Skip to main content

Showing 1–19 of 19 results for author: Sasaki, H

  1. arXiv:2405.19760  [pdf, ps, other

    stat.ML cs.LG

    Identifiability of a statistical model with two latent vectors: Importance of the dimensionality relation and application to graph embedding

    Authors: Hiroaki Sasaki

    Abstract: Identifiability of statistical models is a key notion in unsupervised representation learning. Recent work of nonlinear independent component analysis (ICA) employs auxiliary data and has established identifiable conditions. This paper proposes a statistical model of two latent vectors with single auxiliary data generalizing nonlinear ICA, and establishes various identifiability conditions. Unlike… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

  2. arXiv:2402.10781  [pdf, other

    cs.IT

    Towards 6G Evolution: Three Enhancements, Three Innovations, and Three Major Challenges

    Authors: Rohit Singh, Aryan Kaushik, Wonjae Shin, Marco Di Renzo, Vincenzo Sciancalepore, Doohwan Lee, Hirofumi Sasaki, Arman Shojaeifard, Octavia A. Dobre

    Abstract: Over the past few decades, wireless communication has witnessed remarkable growth, experiencing several transformative changes. This article aims to provide a comprehensive overview of wireless communication technologies, from the foundations to the recent wireless advances. Specifically, we take a neutral look at the state-of-the-art technologies for 5G and the ongoing evolutions towards 6G, revi… ▽ More

    Submitted 16 February, 2024; originally announced February 2024.

    Comments: 8 pages, 4 figures, 1 table

  3. arXiv:2303.12375  [pdf, other

    cs.RO cs.LG

    Disturbance Injection under Partial Automation: Robust Imitation Learning for Long-horizon Tasks

    Authors: Hirotaka Tahara, Hikaru Sasaki, Hanbit Oh, Edgar Anarossi, Takamitsu Matsubara

    Abstract: Partial Automation (PA) with intelligent support systems has been introduced in industrial machinery and advanced automobiles to reduce the burden of long hours of human operation. Under PA, operators perform manual operations (providing actions) and operations that switch to automatic/manual mode (mode-switching). Since PA reduces the total duration of manual operation, these two action and mode-… ▽ More

    Submitted 22 March, 2023; originally announced March 2023.

    Comments: 8 pages, Accepted by Robotics and Automation Letters (RA-L) 2023

  4. arXiv:2211.03393  [pdf, other

    cs.RO

    Bayesian Disturbance Injection: Robust Imitation Learning of Flexible Policies for Robot Manipulation

    Authors: Hanbit Oh, Hikaru Sasaki, Brendan Michael, Takamitsu Matsubara

    Abstract: Humans demonstrate a variety of interesting behavioral characteristics when performing tasks, such as selecting between seemingly equivalent optimal actions, performing recovery actions when deviating from the optimal trajectory, or moderating actions in response to sensed risks. However, imitation learning, which attempts to teach robots to perform these same tasks from observations of human demo… ▽ More

    Submitted 7 November, 2022; originally announced November 2022.

    Comments: 69 pages, 9 figures, accepted by Elsevier Neural Networks - Journal

  5. arXiv:2205.04195  [pdf, other

    cs.RO

    Disturbance-Injected Robust Imitation Learning with Task Achievement

    Authors: Hirotaka Tahara, Hikaru Sasaki, Hanbit Oh, Brendan Michael, Takamitsu Matsubara

    Abstract: Robust imitation learning using disturbance injections overcomes issues of limited variation in demonstrations. However, these methods assume demonstrations are optimal, and that policy stabilization can be learned via simple augmentations. In real-world scenarios, demonstrations are often of diverse-quality, and disturbance injection instead learns sub-optimal policies that fail to replicate desi… ▽ More

    Submitted 9 May, 2022; originally announced May 2022.

    Comments: 7 pages, Accepted by the 2022 International Conference on Robotics and Automation (ICRA 2022)

  6. arXiv:2205.03552  [pdf, other

    cs.RO

    Gaussian Process Self-triggered Policy Search in Weakly Observable Environments

    Authors: Hikaru Sasaki, Terushi Hirabayashi, Kaoru Kawabata, Takamitsu Matsubara

    Abstract: The environments of such large industrial machines as waste cranes in waste incineration plants are often weakly observable, where little information about the environmental state is contained in the observations due to technical difficulty or maintenance cost (e.g., no sensors for observing the state of the garbage to be handled). Based on the findings that skilled operators in such environments… ▽ More

    Submitted 7 May, 2022; originally announced May 2022.

