ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2010.00801
  4. Cited By
Block-wise Image Transformation with Secret Key for Adversarially Robust
  Defense

Block-wise Image Transformation with Secret Key for Adversarially Robust Defense

2 October 2020
Maungmaung Aprilpyone
Hitoshi Kiya
ArXivPDFHTML

Papers citing "Block-wise Image Transformation with Secret Key for Adversarially Robust Defense"

19 / 19 papers shown
Title
Efficient Fine-Tuning with Domain Adaptation for Privacy-Preserving
  Vision Transformer
Efficient Fine-Tuning with Domain Adaptation for Privacy-Preserving Vision Transformer
Teru Nagamori
Sayaka Shiota
Hitoshi Kiya
24
1
0
10 Jan 2024
Domain Adaptation for Efficiently Fine-tuning Vision Transformer with
  Encrypted Images
Domain Adaptation for Efficiently Fine-tuning Vision Transformer with Encrypted Images
Teru Nagamori
Sayaka Shiota
Hitoshi Kiya
29
1
0
05 Sep 2023
Security Evaluation of Compressible and Learnable Image Encryption
  Against Jigsaw Puzzle Solver Attacks
Security Evaluation of Compressible and Learnable Image Encryption Against Jigsaw Puzzle Solver Attacks
Tatsuya Chuman
Nobutaka Ono
Hitoshi Kiya
23
0
0
04 Aug 2023
Generative Model-Based Attack on Learnable Image Encryption for
  Privacy-Preserving Deep Learning
Generative Model-Based Attack on Learnable Image Encryption for Privacy-Preserving Deep Learning
AprilPyone Maungmaung
Hitoshi Kiya
FedML
DiffM
24
3
0
09 Mar 2023
A Jigsaw Puzzle Solver-based Attack on Block-wise Image Encryption for
  Privacy-preserving DNNs
A Jigsaw Puzzle Solver-based Attack on Block-wise Image Encryption for Privacy-preserving DNNs
Tatsuya Chuman
Hitoshi Kiya
PICV
AAML
16
3
0
04 Nov 2022
Access Control with Encrypted Feature Maps for Object Detection Models
Access Control with Encrypted Feature Maps for Object Detection Models
Teru Nagamori
Hiroki Ito
AprilPyone Maungmaung
Hitoshi Kiya
19
2
0
29 Sep 2022
On the Transferability of Adversarial Examples between Encrypted Models
On the Transferability of Adversarial Examples between Encrypted Models
Miki Tanaka
Isao Echizen
Hitoshi Kiya
SILM
34
4
0
07 Sep 2022
An Encryption Method of ConvMixer Models without Performance Degradation
An Encryption Method of ConvMixer Models without Performance Degradation
Ryota Iijima
Hitoshi Kiya
21
1
0
25 Jul 2022
Security Evaluation of Compressible Image Encryption for
  Privacy-Preserving Image Classification against Ciphertext-only Attacks
Security Evaluation of Compressible Image Encryption for Privacy-Preserving Image Classification against Ciphertext-only Attacks
Tatsuya Chuman
Hitoshi Kiya
21
0
0
17 Jul 2022
Image and Model Transformation with Secret Key for Vision Transformer
Image and Model Transformation with Secret Key for Vision Transformer
Hitoshi Kiya
Ryota Iijima
Maungmaung Aprilpyone
Yuma Kinoshita
ViT
31
21
0
12 Jul 2022
Adversarial Detector with Robust Classifier
Adversarial Detector with Robust Classifier
Takayuki Osakabe
Maungmaung Aprilpyone
Sayaka Shiota
Hitoshi Kiya
AAML
21
1
0
05 Feb 2022
Security Evaluation of Block-based Image Encryption for Vision
  Transformer against Jigsaw Puzzle Solver Attack
Security Evaluation of Block-based Image Encryption for Vision Transformer against Jigsaw Puzzle Solver Attack
Tatsuya Chuman
Hitoshi Kiya
ViT
19
4
0
01 Feb 2022
Access Control of Object Detection Models Using Encrypted Feature Maps
Access Control of Object Detection Models Using Encrypted Feature Maps
Teru Nagamori
Hiroki Ito
April Pyone Maung Maung
Hitoshi Kiya
8
1
0
01 Feb 2022
An Overview of Compressible and Learnable Image Transformation with
  Secret Key and Its Applications
An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications
Hitoshi Kiya
AprilPyone Maungmaung
Yuma Kinoshita
Shoko Imaizumi
Sayaka Shiota
24
58
0
26 Jan 2022
Access Control Using Spatially Invariant Permutation of Feature Maps for
  Semantic Segmentation Models
Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models
Hiroki Ito
Maungmaung Aprilpyone
Hitoshi Kiya
20
5
0
03 Sep 2021
A Protection Method of Trained CNN Model Using Feature Maps Transformed
  With Secret Key From Unauthorized Access
A Protection Method of Trained CNN Model Using Feature Maps Transformed With Secret Key From Unauthorized Access
Maungmaung Aprilpyone
Hitoshi Kiya
16
5
0
01 Sep 2021
CycleGAN without checkerboard artifacts for counter-forensics of
  fake-image detection
CycleGAN without checkerboard artifacts for counter-forensics of fake-image detection
Takayuki Osakabe
Miki Tanaka
Yuma Kinoshita
Hitoshi Kiya
20
13
0
01 Dec 2020
Adversarial Machine Learning at Scale
Adversarial Machine Learning at Scale
Alexey Kurakin
Ian Goodfellow
Samy Bengio
AAML
293
3,112
0
04 Nov 2016
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
287
5,842
0
08 Jul 2016
1