ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2201.11006
  4. Cited By
An Overview of Compressible and Learnable Image Transformation with
  Secret Key and Its Applications

An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications

26 January 2022
Hitoshi Kiya
AprilPyone Maungmaung
Yuma Kinoshita
Shoko Imaizumi
Sayaka Shiota
ArXivPDFHTML

Papers citing "An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications"

14 / 14 papers shown
Title
A Random Ensemble of Encrypted Vision Transformers for Adversarially
  Robust Defense
A Random Ensemble of Encrypted Vision Transformers for Adversarially Robust Defense
Ryota Iijima
Sayaka Shiota
Hitoshi Kiya
28
6
0
11 Feb 2024
Efficient Fine-Tuning with Domain Adaptation for Privacy-Preserving
  Vision Transformer
Efficient Fine-Tuning with Domain Adaptation for Privacy-Preserving Vision Transformer
Teru Nagamori
Sayaka Shiota
Hitoshi Kiya
24
1
0
10 Jan 2024
Domain Adaptation for Efficiently Fine-tuning Vision Transformer with
  Encrypted Images
Domain Adaptation for Efficiently Fine-tuning Vision Transformer with Encrypted Images
Teru Nagamori
Sayaka Shiota
Hitoshi Kiya
27
1
0
05 Sep 2023
Security Evaluation of Compressible and Learnable Image Encryption
  Against Jigsaw Puzzle Solver Attacks
Security Evaluation of Compressible and Learnable Image Encryption Against Jigsaw Puzzle Solver Attacks
Tatsuya Chuman
Nobutaka Ono
Hitoshi Kiya
18
0
0
04 Aug 2023
Enhanced Security with Encrypted Vision Transformer in Federated
  Learning
Enhanced Security with Encrypted Vision Transformer in Federated Learning
Rei Aso
Sayaka Shiota
Hitoshi Kiya
FedML
24
2
0
01 Aug 2023
Access Control with Encrypted Feature Maps for Object Detection Models
Access Control with Encrypted Feature Maps for Object Detection Models
Teru Nagamori
Hiroki Ito
AprilPyone Maungmaung
Hitoshi Kiya
17
2
0
29 Sep 2022
On the Transferability of Adversarial Examples between Encrypted Models
On the Transferability of Adversarial Examples between Encrypted Models
Miki Tanaka
Isao Echizen
Hitoshi Kiya
SILM
20
4
0
07 Sep 2022
An Access Control Method with Secret Key for Semantic Segmentation
  Models
An Access Control Method with Secret Key for Semantic Segmentation Models
Teru Nagamori
Ryota Iijima
Hitoshi Kiya
24
0
0
28 Aug 2022
An Encryption Method of ConvMixer Models without Performance Degradation
An Encryption Method of ConvMixer Models without Performance Degradation
Ryota Iijima
Hitoshi Kiya
10
1
0
25 Jul 2022
Security Evaluation of Compressible Image Encryption for
  Privacy-Preserving Image Classification against Ciphertext-only Attacks
Security Evaluation of Compressible Image Encryption for Privacy-Preserving Image Classification against Ciphertext-only Attacks
Tatsuya Chuman
Hitoshi Kiya
14
0
0
17 Jul 2022
Image and Model Transformation with Secret Key for Vision Transformer
Image and Model Transformation with Secret Key for Vision Transformer
Hitoshi Kiya
Ryota Iijima
Maungmaung Aprilpyone
Yuma Kinoshita
ViT
24
21
0
12 Jul 2022
Adversarial Detector with Robust Classifier
Adversarial Detector with Robust Classifier
Takayuki Osakabe
Maungmaung Aprilpyone
Sayaka Shiota
Hitoshi Kiya
AAML
19
1
0
05 Feb 2022
Security Evaluation of Block-based Image Encryption for Vision
  Transformer against Jigsaw Puzzle Solver Attack
Security Evaluation of Block-based Image Encryption for Vision Transformer against Jigsaw Puzzle Solver Attack
Tatsuya Chuman
Hitoshi Kiya
ViT
11
4
0
01 Feb 2022
Access Control of Object Detection Models Using Encrypted Feature Maps
Access Control of Object Detection Models Using Encrypted Feature Maps
Teru Nagamori
Hiroki Ito
April Pyone Maung Maung
Hitoshi Kiya
8
1
0
01 Feb 2022
1