ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2006.01342
  4. Cited By
A GAN-Based Image Transformation Scheme for Privacy-Preserving Deep
  Neural Networks

A GAN-Based Image Transformation Scheme for Privacy-Preserving Deep Neural Networks

2 June 2020
Warit Sirichotedumrong
Hitoshi Kiya
    PICV
ArXiv (abs)PDFHTML

Papers citing "A GAN-Based Image Transformation Scheme for Privacy-Preserving Deep Neural Networks"

33 / 33 papers shown
Title
Visually Image Encryption and Compression Using a CNN-Based Auto Encoder
Visually Image Encryption and Compression Using a CNN-Based Auto Encoder
Mahdi Madani
El-Bay Bourennane
38
0
0
01 Apr 2025
Attack GAN (AGAN ): A new Security Evaluation Tool for Perceptual
  Encryption
Attack GAN (AGAN ): A new Security Evaluation Tool for Perceptual Encryption
Umesh Kashyap
Sudev Kumar Padhi
Sk. Subidh Ali
AAML
57
1
0
09 Jul 2024
Privacy-Preserving Deep Learning Using Deformable Operators for Secure
  Task Learning
Privacy-Preserving Deep Learning Using Deformable Operators for Secure Task Learning
Fabian Perez
Jhon Lopez
Henry Arguello
58
0
0
08 Apr 2024
Ensembler: Combating model inversion attacks using model ensemble during
  collaborative inference
Ensembler: Combating model inversion attacks using model ensemble during collaborative inference
Dancheng Liu
Jinjun Xiong
MIACVFedMLAAML
80
0
0
19 Jan 2024
GaitGuard: Towards Private Gait in Mixed Reality
GaitGuard: Towards Private Gait in Mixed Reality
Diana Romero
Ruchi Jagdish Patel
A. Markopoulou
Salma Elmalaki
81
1
0
07 Dec 2023
Diff-Privacy: Diffusion-based Face Privacy Protection
Diff-Privacy: Diffusion-based Face Privacy Protection
Xiao He
Mingrui Zhu
Dongxin Chen
N. Wang
Xinbo Gao
DiffM
105
18
0
11 Sep 2023
Block-Wise Encryption for Reliable Vision Transformer models
Block-Wise Encryption for Reliable Vision Transformer models
Hitoshi Kiya
Ryota Iijima
Teru Nagamori
95
1
0
15 Aug 2023
Re-thinking Model Inversion Attacks Against Deep Neural Networks
Re-thinking Model Inversion Attacks Against Deep Neural Networks
Ngoc-Bao Nguyen
Keshigeyan Chandrasegaran
Milad Abdollahzadeh
Ngai-Man Cheung
86
44
0
04 Apr 2023
Color-NeuraCrypt: Privacy-Preserving Color-Image Classification Using
  Extended Random Neural Networks
Color-NeuraCrypt: Privacy-Preserving Color-Image Classification Using Extended Random Neural Networks
Zheng Qi
AprilPyone Maungmaung
Hitoshi Kiya
61
2
0
12 Jan 2023
A Privacy Preserving Method with a Random Orthogonal Matrix for
  ConvMixer Models
A Privacy Preserving Method with a Random Orthogonal Matrix for ConvMixer Models
Rei Aso
Tatsuya Chuman
Hitoshi Kiya
PICV
48
0
0
10 Jan 2023
Hiding Visual Information via Obfuscating Adversarial Perturbations
Hiding Visual Information via Obfuscating Adversarial Perturbations
Zhigang Su
Dawei Zhou
Nannan Wangu
Decheng Liu
Zhen Wang
Xinbo Gao
AAML
39
11
0
30 Sep 2022
Access Control with Encrypted Feature Maps for Object Detection Models
Access Control with Encrypted Feature Maps for Object Detection Models
Teru Nagamori
Hiroki Ito
AprilPyone Maungmaung
Hitoshi Kiya
63
2
0
29 Sep 2022
On the Adversarial Transferability of ConvMixer Models
On the Adversarial Transferability of ConvMixer Models
Ryota Iijima
Miki Tanaka
Isao Echizen
Hitoshi Kiya
AAML
60
2
0
19 Sep 2022
StyleGAN Encoder-Based Attack for Block Scrambled Face Images
StyleGAN Encoder-Based Attack for Block Scrambled Face Images
AprilPyone Maungmaung
Hitoshi Kiya
CVBMPICV
79
4
0
16 Sep 2022
On the Transferability of Adversarial Examples between Encrypted Models
On the Transferability of Adversarial Examples between Encrypted Models
Miki Tanaka
Isao Echizen
Hitoshi Kiya
SILM
84
4
0
07 Sep 2022
Privacy-Preserving Image Classification Using ConvMixer with Adaptive
  Permutation Matrix
Privacy-Preserving Image Classification Using ConvMixer with Adaptive Permutation Matrix
Zheng Qi
AprilPyone Maungmaung
Hitoshi Kiya
PICV
61
4
0
04 Aug 2022
An Encryption Method of ConvMixer Models without Performance Degradation
