Skip to main content

Showing 1–29 of 29 results for author: Yamada, Y

  1. Task segmentation based on transition state clustering for surgical robot assistance

    Authors: Yutaro Yamada, Jacinto Colan, Ana Davila, Yasuhisa Hasegawa

    Abstract: Understanding surgical tasks represents an important challenge for autonomy in surgical robotic systems. To achieve this, we propose an online task segmentation framework that uses hierarchical transition state clustering to activate predefined robot assistance. Our approach involves performing a first clustering on visual features and a subsequent clustering on robot kinematic features for each v… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

    Comments: Accepted at 2023 International Conference on Control and Robotics Engineering (ICCRE)

    Journal ref: 2023 International Conference on Control and Robotics Engineering (ICCRE), pp.260-264

  2. arXiv:2402.09052  [pdf, other

    cs.AI

    L3GO: Language Agents with Chain-of-3D-Thoughts for Generating Unconventional Objects

    Authors: Yutaro Yamada, Khyathi Chandu, Yuchen Lin, Jack Hessel, Ilker Yildirim, Yejin Choi

    Abstract: Diffusion-based image generation models such as DALL-E 3 and Stable Diffusion-XL demonstrate remarkable capabilities in generating images with realistic and unique compositions. Yet, these models are not robust in precisely reasoning about physical and spatial configurations of objects, especially when instructed with unconventional, thereby out-of-distribution descriptions, such as "a chair with… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

  3. arXiv:2312.05751  [pdf, other

    cs.CV

    Benchmarking of Query Strategies: Towards Future Deep Active Learning

    Authors: Shiryu Ueno, Yusei Yamada, Shunsuke Nakatsuka, Kunihito Kato

    Abstract: In this study, we benchmark query strategies for deep actice learning~(DAL). DAL reduces annotation costs by annotating only high-quality samples selected by query strategies. Existing research has two main problems, that the experimental settings are not standardized, making the evaluation of existing methods is difficult, and that most of experiments were conducted on the CIFAR or MNIST datasets… ▽ More

    Submitted 9 December, 2023; originally announced December 2023.

    Comments: 14 pages

  4. arXiv:2310.14540  [pdf, other

    cs.CL cs.AI

    Evaluating Spatial Understanding of Large Language Models

    Authors: Yutaro Yamada, Yihan Bao, Andrew K. Lampinen, Jungo Kasai, Ilker Yildirim

    Abstract: Large language models (LLMs) show remarkable capabilities across a variety of tasks. Despite the models only seeing text in training, several recent studies suggest that LLM representations implicitly capture aspects of the underlying grounded concepts. Here, we explore LLM representations of a particularly salient kind of grounded knowledge -- spatial relationships. We design natural-language nav… ▽ More

    Submitted 12 April, 2024; v1 submitted 22 October, 2023; originally announced October 2023.

    Comments: Accepted to TMLR 2024. Our code and data are available at https://github.com/runopti/SpatialEvalLLM, https://huggingface.co/datasets/yyamada/SpatialEvalLLM

  5. Balance Measures Derived from Insole Sensor Differentiate Prodromal Dementia with Lewy Bodies

    Authors: Masatomo Kobayashi, Yasunori Yamada, Kaoru Shinkawa, Miyuki Nemoto, Miho Ota, Kiyotaka Nemoto, Tetsuaki Arai

    Abstract: Dementia with Lewy bodies is the second most common type of neurodegenerative dementia, and identification at the prodromal stage$-$i.e., mild cognitive impairment due to Lewy bodies (MCI-LB)$-$is important for providing appropriate care. However, MCI-LB is often underrecognized because of its diversity in clinical manifestations and similarities with other conditions such as mild cognitive impair… ▽ More

    Submitted 11 September, 2023; originally announced September 2023.

    Journal ref: 2023 IEEE International Conference on Digital Health (ICDH)

  6. arXiv:2309.05777  [pdf

    eess.AS cs.LG cs.SD

    Smartwatch-derived Acoustic Markers for Deficits in Cognitively Relevant Everyday Functioning

    Authors: Yasunori Yamada, Kaoru Shinkawa, Masatomo Kobayashi, Miyuki Nemoto, Miho Ota, Kiyotaka Nemoto, Tetsuaki Arai

    Abstract: Detection of subtle deficits in everyday functioning due to cognitive impairment is important for early detection of neurodegenerative diseases, particularly Alzheimer's disease. However, current standards for assessment of everyday functioning are based on qualitative, subjective ratings. Speech has been shown to provide good objective markers for cognitive impairments, but the association with c… ▽ More

    Submitted 11 September, 2023; originally announced September 2023.

