Picture for Hiroki Ito

Hiroki Ito

Access Control with Encrypted Feature Maps for Object Detection Models

Add code
Sep 29, 2022
Figure 1 for Access Control with Encrypted Feature Maps for Object Detection Models
Figure 2 for Access Control with Encrypted Feature Maps for Object Detection Models
Figure 3 for Access Control with Encrypted Feature Maps for Object Detection Models
Figure 4 for Access Control with Encrypted Feature Maps for Object Detection Models
Viaarxiv icon

Access Control of Semantic Segmentation Models Using Encrypted Feature Maps

Add code
Jun 11, 2022
Figure 1 for Access Control of Semantic Segmentation Models Using Encrypted Feature Maps
Figure 2 for Access Control of Semantic Segmentation Models Using Encrypted Feature Maps
Figure 3 for Access Control of Semantic Segmentation Models Using Encrypted Feature Maps
Figure 4 for Access Control of Semantic Segmentation Models Using Encrypted Feature Maps
Viaarxiv icon

Access Control of Object Detection Models Using Encrypted Feature Maps

Add code
Feb 01, 2022
Figure 1 for Access Control of Object Detection Models Using Encrypted Feature Maps
Figure 2 for Access Control of Object Detection Models Using Encrypted Feature Maps
Figure 3 for Access Control of Object Detection Models Using Encrypted Feature Maps
Figure 4 for Access Control of Object Detection Models Using Encrypted Feature Maps
Viaarxiv icon

Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models

Add code
Sep 03, 2021
Figure 1 for Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models
Figure 2 for Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models
Figure 3 for Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models
Figure 4 for Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models
Viaarxiv icon

Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access

Add code
Jul 20, 2021
Figure 1 for Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access
Figure 2 for Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access
Figure 3 for Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access
Figure 4 for Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access
Viaarxiv icon

Image Transformation Network for Privacy-Preserving Deep Neural Networks and Its Security Evaluation

Add code
Aug 07, 2020
Figure 1 for Image Transformation Network for Privacy-Preserving Deep Neural Networks and Its Security Evaluation
Figure 2 for Image Transformation Network for Privacy-Preserving Deep Neural Networks and Its Security Evaluation
Figure 3 for Image Transformation Network for Privacy-Preserving Deep Neural Networks and Its Security Evaluation
Figure 4 for Image Transformation Network for Privacy-Preserving Deep Neural Networks and Its Security Evaluation
Viaarxiv icon