ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2105.14756
  4. Cited By
A Protection Method of Trained CNN Model with Secret Key from
  Unauthorized Access

A Protection Method of Trained CNN Model with Secret Key from Unauthorized Access

31 May 2021
AprilPyone Maungmaung
Hitoshi Kiya
ArXivPDFHTML

Papers citing "A Protection Method of Trained CNN Model with Secret Key from Unauthorized Access"

9 / 9 papers shown
Title
Generative Model-Based Attack on Learnable Image Encryption for
  Privacy-Preserving Deep Learning
Generative Model-Based Attack on Learnable Image Encryption for Privacy-Preserving Deep Learning
AprilPyone Maungmaung
Hitoshi Kiya
FedML
DiffM
24
3
0
09 Mar 2023
Access Control with Encrypted Feature Maps for Object Detection Models
Access Control with Encrypted Feature Maps for Object Detection Models
Teru Nagamori
Hiroki Ito
AprilPyone Maungmaung
Hitoshi Kiya
19
2
0
29 Sep 2022
An Access Control Method with Secret Key for Semantic Segmentation
  Models
An Access Control Method with Secret Key for Semantic Segmentation Models
Teru Nagamori
Ryota Iijima
Hitoshi Kiya
24
0
0
28 Aug 2022
An Encryption Method of ConvMixer Models without Performance Degradation
An Encryption Method of ConvMixer Models without Performance Degradation
Ryota Iijima
Hitoshi Kiya
23
1
0
25 Jul 2022
Image and Model Transformation with Secret Key for Vision Transformer
Image and Model Transformation with Secret Key for Vision Transformer
Hitoshi Kiya
Ryota Iijima
Maungmaung Aprilpyone
Yuma Kinoshita
ViT
33
21
0
12 Jul 2022
Access Control of Object Detection Models Using Encrypted Feature Maps
Access Control of Object Detection Models Using Encrypted Feature Maps
Teru Nagamori
Hiroki Ito
April Pyone Maung Maung
Hitoshi Kiya
28
1
0
01 Feb 2022
An Overview of Compressible and Learnable Image Transformation with
  Secret Key and Its Applications
An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications
Hitoshi Kiya
AprilPyone Maungmaung
Yuma Kinoshita
Shoko Imaizumi
Sayaka Shiota
27
58
0
26 Jan 2022
Access Control Using Spatially Invariant Permutation of Feature Maps for
  Semantic Segmentation Models
Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models
Hiroki Ito
Maungmaung Aprilpyone
Hitoshi Kiya
23
5
0
03 Sep 2021
A Protection Method of Trained CNN Model Using Feature Maps Transformed
  With Secret Key From Unauthorized Access
A Protection Method of Trained CNN Model Using Feature Maps Transformed With Secret Key From Unauthorized Access
Maungmaung Aprilpyone
Hitoshi Kiya
16
5
0
01 Sep 2021
1