Search Results for author: Yusuke Kawamoto

Found 13 papers, 1 papers with code

Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy

no code implementations18 Jan 2023 Yusuke Kawamoto, Kazumasa Miyake, Koichi Konishi, Yutaka Oiwa

In this article, we propose the Artificial Intelligence Security Taxonomy to systematize the knowledge of threats, vulnerabilities, and security controls of machine-learning-based (ML-based) systems.

Formalizing Statistical Causality via Modal Logic

no code implementations30 Oct 2022 Yusuke Kawamoto, Tetsuya Sato, Kohei Suenaga

We propose a formal language for describing and explaining statistical causality.

Causal Inference

Sound and Relatively Complete Belief Hoare Logic for Statistical Hypothesis Testing Programs

no code implementations15 Aug 2022 Yusuke Kawamoto, Tetsuya Sato, Kohei Suenaga

We propose a new approach to formally describing the requirement for statistical inference and checking whether a program uses the statistical method appropriately.

Theme Aspect Argumentation Model for Handling Fallacies

no code implementations30 May 2022 Ryuta Arisaka, Ryoma Nakai, Yusuke Kawamoto, Takayuki Ito

We present core formal constraints for the theme aspect argumentation model and then more formal constraints that improve its fallacy identification capability.

Marketing

Information Leakage Games: Exploring Information as a Utility Function

no code implementations22 Dec 2020 Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, Catuscia Palamidessi

A common goal in the areas of secure information flow and privacy is to build effective defenses against unwanted leakage of information.

TransMIA: Membership Inference Attacks Using Transfer Shadow Training

no code implementations30 Nov 2020 Seira Hidano, Takao Murakami, Yusuke Kawamoto

Transfer learning has been widely studied and gained increasing popularity to improve the accuracy of machine learning models by transferring some knowledge acquired in different training.

BIG-bench Machine Learning Transfer Learning

Locality Sensitive Hashing with Extended Differential Privacy

no code implementations19 Oct 2020 Natasha Fernandes, Yusuke Kawamoto, Takao Murakami

Then we show that our mechanisms enable friend matching with high utility and rigorous privacy guarantees based on extended DP.

Towards Logical Specification of Statistical Machine Learning

no code implementations24 Jul 2019 Yusuke Kawamoto

Specifically, we propose a formal model for statistical classification based on a Kripke model, and formalize various notions of classification performance, robustness, and fairness of classifiers by using epistemic logic.

BIG-bench Machine Learning Classification +3

Local Distribution Obfuscation via Probability Coupling

no code implementations13 Jul 2019 Yusuke Kawamoto, Takao Murakami

We introduce a general model for the local obfuscation of probability distributions by probabilistic perturbation, e. g., by adding differentially private noise, and investigate its theoretical properties.

Local Obfuscation Mechanisms for Hiding Probability Distributions

no code implementations3 Dec 2018 Yusuke Kawamoto, Takao Murakami

To improve the tradeoff between distribution privacy and utility, we introduce a local obfuscation mechanism, called a tupling mechanism, that adds random dummy data to the output.

Cryptography and Security Databases Information Theory Information Theory

On the Anonymization of Differentially Private Location Obfuscation

no code implementations23 Jul 2018 Yusuke Kawamoto, Takao Murakami

Obfuscation techniques in location-based services (LBSs) have been shown useful to hide the concrete locations of service users, whereas they do not necessarily provide the anonymity.

Cryptography and Security Databases Information Theory Information Theory

Cannot find the paper you are looking for? You can Submit a new open access paper.