    Journal ref: 2023 IEEE International Conference on Digital Health (ICDH)

  7. arXiv:2307.10688  [pdf, other

    cs.AI

    Bounded Combinatorial Reconfiguration with Answer Set Programming

    Authors: Yuya Yamada, Mutsunori Banbara, Katsumi Inoue, Torsten Schaub

    Abstract: We develop an approach called bounded combinatorial reconfiguration for solving combinatorial reconfiguration problems based on Answer Set Programming (ASP). The general task is to study the solution spaces of source combinatorial problems and to decide whether or not there are sequences of feasible solutions that have special properties. The resulting recongo solver covers all metrics of the solv… ▽ More

    Submitted 20 July, 2023; originally announced July 2023.

    Comments: 15 pages

  8. arXiv:2303.18027  [pdf, other

    cs.CL

    Evaluating GPT-4 and ChatGPT on Japanese Medical Licensing Examinations

    Authors: Jungo Kasai, Yuhei Kasai, Keisuke Sakaguchi, Yutaro Yamada, Dragomir Radev

    Abstract: As large language models (LLMs) gain popularity among speakers of diverse languages, we believe that it is crucial to benchmark them to better understand model behaviors, failures, and limitations in languages beyond English. In this work, we evaluate LLM APIs (ChatGPT, GPT-3, and GPT-4) on the Japanese national medical licensing examinations from the past five years, including the current year. O… ▽ More

    Submitted 5 April, 2023; v1 submitted 31 March, 2023; originally announced March 2023.

    Comments: Added results from the March 2023 exam

  9. arXiv:2212.12043  [pdf, other

    cs.CV cs.CL cs.LG

    When are Lemons Purple? The Concept Association Bias of Vision-Language Models

    Authors: Yutaro Yamada, Yingtian Tang, Yoyo Zhang, Ilker Yildirim

    Abstract: Large-scale vision-language models such as CLIP have shown impressive performance on zero-shot image classification and image-to-text retrieval. However, such performance does not realize in tasks that require a finer-grained correspondence between vision and language, such as Visual Question Answering (VQA). As a potential cause of the difficulty of applying these models to VQA and similar tasks,… ▽ More

    Submitted 13 April, 2024; v1 submitted 22 December, 2022; originally announced December 2022.

    Comments: EMNLP 2023 main

  10. Automated Analysis of Drawing Process for Detecting Prodromal and Clinical Dementia

    Authors: Yasunori Yamada, Masatomo Kobayashi, Kaoru Shinkawa, Miyuki Nemoto, Miho Ota, Kiyotaka Nemoto, Tetsuaki Arai

    Abstract: Early diagnosis of dementia, particularly in the prodromal stage (i.e., mild cognitive impairment, or MCI), has become a research and clinical priority but remains challenging. Automated analysis of the drawing process has been studied as a promising means for screening prodromal and clinical dementia, providing multifaceted information encompassing features, such as drawing speed, pen posture, wr… ▽ More

    Submitted 16 November, 2022; originally announced November 2022.

    Journal ref: 2022 IEEE International Conference on Digital Health (ICDH)

  11. arXiv:2204.03934  [pdf, other

    cs.CV cs.LG

    Does Robustness on ImageNet Transfer to Downstream Tasks?

    Authors: Yutaro Yamada, Mayu Otani

    Abstract: As clean ImageNet accuracy nears its ceiling, the research community is increasingly more concerned about robust accuracy under distributional shifts. While a variety of methods have been proposed to robustify neural networks, these techniques often target models trained on ImageNet classification. At the same time, it is a common practice to use ImageNet pretrained backbones for downstream tasks… ▽ More

    Submitted 8 April, 2022; originally announced April 2022.

    Comments: CVPR 2022

  12. arXiv:2201.12122  [pdf, other

    cs.LG cs.AI cs.CL

    Can Wikipedia Help Offline Reinforcement Learning?

    Authors: Machel Reid, Yutaro Yamada, Shixiang Shane Gu

    Abstract: Fine-tuning reinforcement learning (RL) models has been challenging because of a lack of large scale off-the-shelf datasets as well as high variance in transferability among different environments. Recent work has looked at tackling offline RL from the perspective of sequence modeling with improved results as result of the introduction of the Transformer architecture. However, when the model is tr… ▽ More

    Submitted 23 July, 2022; v1 submitted 28 January, 2022; originally announced January 2022.

