Skip to main content

Showing 1–13 of 13 results for author: Araki, T

  1. arXiv:2403.06493  [pdf, other

    math.CO cs.DM

    A Lower bound for Secure Domination Number of an Outerplanar Graph

    Authors: Toru Araki

    Abstract: A subset $S$ of vertices in a graph $G$ is a secure dominating set of $G$ if $S$ is a dominating set of $G$ and, for each vertex $u \not\in S$, there is a vertex $v \in S$ such that $uv$ is an edge and $(S \setminus \{v\}) \cup \{u\}$ is also a dominating set of $G$. The secure domination number of $G$, denoted by $γ_{s}(G)$, is the cardinality of a smallest secure dominating sets of $G$. In this… ▽ More

    Submitted 12 March, 2024; v1 submitted 11 March, 2024; originally announced March 2024.

    Comments: 7 pages, 1 figure. arXiv admin note: text overlap with arXiv:2403.03404

    MSC Class: 05C69; 05C10 ACM Class: G.2.2

  2. arXiv:2403.03404  [pdf, other

    math.CO cs.DM

    Secure Total Domination Number in Maximal Outerplanar Graphs

    Authors: Yasufumi Aita, Toru Araki

    Abstract: A subset $S$ of vertices in a graph $G$ is a secure total dominating set of $G$ if $S$ is a total dominating set of $G$ and, for each vertex $u \not\in S$, there is a vertex $v \in S$ such that $uv$ is an edge and $(S \setminus \{v\}) \cup \{u\}$ is also a total dominating set of $G$. We show that if $G$ is a maximal outerplanar graph of order $n$, then $G$ has a total secure dominating set of siz… ▽ More

    Submitted 8 April, 2024; v1 submitted 5 March, 2024; originally announced March 2024.

    MSC Class: 05C69; 05C10 ACM Class: G.2.2

  3. arXiv:2311.03825  [pdf, other

    cs.CR

    IC-SECURE: Intelligent System for Assisting Security Experts in Generating Playbooks for Automated Incident Response

    Authors: Ryuta Kremer, Prasanna N. Wudali, Satoru Momiyama, Toshinori Araki, Jun Furukawa, Yuval Elovici, Asaf Shabtai

    Abstract: Security orchestration, automation, and response (SOAR) systems ingest alerts from security information and event management (SIEM) system, and then trigger relevant playbooks that automate and orchestrate the execution of a sequence of security activities. SOAR systems have two major limitations: (i) security analysts need to define, create and change playbooks manually, and (ii) the choice betwe… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

  4. arXiv:2304.05048  [pdf, other

    cs.CV cs.AI

    Simultaneous Adversarial Attacks On Multiple Face Recognition System Components

    Authors: Inderjeet Singh, Kazuya Kakizaki, Toshinori Araki

    Abstract: In this work, we investigate the potential threat of adversarial examples to the security of face recognition systems. Although previous research has explored the adversarial risk to individual components of FRSs, our study presents an initial exploration of an adversary simultaneously fooling multiple components: the face detector and feature extractor in an FRS pipeline. We propose three multi-o… ▽ More

    Submitted 11 April, 2023; originally announced April 2023.

  5. arXiv:2211.16253  [pdf, other

    cs.LG cs.CV

    Advancing Deep Metric Learning Through Multiple Batch Norms And Multi-Targeted Adversarial Examples

    Authors: Inderjeet Singh, Kazuya Kakizaki, Toshinori Araki

    Abstract: Deep Metric Learning (DML) is a prominent field in machine learning with extensive practical applications that concentrate on learning visual similarities. It is known that inputs such as Adversarial Examples (AXs), which follow a distribution different from that of clean data, result in false predictions from DML systems. This paper proposes MDProp, a framework to simultaneously improve the perfo… ▽ More

    Submitted 6 December, 2022; v1 submitted 29 November, 2022; originally announced November 2022.

  6. arXiv:2211.14797  [pdf, other

    cs.LG

    Latent SHAP: Toward Practical Human-Interpretable Explanations

    Authors: Ron Bitton, Alon Malach, Amiel Meiseles, Satoru Momiyama, Toshinori Araki, Jun Furukawa, Yuval Elovici, Asaf Shabtai

    Abstract: Model agnostic feature attribution algorithms (such as SHAP and LIME) are ubiquitous techniques for explaining the decisions of complex classification models, such as deep neural networks. However, since complex classification models produce superior performance when trained on low-level (or encoded) features, in many cases, the explanations generated by these algorithms are neither interpretable… ▽ More

    Submitted 27 November, 2022; originally announced November 2022.

