Skip to main content

Showing 1–8 of 8 results for author: Hasegawa, K

  1. arXiv:2406.19663  [pdf

    cs.HC cs.ET

    Aerial Push-Button with Two-Stage Tactile Feedback using Reflected Airborne Ultrasound Focus

    Authors: Hiroya Sugawara, Masaya Takasaki, Keisuke Hasegawa

    Abstract: We developed a new aerial push-button with tactile feedback using focused airborne ultrasound. This study has two significant novelties compared to past related studies: 1) ultrasound emitters are equipped behind the user's finger and reflected ultrasound emission that is focused just above the solid plane placed under the finger presents tactile feedback to a finger pad, and 2) tactile feedback i… ▽ More

    Submitted 1 July, 2024; v1 submitted 28 June, 2024; originally announced June 2024.

    Comments: 9 pages, 15 figures, original manuscript edited by Microsoft Word

  2. arXiv:2403.00990  [pdf, other

    cs.CL

    Formulation Comparison for Timeline Construction using LLMs

    Authors: Kimihiro Hasegawa, Nikhil Kandukuri, Susan Holm, Yukari Yamakawa, Teruko Mitamura

    Abstract: Constructing a timeline requires identifying the chronological order of events in an article. In prior timeline construction datasets, temporal orders are typically annotated by either event-to-time anchoring or event-to-event pairwise ordering, both of which suffer from missing temporal information. To mitigate the issue, we develop a new evaluation dataset, TimeSET, consisting of single-document… ▽ More

    Submitted 1 March, 2024; originally announced March 2024.

  3. arXiv:2312.07022  [pdf, other

    cs.CR cs.LG

    EdgePruner: Poisoned Edge Pruning in Graph Contrastive Learning

    Authors: Hiroya Kato, Kento Hasegawa, Seira Hidano, Kazuhide Fukushima

    Abstract: Graph Contrastive Learning (GCL) is unsupervised graph representation learning that can obtain useful representation of unknown nodes. The node representation can be utilized as features of downstream tasks. However, GCL is vulnerable to poisoning attacks as with existing learning models. A state-of-the-art defense cannot sufficiently negate adverse effects by poisoned graphs although such a defen… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

  4. arXiv:2207.03870  [pdf, other

    cs.CV

    BlindSpotNet: Seeing Where We Cannot See

    Authors: Taichi Fukuda, Kotaro Hasegawa, Shinya Ishizaki, Shohei Nobuhara, Ko Nishino

    Abstract: We introduce 2D blind spot estimation as a critical visual task for road scene understanding. By automatically detecting road regions that are occluded from the vehicle's vantage point, we can proactively alert a manual driver or a self-driving system to potential causes of accidents (e.g., draw attention to a road region from which a child may spring out). Detecting blind spots in full 3D would b… ▽ More

    Submitted 8 July, 2022; originally announced July 2022.

  5. arXiv:2205.13702  [pdf, other

    cs.CR

    R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training

    Authors: Kento Hasegawa, Seira Hidano, Kohei Nozawa, Shinsaku Kiyomoto, Nozomu Togawa

    Abstract: Hardware Trojans (HTs) have become a serious problem, and extermination of them is strongly required for enhancing the security and safety of integrated circuits. An effective solution is to identify HTs at the gate level via machine learning techniques. However, machine learning has specific vulnerabilities, such as adversarial examples. In reality, it has been reported that adversarial modified… ▽ More

    Submitted 26 May, 2022; originally announced May 2022.

  6. arXiv:2112.02213  [pdf, other

    cs.CR

    Node-wise Hardware Trojan Detection Based on Graph Learning

    Authors: Kento Hasegawa, Kazuki Yamashita, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa

    Abstract: In the fourth industrial revolution, securing the protection of the supply chain has become an ever-growing concern. One such cyber threat is a hardware Trojan (HT), a malicious modification to an IC. HTs are often identified in the hardware manufacturing process, but should be removed earlier, when the design is being specified. Machine learning-based HT detection in gate-level netlists is an eff… ▽ More

    Submitted 15 March, 2022; v1 submitted 3 December, 2021; originally announced December 2021.

  7. arXiv:2109.06417  [pdf, other

    cs.CL

    Cross-document Event Identity via Dense Annotation

    Authors: Adithya Pratapa, Zhengzhong Liu, Kimihiro Hasegawa, Linwei Li, Yukari Yamakawa, Shikun Zhang, Teruko Mitamura

    Abstract: In this paper, we study the identity of textual events from different documents. While the complex nature of event identity is previously studied (Hovy et al., 2013), the case of events across documents is unclear. Prior work on cross-document event coreference has two main drawbacks. First, they restrict the annotations to a limited set of event types. Second, they insufficiently tackle the conce… ▽ More

    Submitted 13 September, 2021; originally announced September 2021.

    Comments: CoNLL 2021 camera-ready

  8. Manual Character Transmission by Presenting Trajectories of 7mm-high Letters in One Second

    Authors: Keisuke Hasegawa, Tatsuma Sakurai, Yasutoshi Makino, Hiroyuki Shinoda

    Abstract: In this paper, we report a method of intuitively transmitting symbolic information to untrained users via only their hands without using any visual or auditory cues. Our simple concept is presenting three-dimensional letter trajectories to the user's hand via a stylus which is mechanically manipulated. By this simple method, in our experiments, participants were able to read 14 mm-high lower-case… ▽ More

    Submitted 1 October, 2015; v1 submitted 24 March, 2015; originally announced March 2015.

    Comments: Submitted in IEEE Transactions on Haptics