  13. Adaptive Resonance Theory-based Topological Clustering with a Divisive Hierarchical Structure Capable of Continual Learning

    Authors: Naoki Masuyama, Narito Amako, Yuna Yamada, Yusuke Nojima, Hisao Ishibuchi

    Abstract: Adaptive Resonance Theory (ART) is considered as an effective approach for realizing continual learning thanks to its ability to handle the plasticity-stability dilemma. In general, however, the clustering performance of ART-based algorithms strongly depends on the specification of a similarity threshold, i.e., a vigilance parameter, which is data-dependent and specified by hand. This paper propos… ▽ More

    Submitted 7 July, 2022; v1 submitted 25 January, 2022; originally announced January 2022.

    Comments: This paper is accepted in IEEE Access

    Journal ref: IEEE Access, vol. 10, pp. 68042-68056, June 2022

  14. arXiv:2110.15960  [pdf, other

    math.ST cs.LG stat.ML

    Support Recovery with Stochastic Gates: Theory and Application for Linear Models

    Authors: Soham Jana, Henry Li, Yutaro Yamada, Ofir Lindenbaum

    Abstract: Consider the problem of simultaneous estimation and support recovery of the coefficient vector in a linear data model with additive Gaussian noise. We study the problem of estimating the model coefficients based on a recently proposed non-convex regularizer, namely the stochastic gates (STG) [Yamada et al. 2020]. We suggest a new projection-based algorithm for solving the STG regularized minimizat… ▽ More

    Submitted 12 November, 2022; v1 submitted 29 October, 2021; originally announced October 2021.

    Comments: 15 pages, 7 figures, extended the theoretical studies and numerical analyses to other probabilistic models (subgaussian, moment constraints etc.)

  15. arXiv:2103.06515  [pdf

    cs.CY

    Physical Activity Analysis of College Students During the COVID-19 Pandemic Using Smartphones

    Authors: Yuuki Nishiyama, Yuui Kakino, Enishi Naka, Yuka Noda, Satsuki Hashiba, Yusuke Yamada, Wataru Sasaki, Tadashi Okoshi, Jin Nakazawa, Masaki Mori, Hisashi Mizutori, Kotomi Shiota, Tomohisa Nagano, Yuko Tokairin, Takaaki Kato

    Abstract: Owing to the pandemic caused by the coronavirus disease of 2019 (COVID-19), several universities have closed their campuses for preventing the spread of infection. Consequently, the university classes are being held over the Internet, and students attend these classes from their homes. While the COVID-19 pandemic is expected to be prolonged, the online-centric lifestyle has raised concerns about s… ▽ More

    Submitted 11 March, 2021; originally announced March 2021.

    Comments: 12 pages, in Japanese, 16 figures and 2 tables

    ACM Class: J.4; H.4.0; H.5.3

  16. arXiv:2103.03209  [pdf, ps, other

    cs.CR cs.CY

    Requirement Analyses and Evaluations of Blockchain Platforms per Possible Use Cases

    Authors: Kenji Saito, Akimitsu Shiseki, Mitsuyasu Takada, Hiroki Yamamoto, Masaaki Saitoh, Hiroaki Ohkawa, Hirofumi Andou, Naotake Miyamoto, Kazuaki Yamakawa, Kiyoshi Kurakawa, Tomohiro Yabushita, Yuji Yamada, Go Masuda, Kazuyuki Masuda

    Abstract: It is said that blockchain will contribute to the digital transformation of society in a wide range of ways, from the management of public and private documents to the traceability in various industries, as well as digital currencies. A number of so-called blockchain platforms have been developed, and experiments and applications have been carried out on them. But are these platforms really conduc… ▽ More

    Submitted 4 March, 2021; originally announced March 2021.

    Comments: 50 pages, 3 figures

  17. arXiv:2012.09407  [pdf, other

    cs.LG cs.CV

    Joint Search of Data Augmentation Policies and Network Architectures

    Authors: Taiga Kashima, Yoshihiro Yamada, Shunta Saito

    Abstract: The common pipeline of training deep neural networks consists of several building blocks such as data augmentation and network architecture selection. AutoML is a research field that aims at automatically designing those parts, but most methods explore each part independently because it is more challenging to simultaneously search all the parts. In this paper, we propose a joint optimization metho… ▽ More

    Submitted 12 January, 2021; v1 submitted 17 December, 2020; originally announced December 2020.

