default search action
Hiroshi Kera
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Nariki Tanaka, Hiroshi Kera, Kazuhiko Kawamoto:
Fourier analysis on robustness of graph convolutional neural networks for skeleton-based action recognition. Comput. Vis. Image Underst. 240: 103936 (2024) - [c14]Kosuke Sumiyasu, Kazuhiko Kawamoto, Hiroshi Kera:
Identifying Important Group of Pixels using Interactions. CVPR 2024: 6017-6026 - [c13]Soichiro Kumano, Hiroshi Kera, Toshihiko Yamasaki:
Theoretical Understanding of Learning from Adversarial Perturbations. ICLR 2024 - [c12]Hiroshi Kera, Yuki Ishihara, Tristan Vaccon, Kazuhiro Yokoyama:
Gröbner basis computation via learning. SCSS (Work in Progress) 2024: 51-56 - [i25]Kosuke Sumiyasu, Kazuhiko Kawamoto, Hiroshi Kera:
Identifying Important Group of Pixels using Interactions. CoRR abs/2401.03785 (2024) - [i24]Soichiro Kumano, Hiroshi Kera, Toshihiko Yamasaki:
Theoretical Understanding of Learning from Adversarial Perturbations. CoRR abs/2402.10470 (2024) - [i23]Yusuke Marumo, Kazuhiko Kawamoto, Hiroshi Kera:
Matching Non-Identical Objects. CoRR abs/2403.08227 (2024) - [i22]Ayumu Ueyama, Kazuhiko Kawamoto, Hiroshi Kera:
VarteX: Enhancing Weather Forecast through Distributed Variable Representation. CoRR abs/2406.19615 (2024) - [i21]Tomoyasu Nanaumi, Kazuhiko Kawamoto, Hiroshi Kera:
Low-Quality Image Detection by Hierarchical VAE. CoRR abs/2408.10885 (2024) - 2023
- [j6]Nan Wu, Hiroshi Kera, Kazuhiko Kawamoto:
Improving zero-shot action recognition using human instruction with text description. Appl. Intell. 53(20): 24142-24156 (2023) - [j5]Soichiro Kumano, Hiroshi Kera, Toshihiko Yamasaki:
Sparse fooling images: Fooling machine perception through unrecognizable images. Pattern Recognit. Lett. 172: 259-265 (2023) - [j4]Takeshi Haga, Hiroshi Kera, Kazuhiko Kawamoto:
Sequential Variational Autoencoder with Adversarial Classifier for Video Disentanglement. Sensors 23(5): 2515 (2023) - [c11]Elias Samuel Wirth, Hiroshi Kera, Sebastian Pokutta:
Approximate Vanishing Ideal Computations at Scale. ICLR 2023 - [c10]Soichiro Kumano, Hiroshi Kera, Toshihiko Yamasaki:
Adversarial Training from Mean Field Perspective. NeurIPS 2023 - [i20]Nan Wu, Hiroshi Kera, Kazuhiko Kawamoto:
Improving Accuracy of Zero-Shot Action Recognition with Handcrafted Features. CoRR abs/2301.08874 (2023) - [i19]Chun Yang Tan, Kazuhiko Kawamoto, Hiroshi Kera:
Exploiting Frequency Spectrum of Adversarial Images for General Robustness. CoRR abs/2305.08439 (2023) - [i18]Nariki Tanaka, Hiroshi Kera, Kazuhiko Kawamoto:
Fourier Analysis on Robustness of Graph Convolutional Neural Networks for Skeleton-based Action Recognition. CoRR abs/2305.17939 (2023) - [i17]Hiroshi Kera, Yuki Ishihara, Yuta Kambe, Tristan Vaccon, Kazuhiro Yokoyama:
Learning to Compute Gröbner Bases. CoRR abs/2311.12904 (2023) - 2022
- [j3]Kazuma Fujii, Hiroshi Kera, Kazuhiko Kawamoto:
Adversarially Trained Object Detector for Unsupervised Domain Adaptation. IEEE Access 10: 59534-59543 (2022) - [c9]Nariki Tanaka, Hiroshi Kera, Kazuhiko Kawamoto:
Adversarial Bone Length Attack on Action Recognition. AAAI 2022: 2335-2343 - [c8]Hiroshi Kera:
Border Basis Computation with Gradient-Weighted Normalization. ISSAC 2022: 225-234 - [c7]Takuto Otomo, Hiroshi Kera, Kazuhiko Kawamoto:
Adversarial joint attacks on legged robots. SMC 2022: 676-681 - [c6]Takaaki Azakami, Hiroshi Kera, Kazuhiko Kawamoto:
