Search Results for author: Akinori F. Ebihara

Found 6 papers, 4 papers with code

Convolutional Neural Networks for Time-dependent Classification of Variable-length Time Series

no code implementations8 Jul 2022 Azusa Sawada, Taiki Miyagawa, Akinori F. Ebihara, Shoji Yachida, Toshinori Hosoi

To resolve this tradeoff, we propose Adaptive Multi-scale Pooling, which aggregates features from an adaptive number of layers, i. e., only the first few layers for short data and more layers for long data.

Time Series Time Series Analysis

Joint Feature Distribution Alignment Learning for NIR-VIS and VIS-VIS Face Recognition

no code implementations25 Apr 2022 Takaya Miyamoto, Hiroshi Hashimoto, Akihiro Hayasaka, Akinori F. Ebihara, Hitoshi Imaoka

Furthermore, comparative experiments with existing state-of-the-art HFR methods show that our method achieves a comparable HFR performance on the Oulu-CASIA NIR&VIS dataset with less degradation of VIS performance.

Face Recognition Heterogeneous Face Recognition +1

The Power of Log-Sum-Exp: Sequential Density Ratio Matrix Estimation for Speed-Accuracy Optimization

1 code implementation28 May 2021 Taiki Miyagawa, Akinori F. Ebihara

We propose a model for multiclass classification of time series to make a prediction as early and as accurate as possible.

Action Recognition Density Ratio Estimation +3

Sequential Density Ratio Estimation for Simultaneous Optimization of Speed and Accuracy

2 code implementations ICLR 2021 Akinori F. Ebihara, Taiki Miyagawa, Kazuyuki Sakurai, Hitoshi Imaoka

Classifying sequential data as early and as accurately as possible is a challenging yet critical problem, especially when a sampling cost is high.

Decision Making Density Ratio Estimation

Specular- and Diffuse-reflection-based Face Spoofing Detection for Mobile Devices

1 code implementation29 Jul 2019 Akinori F. Ebihara, Kazuyuki Sakurai, Hitoshi Imaoka

In light of the rising demand for biometric-authentication systems, preventing face spoofing attacks is a critical issue for the safe deployment of face recognition systems.

Face Presentation Attack Detection Face Recognition

Cannot find the paper you are looking for? You can Submit a new open access paper.