ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2006.01342
  4. Cited By
A GAN-Based Image Transformation Scheme for Privacy-Preserving Deep
  Neural Networks

A GAN-Based Image Transformation Scheme for Privacy-Preserving Deep Neural Networks

European Signal Processing Conference (EUSIPCO), 2020
2 June 2020
Warit Sirichotedumrong
Hitoshi Kiya
    PICV
ArXiv (abs)PDFHTML

Papers citing "A GAN-Based Image Transformation Scheme for Privacy-Preserving Deep Neural Networks"

35 / 35 papers shown
Generative Adversarial Networks Applied for Privacy Preservation in Biometric-Based Authentication and Identification
Generative Adversarial Networks Applied for Privacy Preservation in Biometric-Based Authentication and Identification
Lubos Mjachky
Ivan Homoliak
PICVGAN
212
0
0
24 Sep 2025
Visually Image Encryption and Compression Using a CNN-Based Auto Encoder
Visually Image Encryption and Compression Using a CNN-Based Auto Encoder
Mahdi Madani
El-Bay Bourennane
149
1
0
01 Apr 2025
Unveiling Hidden Visual Information: A Reconstruction Attack Against
  Adversarial Visual Information Hiding
Unveiling Hidden Visual Information: A Reconstruction Attack Against Adversarial Visual Information HidingIEEE Transactions on Neural Networks and Learning Systems (TNNLS), 2024
Jonggyu Jang
Hyeonsu Lyu
Seongjin Hwang
H. Yang
AAML
97
4
0
08 Aug 2024
Attack GAN (AGAN ): A new Security Evaluation Tool for Perceptual
  Encryption
Attack GAN (AGAN ): A new Security Evaluation Tool for Perceptual Encryption
Umesh Kashyap
Sudev Kumar Padhi
Sk. Subidh Ali
AAML
183
1
0
09 Jul 2024
Privacy-Preserving Deep Learning Using Deformable Operators for Secure
  Task Learning
Privacy-Preserving Deep Learning Using Deformable Operators for Secure Task Learning
Fabian Perez
Jhon Lopez
Henry Arguello
152
0
0
08 Apr 2024
Ensembler: Combating model inversion attacks using model ensemble during
  collaborative inference
Ensembler: Combating model inversion attacks using model ensemble during collaborative inference
Dancheng Liu
Jinjun Xiong
MIACVFedMLAAML
256
0
0
19 Jan 2024
GaitGuard: Towards Private Gait in Mixed Reality
GaitGuard: Towards Private Gait in Mixed Reality
Diana Romero
Ruchi Jagdish Patel
A. Markopoulou
Salma Elmalaki
353
1
0
07 Dec 2023
Diff-Privacy: Diffusion-based Face Privacy Protection
Diff-Privacy: Diffusion-based Face Privacy Protection
Xiao He
Mingrui Zhu
Dongxin Chen
N. Wang
Xinbo Gao
DiffM
304
39
0
11 Sep 2023
Block-Wise Encryption for Reliable Vision Transformer models
Block-Wise Encryption for Reliable Vision Transformer models
Hitoshi Kiya
Ryota Iijima
Teru Nagamori
163
4
0
15 Aug 2023
Re-thinking Model Inversion Attacks Against Deep Neural Networks
Re-thinking Model Inversion Attacks Against Deep Neural NetworksComputer Vision and Pattern Recognition (CVPR), 2023
Ngoc-Bao Nguyen
Keshigeyan Chandrasegaran
Milad Abdollahzadeh
Ngai-Man Cheung
177
61
0
04 Apr 2023
Color-NeuraCrypt: Privacy-Preserving Color-Image Classification Using
  Extended Random Neural Networks
Color-NeuraCrypt: Privacy-Preserving Color-Image Classification Using Extended Random Neural Networks
Zheng Qi
AprilPyone Maungmaung
Hitoshi Kiya
198
2
0
12 Jan 2023
A Privacy Preserving Method with a Random Orthogonal Matrix for
  ConvMixer Models
A Privacy Preserving Method with a Random Orthogonal Matrix for ConvMixer Models
Rei Aso
Tatsuya Chuman
Hitoshi Kiya
PICV
195
0
0
10 Jan 2023
Hiding Visual Information via Obfuscating Adversarial Perturbations
Hiding Visual Information via Obfuscating Adversarial PerturbationsIEEE International Conference on Computer Vision (ICCV), 2022
Zhigang Su
Dawei Zhou
Nannan Wangu
Decheng Liu
Zhen Wang
Xinbo Gao
AAML
248
14
0
30 Sep 2022
Access Control with Encrypted Feature Maps for Object Detection Models
Access Control with Encrypted Feature Maps for Object Detection Models
Teru Nagamori
Hiroki Ito
AprilPyone Maungmaung
Hitoshi Kiya
149
2
0
29 Sep 2022
On the Adversarial Transferability of ConvMixer Models
On the Adversarial Transferability of ConvMixer ModelsAsia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), 2022
Ryota Iijima
Miki Tanaka
Isao Echizen
Hitoshi Kiya
AAML
153
2
0
19 Sep 2022
StyleGAN Encoder-Based Attack for Block Scrambled Face Images
StyleGAN Encoder-Based Attack for Block Scrambled Face ImagesAsia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), 2022
AprilPyone Maungmaung
Hitoshi Kiya
CVBMPICV
212
4
0
16 Sep 2022
On the Transferability of Adversarial Examples between Encrypted Models
On the Transferability of Adversarial Examples between Encrypted ModelsInternational Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), 2022
Miki Tanaka
Isao Echizen
Hitoshi Kiya
SILM
165
4
0
07 Sep 2022
Privacy-Preserving Image Classification Using ConvMixer with Adaptive
  Permutation Matrix
Privacy-Preserving Image Classification Using ConvMixer with Adaptive Permutation MatrixGlobal Conference on Consumer Electronics (GCE), 2022
