Alert button
Picture for Hitoshi Kiya

Hitoshi Kiya

Alert button

Fine-Tuning Text-To-Image Diffusion Models for Class-Wise Spurious Feature Generation

Add code
Bookmark button
Alert button
Feb 13, 2024
AprilPyone MaungMaung, Huy H. Nguyen, Hitoshi Kiya, Isao Echizen

Figure 1 for Fine-Tuning Text-To-Image Diffusion Models for Class-Wise Spurious Feature Generation
Figure 2 for Fine-Tuning Text-To-Image Diffusion Models for Class-Wise Spurious Feature Generation
Figure 3 for Fine-Tuning Text-To-Image Diffusion Models for Class-Wise Spurious Feature Generation
Figure 4 for Fine-Tuning Text-To-Image Diffusion Models for Class-Wise Spurious Feature Generation
Viaarxiv icon

A Random Ensemble of Encrypted Vision Transformers for Adversarially Robust Defense

Add code
Bookmark button
Alert button
Feb 11, 2024
Ryota Iijima, Sayaka Shiota, Hitoshi Kiya

Viaarxiv icon

Efficient Fine-Tuning with Domain Adaptation for Privacy-Preserving Vision Transformer

Add code
Bookmark button
Alert button
Jan 10, 2024
Teru Nagamori, Sayaka Shiota, Hitoshi Kiya

Viaarxiv icon

A Random Ensemble of Encrypted models for Enhancing Robustness against Adversarial Examples

Add code
Bookmark button
Alert button
Jan 05, 2024
Ryota Iijima, Sayaka Shiota, Hitoshi Kiya

Viaarxiv icon

Efficient Key-Based Adversarial Defense for ImageNet by Using Pre-trained Model

Add code
Bookmark button
Alert button
Nov 28, 2023
AprilPyone MaungMaung, Isao Echizen, Hitoshi Kiya

Viaarxiv icon

A privacy-preserving method using secret key for convolutional neural network-based speech classification

Add code
Bookmark button
Alert button
Oct 06, 2023
Shoko Niwa, Sayaka Shiota, Hitoshi Kiya

Figure 1 for A privacy-preserving method using secret key for convolutional neural network-based speech classification
Figure 2 for A privacy-preserving method using secret key for convolutional neural network-based speech classification
Figure 3 for A privacy-preserving method using secret key for convolutional neural network-based speech classification
Figure 4 for A privacy-preserving method using secret key for convolutional neural network-based speech classification
Viaarxiv icon

Domain Adaptation for Efficiently Fine-tuning Vision Transformer with Encrypted Images

Add code
Bookmark button
Alert button
Sep 07, 2023
Teru Nagamori, Sayaka Shiota, Hitoshi Kiya

Figure 1 for Domain Adaptation for Efficiently Fine-tuning Vision Transformer with Encrypted Images
Figure 2 for Domain Adaptation for Efficiently Fine-tuning Vision Transformer with Encrypted Images
Figure 3 for Domain Adaptation for Efficiently Fine-tuning Vision Transformer with Encrypted Images
Figure 4 for Domain Adaptation for Efficiently Fine-tuning Vision Transformer with Encrypted Images
Viaarxiv icon

Hindering Adversarial Attacks with Multiple Encrypted Patch Embeddings

Add code
Bookmark button
Alert button
Sep 04, 2023
AprilPyone MaungMaung, Isao Echizen, Hitoshi Kiya

Figure 1 for Hindering Adversarial Attacks with Multiple Encrypted Patch Embeddings
Figure 2 for Hindering Adversarial Attacks with Multiple Encrypted Patch Embeddings
Figure 3 for Hindering Adversarial Attacks with Multiple Encrypted Patch Embeddings
Figure 4 for Hindering Adversarial Attacks with Multiple Encrypted Patch Embeddings
Viaarxiv icon

Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models

Add code
Bookmark button
Alert button
Jul 26, 2023
Ryota Iijima, Miki Tanaka, Sayaka Shiota, Hitoshi Kiya

Figure 1 for Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models
Figure 2 for Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models
Figure 3 for Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models
Figure 4 for Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models
Viaarxiv icon

Generative Model-Based Attack on Learnable Image Encryption for Privacy-Preserving Deep Learning

Add code
Bookmark button
Alert button
Mar 09, 2023
AprilPyone MaungMaung, Hitoshi Kiya

Figure 1 for Generative Model-Based Attack on Learnable Image Encryption for Privacy-Preserving Deep Learning
Figure 2 for Generative Model-Based Attack on Learnable Image Encryption for Privacy-Preserving Deep Learning
Figure 3 for Generative Model-Based Attack on Learnable Image Encryption for Privacy-Preserving Deep Learning
Figure 4 for Generative Model-Based Attack on Learnable Image Encryption for Privacy-Preserving Deep Learning
Viaarxiv icon