Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2010.00801
Cited By
Block-wise Image Transformation with Secret Key for Adversarially Robust Defense
2 October 2020
Maungmaung Aprilpyone
Hitoshi Kiya
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Block-wise Image Transformation with Secret Key for Adversarially Robust Defense"
19 / 19 papers shown
Title
Efficient Fine-Tuning with Domain Adaptation for Privacy-Preserving Vision Transformer
Teru Nagamori
Sayaka Shiota
Hitoshi Kiya
24
1
0
10 Jan 2024
Domain Adaptation for Efficiently Fine-tuning Vision Transformer with Encrypted Images
Teru Nagamori
Sayaka Shiota
Hitoshi Kiya
29
1
0
05 Sep 2023
Security Evaluation of Compressible and Learnable Image Encryption Against Jigsaw Puzzle Solver Attacks
Tatsuya Chuman
Nobutaka Ono
Hitoshi Kiya
23
0
0
04 Aug 2023
Generative Model-Based Attack on Learnable Image Encryption for Privacy-Preserving Deep Learning
AprilPyone Maungmaung
Hitoshi Kiya
FedML
DiffM
24
3
0
09 Mar 2023
A Jigsaw Puzzle Solver-based Attack on Block-wise Image Encryption for Privacy-preserving DNNs
Tatsuya Chuman
Hitoshi Kiya
PICV
AAML
16
3
0
04 Nov 2022
Access Control with Encrypted Feature Maps for Object Detection Models
Teru Nagamori
Hiroki Ito
AprilPyone Maungmaung
Hitoshi Kiya
19
2
0
29 Sep 2022
On the Transferability of Adversarial Examples between Encrypted Models
Miki Tanaka
Isao Echizen
Hitoshi Kiya
SILM
34
4
0
07 Sep 2022
An Encryption Method of ConvMixer Models without Performance Degradation
Ryota Iijima
Hitoshi Kiya
21
1
0
25 Jul 2022
Security Evaluation of Compressible Image Encryption for Privacy-Preserving Image Classification against Ciphertext-only Attacks
Tatsuya Chuman
Hitoshi Kiya
21
0
0
17 Jul 2022
Image and Model Transformation with Secret Key for Vision Transformer
Hitoshi Kiya
Ryota Iijima
Maungmaung Aprilpyone
Yuma Kinoshita
ViT
31
21
0
12 Jul 2022
Adversarial Detector with Robust Classifier
Takayuki Osakabe
Maungmaung Aprilpyone
Sayaka Shiota
Hitoshi Kiya
AAML
21
1
0
05 Feb 2022
Security Evaluation of Block-based Image Encryption for Vision Transformer against Jigsaw Puzzle Solver Attack
Tatsuya Chuman
Hitoshi Kiya
ViT
19
4
0
01 Feb 2022
Access Control of Object Detection Models Using Encrypted Feature Maps
Teru Nagamori
Hiroki Ito
April Pyone Maung Maung
Hitoshi Kiya
8
1
0
01 Feb 2022
An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications
Hitoshi Kiya
AprilPyone Maungmaung
Yuma Kinoshita
Shoko Imaizumi
Sayaka Shiota
24
58
0
26 Jan 2022
Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models
Hiroki Ito
Maungmaung Aprilpyone
Hitoshi Kiya
20
5
0
03 Sep 2021
A Protection Method of Trained CNN Model Using Feature Maps Transformed With Secret Key From Unauthorized Access
Maungmaung Aprilpyone
Hitoshi Kiya
16
5
0
01 Sep 2021
CycleGAN without checkerboard artifacts for counter-forensics of fake-image detection
Takayuki Osakabe
Miki Tanaka
Yuma Kinoshita
Hitoshi Kiya
20
13
0
01 Dec 2020
Adversarial Machine Learning at Scale
Alexey Kurakin
Ian Goodfellow
Samy Bengio
AAML
293
3,112
0
04 Nov 2016
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
287
5,842
0
08 Jul 2016
1