Alert button
Picture for Isao Echizen

Isao Echizen

Alert button

Defending Against Physical Adversarial Patch Attacks on Infrared Human Detection

Sep 27, 2023
Lukas Strack, Futa Waseda, Huy H. Nguyen, Yinqiang Zheng, Isao Echizen

Figure 1 for Defending Against Physical Adversarial Patch Attacks on Infrared Human Detection
Figure 2 for Defending Against Physical Adversarial Patch Attacks on Infrared Human Detection
Figure 3 for Defending Against Physical Adversarial Patch Attacks on Infrared Human Detection
Figure 4 for Defending Against Physical Adversarial Patch Attacks on Infrared Human Detection
Viaarxiv icon

Hindering Adversarial Attacks with Multiple Encrypted Patch Embeddings

Sep 04, 2023
AprilPyone MaungMaung, Isao Echizen, Hitoshi Kiya

Figure 1 for Hindering Adversarial Attacks with Multiple Encrypted Patch Embeddings
Figure 2 for Hindering Adversarial Attacks with Multiple Encrypted Patch Embeddings
Figure 3 for Hindering Adversarial Attacks with Multiple Encrypted Patch Embeddings
Figure 4 for Hindering Adversarial Attacks with Multiple Encrypted Patch Embeddings
Viaarxiv icon

VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations

Jun 02, 2023
Hoang-Quoc Nguyen-Son, Seira Hidano, Kazuhide Fukushima, Shinsaku Kiyomoto, Isao Echizen

Figure 1 for VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations
Figure 2 for VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations
Figure 3 for VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations
Figure 4 for VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations
Viaarxiv icon

Secure and Privacy Preserving Proxy Biometrics Identities

Dec 21, 2022
Harkeerat Kaur, Rishabh Shukla, Isao Echizen, Pritee Khanna

Figure 1 for Secure and Privacy Preserving Proxy Biometrics Identities
Figure 2 for Secure and Privacy Preserving Proxy Biometrics Identities
Figure 3 for Secure and Privacy Preserving Proxy Biometrics Identities
Figure 4 for Secure and Privacy Preserving Proxy Biometrics Identities
Viaarxiv icon

Face Forgery Detection Based on Facial Region Displacement Trajectory Series

Dec 07, 2022
YuYang Sun, ZhiYong Zhang, Isao Echizen, Huy H. Nguyen, ChangZhen Qiu, Lu Sun

Figure 1 for Face Forgery Detection Based on Facial Region Displacement Trajectory Series
Figure 2 for Face Forgery Detection Based on Facial Region Displacement Trajectory Series
Figure 3 for Face Forgery Detection Based on Facial Region Displacement Trajectory Series
Figure 4 for Face Forgery Detection Based on Facial Region Displacement Trajectory Series
Viaarxiv icon

Analysis of Master Vein Attacks on Finger Vein Recognition Systems

Oct 18, 2022
Huy H. Nguyen, Trung-Nghia Le, Junichi Yamagishi, Isao Echizen

Figure 1 for Analysis of Master Vein Attacks on Finger Vein Recognition Systems
Figure 2 for Analysis of Master Vein Attacks on Finger Vein Recognition Systems
Figure 3 for Analysis of Master Vein Attacks on Finger Vein Recognition Systems
Figure 4 for Analysis of Master Vein Attacks on Finger Vein Recognition Systems
Viaarxiv icon

On the Adversarial Transferability of ConvMixer Models

Sep 19, 2022
Ryota Iijima, Miki Tanaka, Isao Echizen, Hitoshi Kiya

Figure 1 for On the Adversarial Transferability of ConvMixer Models
Figure 2 for On the Adversarial Transferability of ConvMixer Models
Figure 3 for On the Adversarial Transferability of ConvMixer Models
Figure 4 for On the Adversarial Transferability of ConvMixer Models
Viaarxiv icon

On the Transferability of Adversarial Examples between Encrypted Models

Sep 07, 2022
Miki Tanaka, Isao Echizen, Hitoshi Kiya

Figure 1 for On the Transferability of Adversarial Examples between Encrypted Models
Figure 2 for On the Transferability of Adversarial Examples between Encrypted Models
Figure 3 for On the Transferability of Adversarial Examples between Encrypted Models
Figure 4 for On the Transferability of Adversarial Examples between Encrypted Models
Viaarxiv icon

Rethinking Adversarial Examples for Location Privacy Protection

Jun 28, 2022
Trung-Nghia Le, Ta Gu, Huy H. Nguyen, Isao Echizen

Figure 1 for Rethinking Adversarial Examples for Location Privacy Protection
Figure 2 for Rethinking Adversarial Examples for Location Privacy Protection
Figure 3 for Rethinking Adversarial Examples for Location Privacy Protection
Figure 4 for Rethinking Adversarial Examples for Location Privacy Protection
Viaarxiv icon

EASE: Entity-Aware Contrastive Learning of Sentence Embedding

May 09, 2022
Sosuke Nishikawa, Ryokan Ri, Ikuya Yamada, Yoshimasa Tsuruoka, Isao Echizen

Figure 1 for EASE: Entity-Aware Contrastive Learning of Sentence Embedding
Figure 2 for EASE: Entity-Aware Contrastive Learning of Sentence Embedding
Figure 3 for EASE: Entity-Aware Contrastive Learning of Sentence Embedding
Figure 4 for EASE: Entity-Aware Contrastive Learning of Sentence Embedding
Viaarxiv icon