ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2001.07761
  4. Cited By
Block-wise Scrambled Image Recognition Using Adaptation Network

Block-wise Scrambled Image Recognition Using Adaptation Network

21 January 2020
Koki Madono
Masayuki Tanaka
Masaki Onishi
T. Ogawa
    PICV
ArXiv (abs)PDFHTML

Papers citing "Block-wise Scrambled Image Recognition Using Adaptation Network"

31 / 31 papers shown
Title
AI-Driven Secure Data Sharing: A Trustworthy and Privacy-Preserving Approach
Al Amin
Kamrul Hasan
Sharif Ullah
Liang Hong
81
0
0
28 Jan 2025
ViT Enhanced Privacy-Preserving Secure Medical Data Sharing and
  Classification
ViT Enhanced Privacy-Preserving Secure Medical Data Sharing and Classification
Al Amin
Kamrul Hasan
Sharif Ullah
M. Shamim Hossain
18
1
0
08 Nov 2024
Privacy-Preserving Vision Transformer Using Images Encrypted with
  Restricted Random Permutation Matrices
Privacy-Preserving Vision Transformer Using Images Encrypted with Restricted Random Permutation Matrices
Kouki Horio
K. Nishikawa
Hitoshi Kiya
PICV
58
0
0
16 Aug 2024
Disposable-key-based image encryption for collaborative learning of
  Vision Transformer
Disposable-key-based image encryption for collaborative learning of Vision Transformer
Rei Aso
Sayaka Shiota
Hitoshi Kiya
ViTFedML
58
1
0
11 Aug 2024
Privacy-Preserving Deep Learning Using Deformable Operators for Secure
  Task Learning
Privacy-Preserving Deep Learning Using Deformable Operators for Secure Task Learning
Fabian Perez
Jhon Lopez
Henry Arguello
58
0
0
08 Apr 2024
Adaptive Hybrid Masking Strategy for Privacy-Preserving Face Recognition
  Against Model Inversion Attack
Adaptive Hybrid Masking Strategy for Privacy-Preserving Face Recognition Against Model Inversion Attack
Yinggui Wang
Yuanqing Huang
Jianshu Li
Le Yang
Kai Song
Lei Wang
AAMLPICV
95
0
0
14 Mar 2024
Efficient Fine-Tuning with Domain Adaptation for Privacy-Preserving
  Vision Transformer
Efficient Fine-Tuning with Domain Adaptation for Privacy-Preserving Vision Transformer
Teru Nagamori
Sayaka Shiota
Hitoshi Kiya
57
2
0
10 Jan 2024
Domain Adaptation for Efficiently Fine-tuning Vision Transformer with
  Encrypted Images
Domain Adaptation for Efficiently Fine-tuning Vision Transformer with Encrypted Images
Teru Nagamori
Sayaka Shiota
Hitoshi Kiya
73
1
0
05 Sep 2023
Security Evaluation of Compressible and Learnable Image Encryption
  Against Jigsaw Puzzle Solver Attacks
Security Evaluation of Compressible and Learnable Image Encryption Against Jigsaw Puzzle Solver Attacks
Tatsuya Chuman
Nobutaka Ono
Hitoshi Kiya
50
0
0
04 Aug 2023
Human-imperceptible, Machine-recognizable Images
Human-imperceptible, Machine-recognizable Images
Fusheng Hao
Fengxiang He
Yikai Wang
Fuxiang Wu
Jing Zhang
Jun Cheng
Dacheng Tao
AAML
71
2
0
06 Jun 2023
Privacy-Preserving Remote Heart Rate Estimation from Facial Videos
Privacy-Preserving Remote Heart Rate Estimation from Facial Videos
D. Gupta
Ali Etemad
PICV
65
4
0
01 Jun 2023
Generative Model-Based Attack on Learnable Image Encryption for
  Privacy-Preserving Deep Learning
Generative Model-Based Attack on Learnable Image Encryption for Privacy-Preserving Deep Learning
AprilPyone Maungmaung
Hitoshi Kiya
FedMLDiffM
73
3
0
09 Mar 2023
Color-NeuraCrypt: Privacy-Preserving Color-Image Classification Using
  Extended Random Neural Networks
Color-NeuraCrypt: Privacy-Preserving Color-Image Classification Using Extended Random Neural Networks
Zheng Qi
AprilPyone Maungmaung
Hitoshi Kiya
61
2
0
12 Jan 2023
A Jigsaw Puzzle Solver-based Attack on Block-wise Image Encryption for
  Privacy-preserving DNNs
A Jigsaw Puzzle Solver-based Attack on Block-wise Image Encryption for Privacy-preserving DNNs
Tatsuya Chuman
Hitoshi Kiya
PICVAAML
49
3
0
04 Nov 2022