  7. arXiv:2203.15498  [pdf, other

    cs.CR cs.AI cs.CV cs.LG

    Powerful Physical Adversarial Examples Against Practical Face Recognition Systems

    Authors: Inderjeet Singh, Toshinori Araki, Kazuya Kakizaki

    Abstract: It is well-known that the most existing machine learning (ML)-based safety-critical applications are vulnerable to carefully crafted input instances called adversarial examples (AXs). An adversary can conveniently attack these target systems from digital as well as physical worlds. This paper aims to the generation of robust physical AXs against face recognition systems. We present a novel smoothn… ▽ More

    Submitted 23 March, 2022; originally announced March 2022.

    Comments: Accepted at IEEE/CVF WACV 2022 MAP

  8. Universal Adversarial Spoofing Attacks against Face Recognition

    Authors: Takuma Amada, Seng Pei Liew, Kazuya Kakizaki, Toshinori Araki

    Abstract: We assess the vulnerabilities of deep face recognition systems for images that falsify/spoof multiple identities simultaneously. We demonstrate that, by manipulating the deep feature representation extracted from a face image via imperceptibly small perturbations added at the pixel level using our proposed Universal Adversarial Spoofing Examples (UAXs), one can fool a face verification system into… ▽ More

    Submitted 1 October, 2021; originally announced October 2021.

    Comments: Accepted to International Joint Conference on Biometrics (IJCB 2021)

  9. arXiv:2109.14205  [pdf, other

    cs.CV cs.AI cs.LG

    On Brightness Agnostic Adversarial Examples Against Face Recognition Systems

    Authors: Inderjeet Singh, Satoru Momiyama, Kazuya Kakizaki, Toshinori Araki

    Abstract: This paper introduces a novel adversarial example generation method against face recognition systems (FRSs). An adversarial example (AX) is an image with deliberately crafted noise to cause incorrect predictions by a target system. The AXs generated from our method remain robust under real-world brightness changes. Our method performs non-linear brightness transformations while leveraging the conc… ▽ More

    Submitted 29 September, 2021; originally announced September 2021.

    Comments: Accepted at BIOSIG 2021 conference

    Journal ref: LNI Volume: BIOSIG 2021, LNI Volume 315, ISBN 978-3-88579-709-8

  10. arXiv:2103.08346  [pdf, ps, other

    cs.DM

    Maximum Number of Steps of Topswops on 18 and 19 Cards

    Authors: Kento Kimura, Atsuki Takahashi, Tetsuya Araki, Kazuyuki Amano

    Abstract: Let $f(n)$ be the maximum number of steps of Topswops on $n$ cards. In this note, we report our computational experiments to determine the values of $f(18)$ and $f(19)$. By applying an algorithm developed by Knuth in a parallel fashion, we conclude that $f(18)=191$ and $f(19)=221$.

    Submitted 15 March, 2021; originally announced March 2021.

    Comments: 4 pages

  11. arXiv:2010.01707  [pdf, other

    cs.LG stat.ML

    Rank Position Forecasting in Car Racing

    Authors: Bo Peng, Jiayu Li, Selahattin Akkas, Fugang Wang, Takuya Araki, Ohno Yoshiyuki, Judy Qiu

    Abstract: Forecasting is challenging since uncertainty resulted from exogenous factors exists. This work investigates the rank position forecasting problem in car racing, which predicts the rank positions at the future laps for cars. Among the many factors that bring changes to the rank positions, pit stops are critical but irregular and rare. We found existing methods, including statistical models, machine… ▽ More

    Submitted 23 October, 2020; v1 submitted 4 October, 2020; originally announced October 2020.

  12. A tight analysis of Kierstead-Trotter algorithm for online unit interval coloring

    Authors: Tetsuya Araki, Koji M. Kobayashi

    Abstract: Kierstead and Trotter (Congressus Numerantium 33, 1981) proved that their algorithm is an optimal online algorithm for the online interval coloring problem. In this paper, for online unit interval coloring, we show that the number of colors used by the Kierstead-Trotter algorithm is at most $3 ω(G) - 3$, where $ω(G)$ is the size of the maximum clique in a given graph $G$, and it is the best possib… ▽ More

    Submitted 28 September, 2016; originally announced September 2016.

    Comments: 4 pages

  13. arXiv:1407.6416  [pdf, ps, other

    cs.DM math.CO

    On the distance preserving trees in graphs

    Authors: Toru Araki, Shingo Osawa, Takashi Shimizu

    Abstract: For a vertex $v$ of a graph $G$, a spanning tree $T$ of $G$ is distance-preserving from $v$ if, for any vertex $w$, the distance from $v$ to $w$ on $T$ is the same as the distance from $v$ to $w$ on $G$. If two vertices $u$ and $v$ are distinct, then two distance-preserving spanning trees $T_{u}$ from $u$ and $T_{v}$ from $v$ are distinct in general. A purpose of this paper is to give a characteri… ▽ More

    Submitted 23 July, 2014; originally announced July 2014.

    Comments: 6 pages