An Encryption Method of ConvMixer Models without Performance Degradation
Ryota Iijima
Hitoshi Kiya
60
1
0
25 Jul 2022
Security Evaluation of Compressible Image Encryption for
  Privacy-Preserving Image Classification against Ciphertext-only Attacks
Security Evaluation of Compressible Image Encryption for Privacy-Preserving Image Classification against Ciphertext-only Attacks
Tatsuya Chuman
Hitoshi Kiya
54
0
0
17 Jul 2022
Image and Model Transformation with Secret Key for Vision Transformer
Image and Model Transformation with Secret Key for Vision Transformer
Hitoshi Kiya
Ryota Iijima
Maungmaung Aprilpyone
Yuma Kinoshita
ViT
76
21
0
12 Jul 2022
Access Control of Semantic Segmentation Models Using Encrypted Feature
  Maps
Access Control of Semantic Segmentation Models Using Encrypted Feature Maps
Hiroki Ito
AprilPyone Maungmaung
Sayaka Shiota
Hitoshi Kiya
43
4
0
11 Jun 2022
Privacy-Preserving Image Classification Using Vision Transformer
Privacy-Preserving Image Classification Using Vision Transformer
Zheng Qi
AprilPyone Maungmaung
Yuma Kinoshita
Hitoshi Kiya
ViT
72
19
0
24 May 2022
An Overview of Compressible and Learnable Image Transformation with
  Secret Key and Its Applications
An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications
Hitoshi Kiya
AprilPyone Maungmaung
Yuma Kinoshita
Shoko Imaizumi
Sayaka Shiota
84
58
0
26 Jan 2022
Leveraging Image-based Generative Adversarial Networks for Time Series
  Generation
Leveraging Image-based Generative Adversarial Networks for Time Series Generation
Justin Hellermann
Stefan Lessmann
GANAI4TS
62
4
0
15 Dec 2021
Deep Joint Source-Channel Coding for Image Transmission with Visual
  Protection
Deep Joint Source-Channel Coding for Image Transmission with Visual Protection
Jia-lin Xu
Bo Ai
Wei Chen
Ning Wang
Miguel R. D. Rodrigues
94
17
0
05 Nov 2021
Access Control Using Spatially Invariant Permutation of Feature Maps for
  Semantic Segmentation Models
Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models
Hiroki Ito
Maungmaung Aprilpyone
Hitoshi Kiya
58
5
0
03 Sep 2021
Protecting Semantic Segmentation Models by Using Block-wise Image
  Encryption with Secret Key from Unauthorized Access
Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access
Hiroki Ito
Maungmaung Aprilpyone
Hitoshi Kiya
23
0
0
20 Jul 2021
A Protection Method of Trained CNN Model with Secret Key from
  Unauthorized Access
A Protection Method of Trained CNN Model with Secret Key from Unauthorized Access
AprilPyone Maungmaung
Hitoshi Kiya
47
22
0
31 May 2021
A Lightweight Privacy-Preserving Scheme Using Label-based Pixel Block
  Mixing for Image Classification in Deep Learning
A Lightweight Privacy-Preserving Scheme Using Label-based Pixel Block Mixing for Image Classification in Deep Learning
Yuexin Xiang
Tiantian Li
Wei Ren
Tianqing Zhu
Kim-Kwang Raymond Choo
42
5
0
19 May 2021
Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation
  with Secret Key
Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret Key
Maungmaung Aprilpyone
Hitoshi Kiya
106
18
0
09 Apr 2021
Transfer Learning-Based Model Protection With Secret Key
Transfer Learning-Based Model Protection With Secret Key
Maungmaung Aprilpyone
Hitoshi Kiya
FedML
41
5
0
05 Mar 2021
Difficulty in estimating visual information from randomly sampled images
Difficulty in estimating visual information from randomly sampled images
Masaki Kitayama
Hitoshi Kiya
15
0
0
16 Dec 2020
Visual Security Evaluation of Learnable Image Encryption Methods against
  Ciphertext-only Attacks
Visual Security Evaluation of Learnable Image Encryption Methods against Ciphertext-only Attacks
Warit Sirichotedumrong
Hitoshi Kiya
AAML
34
9
0
13 Oct 2020
Image Transformation Network for Privacy-Preserving Deep Neural Networks
  and Its Security Evaluation
Image Transformation Network for Privacy-Preserving Deep Neural Networks and Its Security Evaluation
Hiroki Ito
Yuma Kinoshita
Hitoshi Kiya
51
16
0
07 Aug 2020
1