ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2005.07998
  4. Cited By
Encryption Inspired Adversarial Defense for Visual Classification

Encryption Inspired Adversarial Defense for Visual Classification

16 May 2020
Maungmaung Aprilpyone
Hitoshi Kiya
ArXivPDFHTML

Papers citing "Encryption Inspired Adversarial Defense for Visual Classification"

10 / 10 papers shown
Title
A Random Ensemble of Encrypted Vision Transformers for Adversarially
  Robust Defense
A Random Ensemble of Encrypted Vision Transformers for Adversarially Robust Defense
Ryota Iijima
Sayaka Shiota
Hitoshi Kiya
36
6
0
11 Feb 2024
Efficient Fine-Tuning with Domain Adaptation for Privacy-Preserving
  Vision Transformer
Efficient Fine-Tuning with Domain Adaptation for Privacy-Preserving Vision Transformer
Teru Nagamori
Sayaka Shiota
Hitoshi Kiya
32
1
0
10 Jan 2024
On the Transferability of Adversarial Examples between Encrypted Models
On the Transferability of Adversarial Examples between Encrypted Models
Miki Tanaka
Isao Echizen
Hitoshi Kiya
SILM
39
4
0
07 Sep 2022
An Encryption Method of ConvMixer Models without Performance Degradation
An Encryption Method of ConvMixer Models without Performance Degradation
Ryota Iijima
Hitoshi Kiya
21
1
0
25 Jul 2022
Image and Model Transformation with Secret Key for Vision Transformer
Image and Model Transformation with Secret Key for Vision Transformer
Hitoshi Kiya
Ryota Iijima
Maungmaung Aprilpyone
Yuma Kinoshita
ViT
31
21
0
12 Jul 2022
Adversarial Detector with Robust Classifier
Adversarial Detector with Robust Classifier
Takayuki Osakabe
Maungmaung Aprilpyone
Sayaka Shiota
Hitoshi Kiya
AAML
21
1
0
05 Feb 2022
An Overview of Compressible and Learnable Image Transformation with
  Secret Key and Its Applications
An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications
Hitoshi Kiya
AprilPyone Maungmaung
Yuma Kinoshita
Shoko Imaizumi
Sayaka Shiota
27
58
0
26 Jan 2022
CycleGAN without checkerboard artifacts for counter-forensics of
  fake-image detection
CycleGAN without checkerboard artifacts for counter-forensics of fake-image detection
Takayuki Osakabe
Miki Tanaka
Yuma Kinoshita
Hitoshi Kiya
20
13
0
01 Dec 2020
Block-wise Image Transformation with Secret Key for Adversarially Robust
  Defense
Block-wise Image Transformation with Secret Key for Adversarially Robust Defense
Maungmaung Aprilpyone
Hitoshi Kiya
29
57
0
02 Oct 2020
Training DNN Model with Secret Key for Model Protection
Training DNN Model with Secret Key for Model Protection
April Pyone Maung Maung
Hitoshi Kiya
8
24
0
06 Aug 2020
1