Skip to main content

Showing 1–12 of 12 results for author: Sakurai, K

  1. arXiv:2403.20127  [pdf, other

    cs.AI

    The Impact of Prompts on Zero-Shot Detection of AI-Generated Text

    Authors: Kaito Taguchi, Yujie Gu, Kouichi Sakurai

    Abstract: In recent years, there have been significant advancements in the development of Large Language Models (LLMs). While their practical applications are now widespread, their potential for misuse, such as generating fake news and committing plagiarism, has posed significant concerns. To address this issue, detectors have been developed to evaluate whether a given text is human-generated or AI-generate… ▽ More

    Submitted 29 March, 2024; originally announced March 2024.

  2. arXiv:2403.18247  [pdf, other

    cs.CR cs.IT

    An Experimentally Validated Feasible Quantum Protocol for Identity-Based Signature with Application to Secure Email Communication

    Authors: Tapaswini Mohanty, Vikas Srivastava, Sumit Kumar Debnath, Debasish Roy, Kouichi Sakurai, Sourav Mukhopadhyay

    Abstract: Digital signatures are one of the simplest cryptographic building blocks that provide appealing security characteristics such as authenticity, unforgeability, and undeniability. In 1984, Shamir developed the first Identity-based signature (IBS) to simplify public key infrastructure and circumvent the need for certificates. It makes the process uncomplicated by enabling users to verify digital sign… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

  3. arXiv:2403.15422  [pdf, other

    eess.SP cs.AI cs.HC cs.LG

    Machine Learning Techniques for Sensor-based Human Activity Recognition with Data Heterogeneity -- A Review

    Authors: Xiaozhou Ye, Kouichi Sakurai, Nirmal Nair, Kevin I-Kai Wang

    Abstract: Sensor-based Human Activity Recognition (HAR) is crucial in ubiquitous computing, analysing behaviours through multi-dimensional observations. Despite research progress, HAR confronts challenges, particularly in data distribution assumptions. Most studies often assume uniform data distributions across datasets, contrasting with the varied nature of practical sensor data in human activities. Addres… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

  4. arXiv:2403.08170  [pdf, other

    cs.CV eess.IV

    Versatile Defense Against Adversarial Attacks on Image Recognition

    Authors: Haibo Zhang, Zhihua Yao, Kouichi Sakurai

    Abstract: Adversarial attacks present a significant security risk to image recognition tasks. Defending against these attacks in a real-life setting can be compared to the way antivirus software works, with a key consideration being how well the defense can adapt to new and evolving attacks. Another important factor is the resources involved in terms of time and cost for training defense models and updating… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

  5. arXiv:2311.08625  [pdf, other

    cs.CR

    A Statistical Verification Method of Random Permutations for Hiding Countermeasure Against Side-Channel Attacks

    Authors: Jong-Yeon Park, Jang-Won Ju, Wonil Lee, Bo-Gyeong Kang, Yasuyuki Kachi, Kouichi Sakurai

    Abstract: As NIST is putting the final touches on the standardization of PQC (Post Quantum Cryptography) public key algorithms, it is a racing certainty that peskier cryptographic attacks undeterred by those new PQC algorithms will surface. Such a trend in turn will prompt more follow-up studies of attacks and countermeasures. As things stand, from the attackers' perspective, one viable form of attack that… ▽ More

    Submitted 14 November, 2023; originally announced November 2023.

    Comments: 29 pages, 6 figures

    MSC Class: 11T71; 14G50

  6. arXiv:2302.09810  [pdf, other

    cs.LG

    Toward Asymptotic Optimality: Sequential Unsupervised Regression of Density Ratio for Early Classification

    Authors: Akinori F. Ebihara, Taiki Miyagawa, Kazuyuki Sakurai, Hitoshi Imaoka

    Abstract: Theoretically-inspired sequential density ratio estimation (SDRE) algorithms are proposed for the early classification of time series. Conventional SDRE algorithms can fail to estimate DRs precisely due to the internal overnormalization problem, which prevents the DR-based sequential algorithm, Sequential Probability Ratio Test (SPRT), from reaching its asymptotic Bayes optimality. Two novel SPRT-… ▽ More

    Submitted 20 February, 2023; originally announced February 2023.