    Comments: AAAI 2021 Workshop: Learning Network Architecture during Training

  18. arXiv:2012.03598  [pdf, other

    cs.HC

    Self-supervised Deep Learning for Reading Activity Classification

    Authors: Md. Rabiul Islam, Shuji Sakamoto, Yoshihiro Yamada, Andrew Vargo, Motoi Iwata, Masakazu Iwamura, Koichi Kise

    Abstract: Reading analysis can give important information about a user's confidence and habits and can be used to construct feedback to improve a user's reading behavior. A lack of labeled data inhibits the effective application of fully-supervised Deep Learning (DL) for automatic reading analysis. In this paper, we propose a self-supervised DL method for reading analysis and evaluate it on two classificati… ▽ More

    Submitted 7 December, 2020; originally announced December 2020.

    Comments: 28 pages

  19. arXiv:2002.02056  [pdf

    cs.SE

    Design of the Inspection Process Using the GitHub Flow in Project Based Learning for Software Engineering and Its Practice

    Authors: Yutsuki Miyashita, Yuki Yamada, Hiroaki Hashiura, Atsuo Hazeyama

    Abstract: Project based learning (PBL) for software development (we call it software development PBL) has garnered attention as a practical educational method. A number of studies have reported on the introduction of social coding tools such as GitHub, in software development PBL. In education, it is important to give feedback (advice, error corrections, and so on) to learners, especially in software develo… ▽ More

    Submitted 5 February, 2020; originally announced February 2020.

  20. arXiv:1912.07801  [pdf

    eess.SP cs.NI

    An RSSI-based Wireless Sensor Node Localisation using Trilateration and Multilateration Methods for Outdoor Environment

    Authors: Mohd Ismifaizul Mohd Ismail, Rudzidatul Akmam Dzyauddin, Shafiqa Samsul, Nur Aisyah Azmi, Yoshihide Yamada, Mohd Fitri Mohd Yakub, Noor Azurati Binti Ahmad Salleh

    Abstract: Localisation can be defined as estimating or finding a position of the node. There are two techniques in localisation, which are range-based and range-free techniques. This paper focusses on the Received Signal Strength Indicator (RSSI) localisation method, which is categorised in a range-based technique along with the time of arrival, time difference of arrival and angle of arrival. Therefore, th… ▽ More

    Submitted 16 December, 2019; originally announced December 2019.

  21. arXiv:1906.09786  [pdf, other

    cs.CR

    Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks

    Authors: Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Yoshiyuki Yamada, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai

    Abstract: An attack graph is a method used to enumerate the possible paths that an attacker can execute in the organization network. MulVAL is a known open-source framework used to automatically generate attack graphs. MulVAL's default modeling has two main shortcomings. First, it lacks the representation of network protocol vulnerabilities, and thus it cannot be used to model common network attacks such as… ▽ More

    Submitted 24 June, 2019; originally announced June 2019.

  22. arXiv:1812.10087  [pdf, other

    cs.CV

    Classification of X-Ray Protein Crystallization Using Deep Convolutional Neural Networks with a Finder Module

    Authors: Yusei Miura, Tetsuya Sakurai, Claus Aranha, Toshiya Senda, Ryuichi Kato, Yusuke Yamada

    Abstract: Recently, deep convolutional neural networks have shown good results for image recognition. In this paper, we use convolutional neural networks with a finder module, which discovers the important region for recognition and extracts that region. We propose applying our method to the recognition of protein crystals for X-ray structural analysis. In this analysis, it is necessary to recognize states… ▽ More

    Submitted 25 December, 2018; originally announced December 2018.

    Comments: 7 pages, 16 figures

  23. arXiv:1810.04247  [pdf, other

    cs.LG stat.ML

    Feature Selection using Stochastic Gates

    Authors: Yutaro Yamada, Ofir Lindenbaum, Sahand Negahban, Yuval Kluger

    Abstract: Feature selection problems have been extensively studied for linear estimation, for instance, Lasso, but less emphasis has been placed on feature selection for non-linear functions. In this study, we propose a method for feature selection in high-dimensional non-linear function estimation problems. The new procedure is based on minimizing the $\ell_0$ norm of the vector of indicator variables that… ▽ More

    Submitted 26 July, 2020; v1 submitted 9 October, 2018; originally announced October 2018.

