Zum Hauptinhalt springen

Showing 1–18 of 18 results for author: Fukuda, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.14895  [pdf, ps, other

    cs.AI cs.CL cs.CV

    VHAKG: A Multi-modal Knowledge Graph Based on Synchronized Multi-view Videos of Daily Activities

    Authors: Shusaku Egami, Takahiro Ugai, Swe Nwe Nwe Htun, Ken Fukuda

    Abstract: Multi-modal knowledge graphs (MMKGs), which ground various non-symbolic data (e.g., images and videos) into symbols, have attracted attention as resources enabling knowledge processing and machine learning across modalities. However, the construction of MMKGs for videos consisting of multiple events, such as daily activities, is still in the early stages. In this paper, we construct an MMKG based… ▽ More

    Submitted 27 August, 2024; v1 submitted 27 August, 2024; originally announced August 2024.

    Comments: 5 pages, 4 figures, accepted by CIKM2024 Resource Track

    MSC Class: 68T30 ACM Class: I.2.4; H.5.1

  2. arXiv:2408.11347  [pdf, other

    cs.AI

    Multimodal Datasets and Benchmarks for Reasoning about Dynamic Spatio-Temporality in Everyday Environments

    Authors: Takanori Ugai, Kensho Hara, Shusaku Egami, Ken Fukuda

    Abstract: We used a 3D simulator to create artificial video data with standardized annotations, aiming to aid in the development of Embodied AI. Our question answering (QA) dataset measures the extent to which a robot can understand human behavior and the environment in a home setting. Preliminary experiments suggest our dataset is useful in measuring AI's comprehension of daily life. \end{abstract}

    Submitted 21 August, 2024; originally announced August 2024.

    Comments: 5 pages, 1 figure, 1 table

  3. arXiv:2407.07456  [pdf, other

    cs.CR

    GothX: a generator of customizable, legitimate and malicious IoT network traffic

    Authors: Manuel Poisson, Rodrigo Carnier, Kensuke Fukuda

    Abstract: In recent years, machine learning-based anomaly detection (AD) has become an important measure against security threats from Internet of Things (IoT) networks. Machine learning (ML) models for network traffic AD require datasets to be trained, evaluated and compared. Due to the necessity of realistic and up-to-date representation of IoT security threats, new datasets need to be constantly generate… ▽ More

    Submitted 24 July, 2024; v1 submitted 10 July, 2024; originally announced July 2024.

    Journal ref: CSET - 17th Cyber Security Experimentation and Test Workshop, Aug 2024, Philadelphia, United States. pp.1-9, \&\#x27E8;10.1145/3675741.3675753\&\#x27E9

  4. arXiv:2405.18674  [pdf, other

    cs.LG physics.ao-ph physics.data-an

    Deep Bayesian Filter for Bayes-faithful Data Assimilation

    Authors: Yuta Tarumi, Keisuke Fukuda, Shin-ichi Maeda

    Abstract: State estimation for nonlinear state space models is a challenging task. Existing assimilation methodologies predominantly assume Gaussian posteriors on physical space, where true posteriors become inevitably non-Gaussian. We propose Deep Bayesian Filtering (DBF) for data assimilation on nonlinear state space models (SSMs). DBF constructs new latent variables $h_t$ on a new latent (``fancy'') spac… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

    Comments: Main text 9 pages

  5. arXiv:2405.17251  [pdf, other

    cs.CV

    GenWarp: Single Image to Novel Views with Semantic-Preserving Generative Warping

    Authors: Junyoung Seo, Kazumi Fukuda, Takashi Shibuya, Takuya Narihira, Naoki Murata, Shoukang Hu, Chieh-Hsin Lai, Seungryong Kim, Yuki Mitsufuji

    Abstract: Generating novel views from a single image remains a challenging task due to the complexity of 3D scenes and the limited diversity in the existing multi-view datasets to train a model on. Recent research combining large-scale text-to-image (T2I) models with monocular depth estimation (MDE) has shown promise in handling in-the-wild images. In these methods, an input view is geometrically warped to… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

    Comments: Project page: https://GenWarp-NVS.github.io

  6. arXiv:2401.14743  [pdf, ps, other

    cs.AI

    Synthetic Multimodal Dataset for Empowering Safety and Well-being in Home Environments

    Authors: Takanori Ugai, Shusaku Egami, Swe Nwe Nwe Htun, Kouji Kozaki, Takahiro Kawamura, Ken Fukuda

    Abstract: This paper presents a synthetic multimodal dataset of daily activities that fuses video data from a 3D virtual space simulator with knowledge graphs depicting the spatiotemporal context of the activities. The dataset is developed for the Knowledge Graph Reasoning Challenge for Social Issues (KGRC4SI), which focuses on identifying and addressing hazardous situations in the home environment. The dat… ▽ More

    Submitted 26 January, 2024; originally announced January 2024.