    Comments: Accepted for IEEE ICRA2022

  7. arXiv:2111.12701  [pdf, other

    cs.CV cs.LG

    Unleashing Transformers: Parallel Token Prediction with Discrete Absorbing Diffusion for Fast High-Resolution Image Generation from Vector-Quantized Codes

    Authors: Sam Bond-Taylor, Peter Hessey, Hiroshi Sasaki, Toby P. Breckon, Chris G. Willcocks

    Abstract: Whilst diffusion probabilistic models can generate high quality image content, key limitations remain in terms of both generating high-resolution imagery and their associated high computational requirements. Recent Vector-Quantized image models have overcome this limitation of image resolution but are prohibitively slow and unidirectional as they generate tokens via element-wise autoregressive sam… ▽ More

    Submitted 24 November, 2021; originally announced November 2021.

    Comments: 19 pages, 14 figures

    MSC Class: 68T01 (Primary); 68T07 (Secondary) ACM Class: I.5.0; I.4.0; G.3

  8. arXiv:2106.07125  [pdf, other

    cs.RO

    Variational Policy Search using Sparse Gaussian Process Priors for Learning Multimodal Optimal Actions

    Authors: Hikaru Sasaki, Takamitsu Matsubara

    Abstract: Policy search reinforcement learning has been drawing much attention as a method of learning a robot control policy. In particular, policy search using such non-parametric policies as Gaussian process regression can learn optimal actions with high-dimensional and redundant sensors as input. However, previous methods implicitly assume that the optimal action becomes unique for each state. This assu… ▽ More

    Submitted 13 June, 2021; originally announced June 2021.

    Comments: Accepted by Neural Networks

  9. arXiv:2104.05358  [pdf, other

    cs.CV cs.LG eess.IV

    UNIT-DDPM: UNpaired Image Translation with Denoising Diffusion Probabilistic Models

    Authors: Hiroshi Sasaki, Chris G. Willcocks, Toby P. Breckon

    Abstract: We propose a novel unpaired image-to-image translation method that uses denoising diffusion probabilistic models without requiring adversarial training. Our method, UNpaired Image Translation with Denoising Diffusion Probabilistic Models (UNIT-DDPM), trains a generative model to infer the joint distribution of images over both domains as a Markov chain by minimising a denoising score matching obje… ▽ More

    Submitted 12 April, 2021; originally announced April 2021.

    Comments: 10 pages, 8 figures

  10. Bayesian Disturbance Injection: Robust Imitation Learning of Flexible Policies

    Authors: Hanbit Oh, Hikaru Sasaki, Brendan Michael, Takamitsu Matsubara

    Abstract: Scenarios requiring humans to choose from multiple seemingly optimal actions are commonplace, however standard imitation learning often fails to capture this behavior. Instead, an over-reliance on replicating expert actions induces inflexible and unstable policies, leading to poor generalizability in an application. To address the problem, this paper presents the first imitation learning framework… ▽ More

    Submitted 7 November, 2022; v1 submitted 25 March, 2021; originally announced March 2021.

    Comments: 7 pages, Accepted by the 2021 International Conference on Robotics and Automation (ICRA 2021)

  11. arXiv:2101.02083  [pdf, other

    cs.LG eess.SP stat.ML

    Representation learning for maximization of MI, nonlinear ICA and nonlinear subspaces with robust density ratio estimation

    Authors: Hiroaki Sasaki, Takashi Takenouchi

    Abstract: Contrastive learning is a recent promising approach in unsupervised representation learning where a feature representation of data is learned by solving a pseudo classification problem from unlabelled data. However, it is not straightforward to understand what representation contrastive learning yields. In addition, contrastive learning is often based on the maximum likelihood estimation, which te… ▽ More

    Submitted 8 August, 2022; v1 submitted 6 January, 2021; originally announced January 2021.

  12. arXiv:2009.08005  [pdf

    physics.med-ph cs.CV cs.CY

    Model-based approach for analyzing prevalence of nuclear cataracts in elderly residents

    Authors: Sachiko Kodera, Akimasa Hirata, Fumiaki Miura, Essam A. Rashed, Natsuko Hatsusaka, Naoki Yamamoto, Eri Kubo, Hiroshi Sasaki

    Abstract: Recent epidemiological studies have hypothesized that the prevalence of cortical cataracts is closely related to ultraviolet radiation. However, the prevalence of nuclear cataracts is higher in elderly people in tropical areas than in temperate areas. The dominant factors inducing nuclear cataracts have been widely debated. In this study, the temperature increase in the lens due to exposure to amb… ▽ More

    Submitted 16 September, 2020; originally announced September 2020.