    Comments: Accepted to IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2023

  7. arXiv:2202.10280  [pdf, ps, other

    cs.IT cs.CR math.CO

    On the Information-theoretic Security of Combinatorial All-or-nothing Transforms

    Authors: Yujie Gu, Sonata Akao, Navid Nasr Esfahani, Ying Miao, Kouichi Sakurai

    Abstract: All-or-nothing transforms (AONT) were proposed by Rivest as a message preprocessing technique for encrypting data to protect against brute-force attacks, and have numerous applications in cryptography and information security. Later the unconditionally secure AONT and their combinatorial characterization were introduced by Stinson. Informally, a combinatorial AONT is an array with the unbiased req… ▽ More

    Submitted 21 February, 2022; originally announced February 2022.

    Comments: 16 pages

  8. arXiv:2006.05587  [pdf, other

    cs.LG stat.ML

    Sequential Density Ratio Estimation for Simultaneous Optimization of Speed and Accuracy

    Authors: Akinori F. Ebihara, Taiki Miyagawa, Kazuyuki Sakurai, Hitoshi Imaoka

    Abstract: Classifying sequential data as early and as accurately as possible is a challenging yet critical problem, especially when a sampling cost is high. One algorithm that achieves this goal is the sequential probability ratio test (SPRT), which is known as Bayes-optimal: it can keep the expected number of data samples as small as possible, given the desired error upper-bound. However, the original SPRT… ▽ More

    Submitted 6 February, 2021; v1 submitted 9 June, 2020; originally announced June 2020.

    Comments: Accepted to International Conference on Learning Representations (ICLR) 2021 (Spotlight presentation)

  9. arXiv:1907.12400  [pdf, other

    cs.CV

    Specular- and Diffuse-reflection-based Face Spoofing Detection for Mobile Devices

    Authors: Akinori F. Ebihara, Kazuyuki Sakurai, Hitoshi Imaoka

    Abstract: In light of the rising demand for biometric-authentication systems, preventing face spoofing attacks is a critical issue for the safe deployment of face recognition systems. Here, we propose an efficient face presentation attack detection (PAD) algorithm that requires minimal hardware and only a small database, making it suitable for resource-constrained devices such as mobile phones. Utilizing on… ▽ More

    Submitted 15 December, 2020; v1 submitted 29 July, 2019; originally announced July 2019.

    Comments: International Joint Conference on Biometrics (IJCB) 2020 Google PC Chairs Choice Best Paper Award

  10. arXiv:1804.07062  [pdf, other

    cs.CV

    Attacking Convolutional Neural Network using Differential Evolution

    Authors: Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai

    Abstract: The output of Convolutional Neural Networks (CNN) has been shown to be discontinuous which can make the CNN image classifier vulnerable to small well-tuned artificial perturbations. That is, images modified by adding such perturbations(i.e. adversarial perturbations) that make little difference to human eyes, can completely alter the CNN classification results. In this paper, we propose a practica… ▽ More

    Submitted 19 April, 2018; originally announced April 2018.

  11. arXiv:1802.03714  [pdf, other

    cs.CR cs.CV

    Lightweight Classification of IoT Malware based on Image Recognition

    Authors: Jiawei Su, Danilo Vasconcellos Vargas, Sanjiva Prasad, Daniele Sgandurra, Yaokai Feng, Kouichi Sakurai

    Abstract: The Internet of Things (IoT) is an extension of the traditional Internet, which allows a very large number of smart devices, such as home appliances, network cameras, sensors and controllers to connect to one another to share information and improve user experiences. Current IoT devices are typically micro-computers for domain-specific computations rather than traditional functionspecific embedded… ▽ More

    Submitted 11 February, 2018; originally announced February 2018.

  12. Model Checking with Program Slicing Based on Variable Dependence Graphs

    Authors: Masahiro Matsubara, Kohei Sakurai, Fumio Narisawa, Masushi Enshoiwa, Yoshio Yamane, Hisamitsu Yamanaka

    Abstract: In embedded control systems, the potential risks of software defects have been increasing because of software complexity which leads to, for example, timing related problems. These defects are rarely found by tests or simulations. To detect such defects, we propose a modeling method which can generate software models for model checking with a program slicing technique based on a variable dependenc… ▽ More

    Submitted 31 December, 2012; originally announced January 2013.

    Comments: In Proceedings FTSCS 2012, arXiv:1212.6574

    Journal ref: EPTCS 105, 2012, pp. 56-68