Alert button
Picture for MaungMaung AprilPyone

MaungMaung AprilPyone

Alert button

Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models

Add code
Bookmark button
Alert button
Sep 03, 2021
Hiroki Ito, MaungMaung AprilPyone, Hitoshi Kiya

Figure 1 for Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models
Figure 2 for Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models
Figure 3 for Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models
Figure 4 for Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models
Viaarxiv icon

A Protection Method of Trained CNN Model Using Feature Maps Transformed With Secret Key From Unauthorized Access

Add code
Bookmark button
Alert button
Sep 01, 2021
MaungMaung AprilPyone, Hitoshi Kiya

Figure 1 for A Protection Method of Trained CNN Model Using Feature Maps Transformed With Secret Key From Unauthorized Access
Figure 2 for A Protection Method of Trained CNN Model Using Feature Maps Transformed With Secret Key From Unauthorized Access
Figure 3 for A Protection Method of Trained CNN Model Using Feature Maps Transformed With Secret Key From Unauthorized Access
Figure 4 for A Protection Method of Trained CNN Model Using Feature Maps Transformed With Secret Key From Unauthorized Access
Viaarxiv icon

Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access

Add code
Bookmark button
Alert button
Jul 20, 2021
Hiroki Ito, MaungMaung AprilPyone, Hitoshi Kiya

Figure 1 for Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access
Figure 2 for Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access
Figure 3 for Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access
Figure 4 for Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access
Viaarxiv icon

Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret Key

Add code
Bookmark button
Alert button
Apr 09, 2021
MaungMaung AprilPyone, Hitoshi Kiya

Figure 1 for Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret Key
Figure 2 for Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret Key
Figure 3 for Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret Key
Figure 4 for Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret Key
Viaarxiv icon

Transfer Learning-Based Model Protection With Secret Key

Add code
Bookmark button
Alert button
Mar 05, 2021
MaungMaung AprilPyone, Hitoshi Kiya

Figure 1 for Transfer Learning-Based Model Protection With Secret Key
Figure 2 for Transfer Learning-Based Model Protection With Secret Key
Figure 3 for Transfer Learning-Based Model Protection With Secret Key
Figure 4 for Transfer Learning-Based Model Protection With Secret Key
Viaarxiv icon

Ensemble of Models Trained by Key-based Transformed Images for Adversarially Robust Defense Against Black-box Attacks

Add code
Bookmark button
Alert button
Nov 16, 2020
MaungMaung AprilPyone, Hitoshi Kiya

Figure 1 for Ensemble of Models Trained by Key-based Transformed Images for Adversarially Robust Defense Against Black-box Attacks
Figure 2 for Ensemble of Models Trained by Key-based Transformed Images for Adversarially Robust Defense Against Black-box Attacks
Figure 3 for Ensemble of Models Trained by Key-based Transformed Images for Adversarially Robust Defense Against Black-box Attacks
Figure 4 for Ensemble of Models Trained by Key-based Transformed Images for Adversarially Robust Defense Against Black-box Attacks
Viaarxiv icon

Block-wise Image Transformation with Secret Key for Adversarially Robust Defense

Add code
Bookmark button
Alert button
Oct 02, 2020
MaungMaung AprilPyone, Hitoshi Kiya

Figure 1 for Block-wise Image Transformation with Secret Key for Adversarially Robust Defense
Figure 2 for Block-wise Image Transformation with Secret Key for Adversarially Robust Defense
Figure 3 for Block-wise Image Transformation with Secret Key for Adversarially Robust Defense
Figure 4 for Block-wise Image Transformation with Secret Key for Adversarially Robust Defense
Viaarxiv icon

Training DNN Model with Secret Key for Model Protection

Add code
Bookmark button
Alert button
Aug 06, 2020
MaungMaung AprilPyone, Hitoshi Kiya

Figure 1 for Training DNN Model with Secret Key for Model Protection
Figure 2 for Training DNN Model with Secret Key for Model Protection
Figure 3 for Training DNN Model with Secret Key for Model Protection
Figure 4 for Training DNN Model with Secret Key for Model Protection
Viaarxiv icon

Encryption Inspired Adversarial Defense for Visual Classification

Add code
Bookmark button
Alert button
May 16, 2020
MaungMaung AprilPyone, Hitoshi Kiya

Figure 1 for Encryption Inspired Adversarial Defense for Visual Classification
Figure 2 for Encryption Inspired Adversarial Defense for Visual Classification
Figure 3 for Encryption Inspired Adversarial Defense for Visual Classification
Figure 4 for Encryption Inspired Adversarial Defense for Visual Classification
Viaarxiv icon

Adversarial Test on Learnable Image Encryption

Add code
Bookmark button
Alert button
Jul 31, 2019
MaungMaung AprilPyone, Warit Sirichotedumrong, Hitoshi Kiya

Figure 1 for Adversarial Test on Learnable Image Encryption
Figure 2 for Adversarial Test on Learnable Image Encryption
Figure 3 for Adversarial Test on Learnable Image Encryption
Figure 4 for Adversarial Test on Learnable Image Encryption
Viaarxiv icon