ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2105.14756
  4. Cited By
A Protection Method of Trained CNN Model with Secret Key from
  Unauthorized Access

A Protection Method of Trained CNN Model with Secret Key from Unauthorized Access

31 May 2021
AprilPyone Maungmaung
Hitoshi Kiya
ArXiv (abs)PDFHTML

Papers citing "A Protection Method of Trained CNN Model with Secret Key from Unauthorized Access"

13 / 13 papers shown
Title
Disposable-key-based image encryption for collaborative learning of
  Vision Transformer
Disposable-key-based image encryption for collaborative learning of Vision Transformer
Rei Aso
Sayaka Shiota
Hitoshi Kiya
ViTFedML
58
1
0
11 Aug 2024
Hindering Adversarial Attacks with Implicit Neural Representations
Hindering Adversarial Attacks with Implicit Neural Representations
Andrei A. Rusu
D. A. Calian
Sven Gowal
R. Hadsell
AAML
171
4
0
22 Oct 2022
Access Control with Encrypted Feature Maps for Object Detection Models
Access Control with Encrypted Feature Maps for Object Detection Models
Teru Nagamori
Hiroki Ito
AprilPyone Maungmaung
Hitoshi Kiya
63
2
0
29 Sep 2022
An Access Control Method with Secret Key for Semantic Segmentation
  Models
An Access Control Method with Secret Key for Semantic Segmentation Models
Teru Nagamori
Ryota Iijima
Hitoshi Kiya
59
0
0
28 Aug 2022
An Encryption Method of ConvMixer Models without Performance Degradation
An Encryption Method of ConvMixer Models without Performance Degradation
Ryota Iijima
Hitoshi Kiya
60
1
0
25 Jul 2022
Image and Model Transformation with Secret Key for Vision Transformer
Image and Model Transformation with Secret Key for Vision Transformer
Hitoshi Kiya
Ryota Iijima
Maungmaung Aprilpyone
Yuma Kinoshita
ViT
76
21
0
12 Jul 2022
Access Control of Object Detection Models Using Encrypted Feature Maps
Access Control of Object Detection Models Using Encrypted Feature Maps
Teru Nagamori
Hiroki Ito
April Pyone Maung Maung
Hitoshi Kiya
71
1
0
01 Feb 2022
An Overview of Compressible and Learnable Image Transformation with
  Secret Key and Its Applications
An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications
Hitoshi Kiya
AprilPyone Maungmaung
Yuma Kinoshita
Shoko Imaizumi
Sayaka Shiota
84
58
0
26 Jan 2022
Protection of SVM Model with Secret Key from Unauthorized Access
Protection of SVM Model with Secret Key from Unauthorized Access
Ryota Iijima
AprilPyone Maungmaung
Hitoshi Kiya
PICV
13
1
0
17 Nov 2021
Access Control Using Spatially Invariant Permutation of Feature Maps for
  Semantic Segmentation Models
Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models
Hiroki Ito
Maungmaung Aprilpyone
Hitoshi Kiya
58
5
0
03 Sep 2021
A Protection Method of Trained CNN Model Using Feature Maps Transformed
  With Secret Key From Unauthorized Access
A Protection Method of Trained CNN Model Using Feature Maps Transformed With Secret Key From Unauthorized Access
Maungmaung Aprilpyone
Hitoshi Kiya
54
5
0
01 Sep 2021
Protecting Semantic Segmentation Models by Using Block-wise Image
  Encryption with Secret Key from Unauthorized Access
Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access
Hiroki Ito
Maungmaung Aprilpyone
Hitoshi Kiya
21
0
0
20 Jul 2021
Transfer Learning-Based Model Protection With Secret Key
Transfer Learning-Based Model Protection With Secret Key
Maungmaung Aprilpyone
Hitoshi Kiya
FedML
41
5
0
05 Mar 2021
1