    Comments: Submitted to Computers in Biology and Medicine

    Journal ref: Computers in Biology and Medicine, 2020

  13. arXiv:2005.02436  [pdf, other

    cs.CV cs.LG eess.IV

    Data Augmentation via Mixed Class Interpolation using Cycle-Consistent Generative Adversarial Networks Applied to Cross-Domain Imagery

    Authors: Hiroshi Sasaki, Chris G. Willcocks, Toby P. Breckon

    Abstract: Machine learning driven object detection and classification within non-visible imagery has an important role in many fields such as night vision, all-weather surveillance and aviation security. However, such applications often suffer due to the limited quantity and variety of non-visible spectral domain imagery, in contrast to the high data availability of visible-band imagery that readily enables… ▽ More

    Submitted 1 January, 2021; v1 submitted 5 May, 2020; originally announced May 2020.

    Comments: 9 pages, 9 figures, accepted at the 25th International Conference on Pattern Recognition (ICPR 2020)

  14. arXiv:1911.00265  [pdf, other

    cs.LG stat.ML

    Robust contrastive learning and nonlinear ICA in the presence of outliers

    Authors: Hiroaki Sasaki, Takashi Takenouchi, Ricardo Monti, Aapo Hyvärinen

    Abstract: Nonlinear independent component analysis (ICA) is a general framework for unsupervised representation learning, and aimed at recovering the latent variables in data. Recent practical methods perform nonlinear ICA by solving a series of classification problems based on logistic regression. However, it is well-known that logistic regression is vulnerable to outliers, and thus the performance can be… ▽ More

    Submitted 1 November, 2019; originally announced November 2019.

  15. arXiv:1910.08280  [pdf, other

    stat.ML cs.LG

    Robust modal regression with direct log-density derivative estimation

    Authors: Hiroaki Sasaki, Tomoya Sakai, Takafumi Kanamori

    Abstract: Modal regression is aimed at estimating the global mode (i.e., global maximum) of the conditional density function of the output variable given input variables, and has led to regression methods robust against heavy-tailed or skewed noises. The conditional mode is often estimated through maximization of the modal regression risk (MRR). In order to apply a gradient method for the maximization, the… ▽ More

    Submitted 18 October, 2019; originally announced October 2019.

  16. arXiv:1906.01838  [pdf, other

    cs.CR cs.AR

    Practical Byte-Granular Memory Blacklisting using Califorms

    Authors: Hiroshi Sasaki, Miguel A. Arroyo, M. Tarek Ibn Ziad, Koustubha Bhat, Kanad Sinha, Simha Sethumadhavan

    Abstract: Recent rapid strides in memory safety tools and hardware have improved software quality and security. While coarse-grained memory safety has improved, achieving memory safety at the granularity of individual objects remains a challenge due to high performance overheads which can be between ~1.7x-2.2x. In this paper, we present a novel idea called Califorms, and associated program observations, to… ▽ More

    Submitted 10 June, 2019; v1 submitted 5 June, 2019; originally announced June 2019.

  17. arXiv:1806.01754  [pdf, ps, other

    stat.ML cs.LG

    Neural-Kernelized Conditional Density Estimation

    Authors: Hiroaki Sasaki, Aapo Hyvärinen

    Abstract: Conditional density estimation is a general framework for solving various problems in machine learning. Among existing methods, non-parametric and/or kernel-based methods are often difficult to use on large datasets, while methods based on neural networks usually make restrictive parametric assumptions on the probability densities. Here, we propose a novel method for estimating the conditional den… ▽ More

    Submitted 5 June, 2018; originally announced June 2018.

  18. arXiv:1805.08651  [pdf, other

    stat.ML cs.LG

    Nonlinear ICA Using Auxiliary Variables and Generalized Contrastive Learning

    Authors: Aapo Hyvarinen, Hiroaki Sasaki, Richard E. Turner

    Abstract: Nonlinear ICA is a fundamental problem for unsupervised representation learning, emphasizing the capacity to recover the underlying latent variables generating the data (i.e., identifiability). Recently, the very first identifiability proofs for nonlinear ICA have been proposed, leveraging the temporal structure of the independent components. Here, we propose a general framework for nonlinear ICA,… ▽ More

    Submitted 4 February, 2019; v1 submitted 22 May, 2018; originally announced May 2018.

    Comments: Camera-ready version of article accepted for AISTATS2019

  19. Key Rate of the B92 Quantum Key Distribution Protocol with Finite Qubits

    Authors: Hiroaki Sasaki, Ryutaroh Matsumoto, Tomohiko Uyematsu

    Abstract: The key rate of the B92 quantum key distribution protocol had not been reported before this research when the number of qubits is finite. We compute it by using the security analysis framework proposed by Scarani and Renner in 2008.

    Submitted 21 April, 2015; originally announced April 2015.

    Comments: 4 pages, 2 figures, IEEEtran.cls. Some overlap with arXiv:1301.5083. Accepted for presentation in 2015 IEEE International Symposium on Information Theory, Hong Kong, June 14-19, 2015