Access Control with Encrypted Feature Maps for Object Detection Models
Access Control with Encrypted Feature Maps for Object Detection Models
Teru Nagamori
Hiroki Ito
AprilPyone Maungmaung
Hitoshi Kiya
63
2
0
29 Sep 2022
On the Adversarial Transferability of ConvMixer Models
On the Adversarial Transferability of ConvMixer Models
Ryota Iijima
Miki Tanaka
Isao Echizen
Hitoshi Kiya
AAML
51
2
0
19 Sep 2022
On the Transferability of Adversarial Examples between Encrypted Models
On the Transferability of Adversarial Examples between Encrypted Models
Miki Tanaka
Isao Echizen
Hitoshi Kiya
SILM
84
4
0
07 Sep 2022
Privacy-Preserving Image Classification Using ConvMixer with Adaptive
  Permutation Matrix
Privacy-Preserving Image Classification Using ConvMixer with Adaptive Permutation Matrix
Zheng Qi
AprilPyone Maungmaung
Hitoshi Kiya
PICV
61
4
0
04 Aug 2022
An Encryption Method of ConvMixer Models without Performance Degradation
An Encryption Method of ConvMixer Models without Performance Degradation
Ryota Iijima
Hitoshi Kiya
58
1
0
25 Jul 2022
Security Evaluation of Compressible Image Encryption for
  Privacy-Preserving Image Classification against Ciphertext-only Attacks
Security Evaluation of Compressible Image Encryption for Privacy-Preserving Image Classification against Ciphertext-only Attacks
Tatsuya Chuman
Hitoshi Kiya
54
0
0
17 Jul 2022
Access Control of Semantic Segmentation Models Using Encrypted Feature
  Maps
Access Control of Semantic Segmentation Models Using Encrypted Feature Maps
Hiroki Ito
AprilPyone Maungmaung
Sayaka Shiota
Hitoshi Kiya
32
4
0
11 Jun 2022
Privacy-Preserving Image Classification Using Vision Transformer
Privacy-Preserving Image Classification Using Vision Transformer
Zheng Qi
AprilPyone Maungmaung
Yuma Kinoshita
Hitoshi Kiya
ViT
72
19
0
24 May 2022
Privacy-Preserving Image Classification Using Isotropic Network
Privacy-Preserving Image Classification Using Isotropic Network
Maungmaung Aprilpyone
Hitoshi Kiya
46
37
0
16 Apr 2022
A Pixel-based Encryption Method for Privacy-Preserving Deep Learning
  Models
A Pixel-based Encryption Method for Privacy-Preserving Deep Learning Models
Ijaz Ahmad
Seokjoo Shin
49
6
0
31 Mar 2022
An Overview of Compressible and Learnable Image Transformation with
  Secret Key and Its Applications
An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications
Hitoshi Kiya
AprilPyone Maungmaung
Yuma Kinoshita
Shoko Imaizumi
Sayaka Shiota
84
58
0
26 Jan 2022
Access Control Using Spatially Invariant Permutation of Feature Maps for
  Semantic Segmentation Models
Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models
Hiroki Ito
Maungmaung Aprilpyone
Hitoshi Kiya
58
5
0
03 Sep 2021
Multitask Identity-Aware Image Steganography via Minimax Optimization
Multitask Identity-Aware Image Steganography via Minimax Optimization
Jiabao Cui
Pengyi Zhang
Songyuan Li
Liangli Zheng
Cuizhu Bao
Jupeng Xia
Xi Li
64
12
0
13 Jul 2021
A Protection Method of Trained CNN Model with Secret Key from
  Unauthorized Access
A Protection Method of Trained CNN Model with Secret Key from Unauthorized Access
AprilPyone Maungmaung
Hitoshi Kiya
39
22
0
31 May 2021
Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation
  with Secret Key
Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret Key
Maungmaung Aprilpyone
Hitoshi Kiya
106
18
0
09 Apr 2021
Block-wise Image Transformation with Secret Key for Adversarially Robust
  Defense
Block-wise Image Transformation with Secret Key for Adversarially Robust Defense
Maungmaung Aprilpyone
Hitoshi Kiya
76
57
0
02 Oct 2020
Attacks on Image Encryption Schemes for Privacy-Preserving Deep Neural
  Networks
Attacks on Image Encryption Schemes for Privacy-Preserving Deep Neural Networks
Alexander Chang
Benjamin M. Case
97
32
0
28 Apr 2020
1