    Comments: 7 pages, 2 figures,4 tables

  7. arXiv:2312.15626  [pdf

    cs.AI cs.CL cs.IR cs.LG

    RDF-star2Vec: RDF-star Graph Embeddings for Data Mining

    Authors: Shusaku Egami, Takanori Ugai, Masateru Oota, Kyoumoto Matsushita, Takahiro Kawamura, Kouji Kozaki, Ken Fukuda

    Abstract: Knowledge Graphs (KGs) such as Resource Description Framework (RDF) data represent relationships between various entities through the structure of triples (<subject, predicate, object>). Knowledge graph embedding (KGE) is crucial in machine learning applications, specifically in node classification and link prediction tasks. KGE remains a vital research topic within the semantic web community. RDF… ▽ More

    Submitted 25 December, 2023; originally announced December 2023.

    Comments: 13 pages, 6 figures, and this paper has been accepted by IEEE Access

    ACM Class: I.2.7; I.2.4; I.2.6

    Journal ref: IEEE Access, Volume 11, pp.142030-142042, 2023

  8. arXiv:2307.16206  [pdf

    cs.AI cs.DB cs.IR cs.MM

    Synthesizing Event-centric Knowledge Graphs of Daily Activities Using Virtual Space

    Authors: Shusaku Egami, Takanori Ugai, Mikiko Oono, Koji Kitamura, Ken Fukuda

    Abstract: Artificial intelligence (AI) is expected to be embodied in software agents, robots, and cyber-physical systems that can understand the various contextual information of daily life in the home environment to support human behavior and decision making in various situations. Scene graph and knowledge graph (KG) construction technologies have attracted much attention for knowledge-based embodied quest… ▽ More

    Submitted 30 July, 2023; originally announced July 2023.

    Comments: 17 pages, 12 figures, and this paper has been accepted by IEEE Access

    ACM Class: I.2.4; H.4.2; H.3.3; H.3.1

    Journal ref: IEEE Access, Volume 11, pp.23857-23873, 2023

  9. arXiv:2301.10895  [pdf, other

    cs.NI

    ASTrack: Automatic Detection and Removal of Web Tracking Code with Minimal Functionality Loss

    Authors: Ismael Castell-Uroz, Kensuke Fukuda, Pere Barlet-Ros

    Abstract: Recent advances in web technologies make it more difficult than ever to detect and block web tracking systems. In this work, we propose ASTrack, a novel approach to web tracking detection and removal. ASTrack uses an abstraction of the code structure based on Abstract Syntax Trees to selectively identify web tracking functionality shared across multiple web services. This new methodology allows us… ▽ More

    Submitted 25 January, 2023; originally announced January 2023.

    Comments: This paper has been accepted for publication at IEEE INFOCOM 2023. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses

    ACM Class: C.2.0; C.2.3

  10. arXiv:2009.14330  [pdf, ps, other

    cs.CR cs.CY

    A machine learning approach for detecting CNAME cloaking-based tracking on the Web

    Authors: Ha Dao, Kensuke Fukuda

    Abstract: Various in-browser privacy protection techniques have been designed to protect end-users from third-party tracking. In an arms race against these counter-measures, the tracking providers developed a new technique called CNAME cloaking based tracking to avoid issues with browsers that block third-party cookies and requests. To detect this tracking technique, browser extensions require on-demand DNS… ▽ More

    Submitted 29 September, 2020; originally announced September 2020.

    Comments: This paper is going to be published in IEEE Globecom 2020

  11. arXiv:1912.12060  [pdf, other

    cs.SI cs.CR cs.LG

    Characterizing and Detecting Money Laundering Activities on the Bitcoin Network

    Authors: Yining Hu, Suranga Seneviratne, Kanchana Thilakarathna, Kensuke Fukuda, Aruna Seneviratne

    Abstract: Bitcoin is by far the most popular crypto-currency solution enabling peer-to-peer payments. Despite some studies highlighting the network does not provide full anonymity, it is still being heavily used for a wide variety of dubious financial activities such as money laundering, ponzi schemes, and ransom-ware payments. In this paper, we explore the landscape of potential money laundering activities… ▽ More

    Submitted 27 December, 2019; originally announced December 2019.

