Zum Hauptinhalt springen

Showing 1–11 of 11 results for author: Ito, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.08341  [pdf, other

    cs.CV

    Adaptive Deep Iris Feature Extractor at Arbitrary Resolutions

    Authors: Yuho Shoji, Yuka Ogino, Takahiro Toizumi, Atsushi Ito

    Abstract: This paper proposes a deep feature extractor for iris recognition at arbitrary resolutions. Resolution degradation reduces the recognition performance of deep learning models trained by high-resolution images. Using various-resolution images for training can improve the model's robustness while sacrificing recognition performance for high-resolution images. To achieve higher recognition performanc… ▽ More

    Submitted 12 July, 2024; v1 submitted 11 July, 2024; originally announced July 2024.

  2. arXiv:2407.04959  [pdf, ps, other

    cs.CR cs.MM

    Embedding Digital Signature into CSV Files Using Data Hiding

    Authors: Akinori Ito

    Abstract: Open data is an important basis for open science and evidence-based policymaking. Governments of many countries disclose government-related statistics as open data. Some of these data are provided as CSV files. However, since CSV files are plain texts, we cannot ensure the integrity of a downloaded CSV file. A popular way to prove the data's integrity is a digital signature; however, it is difficu… ▽ More

    Submitted 6 July, 2024; originally announced July 2024.

  3. arXiv:2402.04051  [pdf, other

    cs.LG

    Analysis of Linear Mode Connectivity via Permutation-Based Weight Matching

    Authors: Akira Ito, Masanori Yamada, Atsutoshi Kumagai

    Abstract: Recently, Ainsworth et al. showed that using weight matching (WM) to minimize the $L_2$ distance in a permutation search of model parameters effectively identifies permutations that satisfy linear mode connectivity (LMC), in which the loss along a linear path between two independently trained models with different seeds remains nearly constant. This paper provides a theoretical analysis of LMC usi… ▽ More

    Submitted 15 April, 2024; v1 submitted 6 February, 2024; originally announced February 2024.

    Comments: 26 pages

  4. Scheduled Curiosity-Deep Dyna-Q: Efficient Exploration for Dialog Policy Learning

    Authors: Xuecheng Niu, Akinori Ito, Takashi Nose

    Abstract: Training task-oriented dialog agents based on reinforcement learning is time-consuming and requires a large number of interactions with real users. How to grasp dialog policy within limited dialog experiences remains an obstacle that makes the agent training process less efficient. In addition, most previous frameworks start training by randomly choosing training samples, which differs from the hu… ▽ More

    Submitted 20 May, 2024; v1 submitted 31 January, 2024; originally announced February 2024.

    Comments: Accepted to IEEE Access

    Journal ref: IEEE Access, vol. 12, pp. 46940-46952, 2024

  5. arXiv:2401.06438  [pdf

    cs.CV

    Improving Low-Light Image Recognition Performance Based on Image-adaptive Learnable Module

    Authors: Seitaro Ono, Yuka Ogino, Takahiro Toizumi, Atsushi Ito, Masato Tsukada

    Abstract: In recent years, significant progress has been made in image recognition technology based on deep neural networks. However, improving recognition performance under low-light conditions remains a significant challenge. This study addresses the enhancement of recognition model performance in low-light conditions. We propose an image-adaptive learnable module which apply appropriate image processing… ▽ More

    Submitted 12 January, 2024; originally announced January 2024.

    Comments: 8 pages, 2 figures, 4 tables

  6. arXiv:2305.15518  [pdf, other

    eess.AS cs.SD

    Spoofing Attacker Also Benefits from Self-Supervised Pretrained Model

    Authors: Aoi Ito, Shota Horiguchi

    Abstract: Large-scale pretrained models using self-supervised learning have reportedly improved the performance of speech anti-spoofing. However, the attacker side may also make use of such models. Also, since it is very expensive to train such models from scratch, pretrained models on the Internet are often used, but the attacker and defender may possibly use the same pretrained model. This paper investiga… ▽ More

    Submitted 24 May, 2023; originally announced May 2023.

    Comments: Accepted to INTERSPEECH 2023

  7. arXiv:2304.07491  [pdf, ps, other

    cs.SC math.AC

    Computer-assisted proofs of "Kariya's theorem" with computer algebra

    Authors: Ayane Ito, Takefumi Kasai, Akira Terui

    Abstract: We demonstrate computer-assisted proofs of "Kariya's theorem," a theorem in elementary geometry, with computer algebra. In the proof of geometry theorem with computer algebra, vertices of geometric figures that are subjects for the proof are expressed as variables. The variables are classified into two classes: arbitrarily given points and the points defined from the former points by constraints.… ▽ More

    Submitted 15 April, 2023; originally announced April 2023.

    MSC Class: 13P10; 68W30

  8. arXiv:2210.16512  [pdf, other

    cs.RO eess.SY

    MPC Builder for Autonomous Drive: Automatic Generation of MPCs for Motion Planning and Control

    Authors: Kohei Honda, Hiroyuki Okuda, Tatsuya Suzuki, Akira Ito

    Abstract: This study presents a new framework for vehicle motion planning and control based on the automatic generation of model predictive controllers (MPCs) named MPC Builder. In this framework, several components necessary for MPC, such as prediction models, constraints, and cost functions, are prepared in advance. The MPC Builder then generates various MPCs online in a unified manner according to traffi… ▽ More

    Submitted 22 April, 2023; v1 submitted 29 October, 2022; originally announced October 2022.

    Comments: 8 pages, 9 figures

  9. arXiv:2112.11246  [pdf

    cs.CV cs.GR

    Image quality enhancement of embedded holograms in holographic information hiding using deep neural networks

    Authors: Tomoyoshi Shimobaba, Sota Oshima, Takashi Kakue, and Tomoyoshi Ito

    Abstract: Holographic information hiding is a technique for embedding holograms or images into another hologram, used for copyright protection and steganography of holograms. Using deep neural networks, we offer a way to improve the visual quality of embedded holograms. The brightness of an embedded hologram is set to a fraction of that of the host hologram, resulting in a barely damaged reconstructed image… ▽ More

    Submitted 19 December, 2021; originally announced December 2021.

  10. Projective reconstruction in algebraic vision

    Authors: Atsushi Ito, Makoto Miura, Kazushi Ueda

    Abstract: We discuss the geometry of rational maps from a projective space of an arbitrary dimension to the product of projective spaces of lower dimensions induced by linear projections. In particular, we give an algebro-geometric variant of the projective reconstruction theorem by Hartley and Schaffalitzky [HS09].

    Submitted 11 November, 2019; v1 submitted 17 October, 2017; originally announced October 2017.

    Comments: 15 pages

    Journal ref: Can. Math. Bull. 63 (2020) 592-609

  11. Context-Sensitive Measurement of Word Distance by Adaptive Scaling of a Semantic Space

    Authors: Hideki Kozima, Akira Ito

    Abstract: The paper proposes a computationally feasible method for measuring context-sensitive semantic distance between words. The distance is computed by adaptive scaling of a semantic space. In the semantic space, each word in the vocabulary V is represented by a multi-dimensional vector which is obtained from an English dictionary through a principal component analysis. Given a word set C which specif… ▽ More

    Submitted 25 June, 1996; v1 submitted 23 January, 1996; originally announced January 1996.

    Comments: 8 pages, single LaTeX file