Search Results - "Koda, Satoru"
-
1
Computer vision-based phenotyping for improvement of plant productivity: a machine learning perspective
Published in Gigascience (01-01-2019)“…Employing computer vision to extract useful information from images and videos is becoming a key technique for identifying phenotypic changes in plants. Here,…”
Get full text
Journal Article -
2
Statistical and Machine Learning Approaches to Predict Gene Regulatory Networks From Transcriptome Datasets
Published in Frontiers in plant science (29-11-2018)“…Statistical and machine learning (ML)-based methods have recently advanced in construction of gene regulatory network (GRNs) based on high-throughput…”
Get full text
Journal Article -
3
Diurnal Transcriptome and Gene Network Represented through Sparse Modeling in Brachypodium distachyon
Published in Frontiers in plant science (28-11-2017)“…We report the comprehensive identification of periodic genes and their network inference, based on a gene co-expression analysis and an Auto-Regressive…”
Get full text
Journal Article -
4
Spatial and Structured SVM for Multilabel Image Classification
Published in IEEE transactions on geoscience and remote sensing (01-10-2018)“…We describe a novel multilabel classification approach based on a support vector machine (SVM) for the extremely high-resolution remote sensing images. Its…”
Get full text
Journal Article -
5
Unsupervised Spectral-Spatial Feature Extraction With Generalized Autoencoder for Hyperspectral Imagery
Published in IEEE geoscience and remote sensing letters (01-03-2020)“…In this letter, we discuss unsupervised feature extraction on hyperspectral imagery (HSI) and propose a novel approach based on autoencoder (AE) networks to…”
Get full text
Journal Article -
6
Bounding-box Watermarking: Defense against Model Extraction Attacks on Object Detectors
Published 20-11-2024“…Deep neural networks (DNNs) deployed in a cloud often allow users to query models via the APIs. However, these APIs expose the models to model extraction…”
Get full text
Journal Article -
7
OOD-Robust Boosting Tree for Intrusion Detection Systems
Published in 2023 International Joint Conference on Neural Networks (IJCNN) (18-06-2023)“…Out-of-distribution (OOD) detection is indispensable to security applications because they are deployed in the real world, and therefore, often face zero-day…”
Get full text
Conference Proceeding -
8
Parental legacy and regulatory novelty in Brachypodium diurnal transcriptomes accompanying their polyploidy
Published in NAR genomics and bioinformatics (01-09-2020)“…Abstract Polyploidy is a widespread phenomenon in eukaryotes that can lead to phenotypic novelty and has important implications for evolution and…”
Get full text
Journal Article -
9
YolOOD: Utilizing Object Detection Concepts for Multi-Label Out-of-Distribution Detection
Published in 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (16-06-2024)“…Out-of-distribution (OOD) detection has attracted a large amount of attention from the machine learning research community in recent years due to its…”
Get full text
Conference Proceeding -
10
Pros and Cons of Weight Pruning for Out-of-Distribution Detection: An Empirical Survey
Published in 2023 International Joint Conference on Neural Networks (IJCNN) (18-06-2023)“…Deep neural networks (DNNs) perform well on samples from the training distribution. However, DNNs deployed in the real world are exposed to out-of-distribution…”
Get full text
Conference Proceeding -
11
YolOOD: Utilizing Object Detection Concepts for Multi-Label Out-of-Distribution Detection
Published 05-12-2022“…Out-of-distribution (OOD) detection has attracted a large amount of attention from the machine learning research community in recent years due to its…”
Get full text
Journal Article -
12
Anomalous IP Address Detection on Traffic Logs Using Novel Word Embedding
Published in 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) (01-07-2020)“…This paper presents an anomalous IP address detection algorithm for network traffic logs. It is based on word embedding techniques derived from natural…”
Get full text
Conference Proceeding