  12. arXiv:1712.06850  [pdf, other

    cs.CR cs.CY

    A comparison of web privacy protection techniques

    Authors: Johan Mazel, Richard Garnier, Kensuke Fukuda

    Abstract: A comparison of web privacy protection techniques

    Submitted 19 December, 2017; originally announced December 2017.

  13. arXiv:1711.04325  [pdf, other

    cs.DC cs.CV cs.LG

    Extremely Large Minibatch SGD: Training ResNet-50 on ImageNet in 15 Minutes

    Authors: Takuya Akiba, Shuji Suzuki, Keisuke Fukuda

    Abstract: We demonstrate that training ResNet-50 on ImageNet for 90 epochs can be achieved in 15 minutes with 1024 Tesla P100 GPUs. This was made possible by using a large minibatch size of 32k. To maintain accuracy with this large minibatch size, we employed several techniques such as RMSprop warm-up, batch normalization without moving averages, and a slow-start learning rate schedule. This paper also desc… ▽ More

    Submitted 12 November, 2017; originally announced November 2017.

    Comments: NIPS'17 Workshop: Deep Learning at Supercomputer Scale

  14. arXiv:1710.11351  [pdf, other

    cs.DC cs.LG cs.NE

    ChainerMN: Scalable Distributed Deep Learning Framework

    Authors: Takuya Akiba, Keisuke Fukuda, Shuji Suzuki

    Abstract: One of the keys for deep learning to have made a breakthrough in various fields was to utilize high computing powers centering around GPUs. Enabling the use of further computing abilities by distributed processing is essential not only to make the deep learning bigger and faster but also to tackle unsolved challenges. We present the design, implementation, and evaluation of ChainerMN, the distribu… ▽ More

    Submitted 31 October, 2017; originally announced October 2017.

  15. arXiv:1706.10114  [pdf, other

    cs.CC

    On the Complexity of Polytopes in $LI(2)$

    Authors: Komei Fukuda, May Szedlak

    Abstract: In this paper we consider polytopes given by systems of $n$ inequalities in $d$ variables, where every inequality has at most two variables with nonzero coefficient. We denote this family by $LI(2)$. We show that despite of the easy algebraic structure, polytopes in $LI(2)$ can have high complexity. We construct a polytope in $LI(2)$, whose number of vertices is almost the number of vertices of th… ▽ More

    Submitted 30 June, 2017; originally announced June 2017.

    ACM Class: G.1.6

  16. arXiv:1703.02005  [pdf, other

    cs.NI

    Scaling in Internet Traffic: a 14 year and 3 day longitudinal study, with multiscale analyses and random projections

    Authors: Romain Fontugne, Patrice Abry, Kensuke Fukuda, Darryl Veitch, Kenjiro Cho, Pierre Borgnat, Herwig Wendt

    Abstract: In the mid-90's, it was shown that the statistics of aggregated time series from Internet traffic departed from those of traditional short range dependent models, and were instead characterized by asymptotic self-similarity. Following this seminal contribution, over the years, many studies have investigated the existence and form of scaling in Internet traffic. This contribution aims first at pres… ▽ More

    Submitted 6 March, 2017; originally announced March 2017.

  17. arXiv:1610.02820  [pdf, other

    cs.DS

    Redundancies in Linear Systems with two Variables per Inequality

    Authors: Komei Fukuda, May Szedlak

    Abstract: The problem of detecting and removing redundant constraints is fundamental in optimization. We focus on the case of linear programs (LPs), given by $d$ variables with $n$ inequality constraints. A constraint is called \emph{redundant}, if after its removal, the LP still has the same feasible region. The currently fastest method to detect all redundancies is due to Clarkson: it solves $n$ linear pr… ▽ More

    Submitted 10 October, 2016; originally announced October 2016.

  18. arXiv:1412.1241  [pdf, other

    cs.CG cs.DS math.OC

    Combinatorial Redundancy Detection

    Authors: Komei Fukuda, Bernd Gärtner, May Szedlák

    Abstract: The problem of detecting and removing redundant constraints is fundamental in optimization. We focus on the case of linear programs (LPs) in dictionary form, given by $n$ equality constraints in $n+d$ variables, where the variables are constrained to be nonnegative. A variable $x_r$ is called redundant, if after removing $x_r \geq 0$ the LP still has the same feasible region. The time needed to so… ▽ More

    Submitted 3 December, 2014; originally announced December 2014.