Zheng Qi
AprilPyone Maungmaung
Hitoshi Kiya
PICV
137
4
0
04 Aug 2022
An Encryption Method of ConvMixer Models without Performance Degradation
An Encryption Method of ConvMixer Models without Performance DegradationInternational Conference on Machine Learning and Computing (ICMLC), 2022
Ryota Iijima
Hitoshi Kiya
168
1
0
25 Jul 2022
Security Evaluation of Compressible Image Encryption for
  Privacy-Preserving Image Classification against Ciphertext-only Attacks
Security Evaluation of Compressible Image Encryption for Privacy-Preserving Image Classification against Ciphertext-only AttacksInternational Conference on Machine Learning and Computing (ICMLC), 2022
Tatsuya Chuman
Hitoshi Kiya
124
1
0
17 Jul 2022
Image and Model Transformation with Secret Key for Vision Transformer
Image and Model Transformation with Secret Key for Vision Transformer
Hitoshi Kiya
Ryota Iijima
Maungmaung Aprilpyone
Yuma Kinoshita
ViT
178
25
0
12 Jul 2022
Access Control of Semantic Segmentation Models Using Encrypted Feature
  Maps
Access Control of Semantic Segmentation Models Using Encrypted Feature MapsAPSIPA Transactions on Signal and Information Processing (TASIP), 2022
Hiroki Ito
AprilPyone Maungmaung
Sayaka Shiota
Hitoshi Kiya
95
6
0
11 Jun 2022
Privacy-Preserving Image Classification Using Vision Transformer
Privacy-Preserving Image Classification Using Vision TransformerEuropean Signal Processing Conference (EUSIPCO), 2022
Zheng Qi
AprilPyone Maungmaung
Yuma Kinoshita
Hitoshi Kiya
ViT
138
20
0
24 May 2022
An Overview of Compressible and Learnable Image Transformation with
  Secret Key and Its Applications
An Overview of Compressible and Learnable Image Transformation with Secret Key and Its ApplicationsAPSIPA Transactions on Signal and Information Processing (TASIP), 2022
Hitoshi Kiya
AprilPyone Maungmaung
Yuma Kinoshita
Shoko Imaizumi
Sayaka Shiota
200
63
0
26 Jan 2022
Leveraging Image-based Generative Adversarial Networks for Time Series
  Generation
Leveraging Image-based Generative Adversarial Networks for Time Series Generation
Justin Hellermann
Stefan Lessmann
GANAI4TS
172
6
0
15 Dec 2021
Deep Joint Source-Channel Coding for Image Transmission with Visual
  Protection
Deep Joint Source-Channel Coding for Image Transmission with Visual ProtectionIEEE Transactions on Cognitive Communications and Networking (IEEE TCCN), 2021
Jia-lin Xu
Bo Ai
Wei Chen
Ning Wang
Miguel R. D. Rodrigues
324
29
0
05 Nov 2021
Access Control Using Spatially Invariant Permutation of Feature Maps for
  Semantic Segmentation Models
Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models
Hiroki Ito
Maungmaung Aprilpyone
Hitoshi Kiya
154
5
0
03 Sep 2021
Protecting Semantic Segmentation Models by Using Block-wise Image
  Encryption with Secret Key from Unauthorized Access
Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access
Hiroki Ito
Maungmaung Aprilpyone
Hitoshi Kiya
80
0
0
20 Jul 2021
A Protection Method of Trained CNN Model with Secret Key from
  Unauthorized Access
A Protection Method of Trained CNN Model with Secret Key from Unauthorized AccessAPSIPA Transactions on Signal and Information Processing (TASIP), 2021
AprilPyone Maungmaung
Hitoshi Kiya
87
27
0
31 May 2021
A Lightweight Privacy-Preserving Scheme Using Label-based Pixel Block
  Mixing for Image Classification in Deep Learning
A Lightweight Privacy-Preserving Scheme Using Label-based Pixel Block Mixing for Image Classification in Deep LearningEngineering applications of artificial intelligence (EAAI), 2021
Yuexin Xiang
Tiantian Li
Wei Ren
Tianqing Zhu
Kim-Kwang Raymond Choo
140
5
0
19 May 2021
Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation
  with Secret Key
Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret KeyInformation Hiding and Multimedia Security Workshop (IH&MMSec), 2021
Maungmaung Aprilpyone
Hitoshi Kiya
219
18
0
09 Apr 2021
Transfer Learning-Based Model Protection With Secret Key
Transfer Learning-Based Model Protection With Secret KeyInternational Conference on Information Photonics (ICIP), 2021
Maungmaung Aprilpyone
Hitoshi Kiya
FedML
104
5
0
05 Mar 2021
Difficulty in estimating visual information from randomly sampled images
Difficulty in estimating visual information from randomly sampled imagesGlobal Conference on Consumer Electronics (GCE), 2020
Masaki Kitayama
Hitoshi Kiya
101
0
0
16 Dec 2020
Visual Security Evaluation of Learnable Image Encryption Methods against
  Ciphertext-only Attacks
Visual Security Evaluation of Learnable Image Encryption Methods against Ciphertext-only Attacks
Warit Sirichotedumrong
Hitoshi Kiya
AAML
129
10
0
13 Oct 2020
Image Transformation Network for Privacy-Preserving Deep Neural Networks
  and Its Security Evaluation
Image Transformation Network for Privacy-Preserving Deep Neural Networks and Its Security EvaluationGlobal Conference on Consumer Electronics (GCE), 2020
Hiroki Ito
Yuma Kinoshita
Hitoshi Kiya
114
18
0
07 Aug 2020
1
Page 1 of 1