    Comments: Published in ICML 2020

    Journal ref: Proceedings of Machine Learning and Systems 2020, pages 8952--8963

  24. arXiv:1803.10840  [pdf, other

    stat.ML cs.LG

    Defending against Adversarial Images using Basis Functions Transformations

    Authors: Uri Shaham, James Garritano, Yutaro Yamada, Ethan Weinberger, Alex Cloninger, Xiuyuan Cheng, Kelly Stanton, Yuval Kluger

    Abstract: We study the effectiveness of various approaches that defend against adversarial attacks on deep networks via manipulations based on basis function representations of images. Specifically, we experiment with low-pass filtering, PCA, JPEG compression, low resolution wavelet approximation, and soft-thresholding. We evaluate these defense techniques using three types of popular attacks in black, gray… ▽ More

    Submitted 16 April, 2018; v1 submitted 28 March, 2018; originally announced March 2018.

    Comments: added link to GitHub repository

  25. ShakeDrop Regularization for Deep Residual Learning

    Authors: Yoshihiro Yamada, Masakazu Iwamura, Takuya Akiba, Koichi Kise

    Abstract: Overfitting is a crucial problem in deep neural networks, even in the latest network architectures. In this paper, to relieve the overfitting effect of ResNet and its improvements (i.e., Wide ResNet, PyramidNet, and ResNeXt), we propose a new regularization method called ShakeDrop regularization. ShakeDrop is inspired by Shake-Shake, which is an effective regularization method, but can be applied… ▽ More

    Submitted 6 January, 2020; v1 submitted 7 February, 2018; originally announced February 2018.

    Journal ref: IEEE Access, 7, 1, pp.186126-186136 (2019)

  26. arXiv:1612.01230  [pdf, ps, other

    cs.CV

    Deep Pyramidal Residual Networks with Separated Stochastic Depth

    Authors: Yoshihiro Yamada, Masakazu Iwamura, Koichi Kise

    Abstract: On general object recognition, Deep Convolutional Neural Networks (DCNNs) achieve high accuracy. In particular, ResNet and its improvements have broken the lowest error rate records. In this paper, we propose a method to successfully combine two ResNet improvements, ResDrop and PyramidNet. We confirmed that the proposed network outperformed the conventional methods; on CIFAR-100, the proposed netw… ▽ More

    Submitted 4 December, 2016; originally announced December 2016.

  27. When categorization-based stranger avoidance explains the uncanny valley: A comment on MacDorman & Chattopadhyay (2016)

    Authors: Takahiro Kawabe, Kyoshiro Sasaki, Keiko Ihaya, Yuki Yamada

    Abstract: Artificial objects often subjectively look eerie when their appearance to some extent resembles a human, which is known as the uncanny valley phenomenon. From a cognitive psychology perspective, several explanations of the phenomenon have been put forth, two of which are object categorization and realism inconsistency. Recently, MacDorman and Chattopadhyay (2016) reported experimental data as evid… ▽ More

    Submitted 20 September, 2016; v1 submitted 11 September, 2016; originally announced September 2016.

    Comments: published in Cognition

    Journal ref: Cognition, 2016

  28. arXiv:1602.04579  [pdf, other

    stat.ML cs.CR cs.LG

    Secure Approximation Guarantee for Cryptographically Private Empirical Risk Minimization

    Authors: Toshiyuki Takada, Hiroyuki Hanada, Yoshiji Yamada, Jun Sakuma, Ichiro Takeuchi

    Abstract: Privacy concern has been increasingly important in many machine learning (ML) problems. We study empirical risk minimization (ERM) problems under secure multi-party computation (MPC) frameworks. Main technical tools for MPC have been developed based on cryptography. One of limitations in current cryptographically private ML is that it is computationally intractable to evaluate non-linear functions… ▽ More

    Submitted 15 February, 2016; originally announced February 2016.

  29. Understanding Adversarial Training: Increasing Local Stability of Neural Nets through Robust Optimization

    Authors: Uri Shaham, Yutaro Yamada, Sahand Negahban

    Abstract: We propose a general framework for increasing local stability of Artificial Neural Nets (ANNs) using Robust Optimization (RO). We achieve this through an alternating minimization-maximization procedure, in which the loss of the network is minimized over perturbed examples that are generated at each parameter update. We show that adversarial training of ANNs is in fact robustification of the networ… ▽ More

    Submitted 16 January, 2016; v1 submitted 17 November, 2015; originally announced November 2015.