Adversarial Body Shape Search for Legged Robots. SMC 2022: 682-687 - [i16]Chun Yang Tan, Kazuhiko Kawamoto, Hiroshi Kera:
Adversarial amplitude swap towards robust image classifiers. CoRR abs/2203.07138 (2022) - [i15]Takuto Otomo, Hiroshi Kera, Kazuhiko Kawamoto:
Adversarial joint attacks on legged robots. CoRR abs/2205.10098 (2022) - [i14]Takaaki Azakami, Hiroshi Kera, Kazuhiko Kawamoto:
Adversarial Body Shape Search for Legged Robots. CoRR abs/2205.10187 (2022) - [i13]Soichiro Kumano, Hiroshi Kera, Toshihiko Yamasaki:
Superclass Adversarial Attack. CoRR abs/2205.14629 (2022) - [i12]Elias Samuel Wirth, Hiroshi Kera, Sebastian Pokutta:
Approximate Vanishing Ideal Computations at Scale. CoRR abs/2207.01236 (2022) - [i11]Kosuke Sumiyasu, Kazuhiko Kawamoto, Hiroshi Kera:
Game-Theoretic Understanding of Misclassification. CoRR abs/2210.03349 (2022) - [i10]Ryosuke Masuya, Yuichi Ike, Hiroshi Kera:
Vanishing Component Analysis with Contrastive Normalization. CoRR abs/2210.16171 (2022) - 2021
- [j2]Kevin Richard G. Operiano, Wanchalerm Pora, Hitoshi Iba, Hiroshi Kera:
Evolving Architectures With Gradient Misalignment Toward Low Adversarial Transferability. IEEE Access 9: 164379-164393 (2021) - [i9]Hiroshi Kera, Yoshihiko Hasegawa:
Monomial-agnostic computation of vanishing ideals. CoRR abs/2101.00243 (2021) - [i8]Hiroshi Kera:
Border Basis Computation with Gradient-Weighted Norm. CoRR abs/2101.00401 (2021) - [i7]Kazuma Fujii, Hiroshi Kera, Kazuhiko Kawamoto:
Adversarially Trained Object Detector for Unsupervised Domain Adaptation. CoRR abs/2109.05751 (2021) - [i6]Nariki Tanaka, Hiroshi Kera, Kazuhiko Kawamoto:
Adversarial Bone Length Attack on Action Recognition. CoRR abs/2109.05830 (2021) - [i5]Kevin Richard G. Operiano, Wanchalerm Pora, Hitoshi Iba, Hiroshi Kera:
Evolving Architectures with Gradient Misalignment toward Low Adversarial Transferability. CoRR abs/2109.05919 (2021) - [i4]Wataru Okamoto, Hiroshi Kera, Kazuhiko Kawamoto:
Reinforcement Learning with Adaptive Curriculum Dynamics Randomization for Fault-Tolerant Robot Control. CoRR abs/2111.10005 (2021) - 2020
- [c5]Hiroshi Kera, Yoshihiko Hasegawa:
Gradient Boosts the Approximate Vanishing Ideal. AAAI 2020: 4428-4435 - [i3]Soichiro Kumano, Hiroshi Kera, Toshihiko Yamasaki:
Sparse Fooling Images: Fooling Machine Perception through Unrecognizable Images. CoRR abs/2012.03843 (2020)
2010 – 2019
- 2019
- [j1]Hiroshi Kera, Yoshihiko Hasegawa:
Spurious Vanishing Problem in Approximate Vanishing Ideal. IEEE Access 7: 178961-178976 (2019) - [i2]Hiroshi Kera, Yoshihiko Hasegawa:
Spurious Vanishing Problem in Approximate Vanishing Ideal. CoRR abs/1901.08798 (2019) - [i1]Hiroshi Kera, Yoshihiko Hasegawa:
Gradient Boosts the Approximate Vanishing Ideal. CoRR abs/1911.04174 (2019) - 2018
- [c4]Hiroshi Kera, Yoshihiko Hasegawa:
Approximate Vanishing Ideal via Data Knotting. AAAI 2018: 3399-3406 - 2017
- [c3]Yifei Huang, Minjie Cai, Hiroshi Kera, Ryo Yonetani, Keita Higuchi, Yoichi Sato:
Temporal Localization and Spatial Segmentation of Joint Attention in Multiple First-Person Videos. ICCV Workshops 2017: 2313-2321 - 2016
- [c2]Hiroshi Kera, Hitoshi Iba:
Vanishing ideal genetic programming. CEC 2016: 5018-5025 - [c1]Hiroshi Kera, Ryo Yonetani, Keita Higuchi, Yoichi Sato:
Discovering Objects of Joint Attention via First-Person Sensing. CVPR Workshops 2016: 361-369
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint