Keiko Ogawa, Masahiro Ikeda, Takuro Sone, Kenta Niwa, Shoichiro Saito, Takashi Kasuya, Hideki Sunahara, Hiroshi Esaki

    Abstract: Internet-native audio-visual services are witnessing rapid development. Among these services, object-based audio-visual services are gaining importance. In 2014, we established the Software Defined Media (SDM) consortium to target new research areas and markets involving object-based digital media and Internet-by-design audio-visual environments. In this paper, we introduce the SDM architecture th… ▽ More

    Submitted 23 February, 2017; originally announced February 2017.

    Comments: IEEE International Conference on Communications (ICC2017), Paris, France, 21-25 May 2017