Alert button
Picture for Miki Tanaka

Miki Tanaka

Alert button

Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models

Add code
Bookmark button
Alert button
Jul 26, 2023
Ryota Iijima, Miki Tanaka, Sayaka Shiota, Hitoshi Kiya

Figure 1 for Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models
Figure 2 for Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models
Figure 3 for Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models
Figure 4 for Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models
Viaarxiv icon

On the Adversarial Transferability of ConvMixer Models

Add code
Bookmark button
Alert button
Sep 19, 2022
Ryota Iijima, Miki Tanaka, Isao Echizen, Hitoshi Kiya

Figure 1 for On the Adversarial Transferability of ConvMixer Models
Figure 2 for On the Adversarial Transferability of ConvMixer Models
Figure 3 for On the Adversarial Transferability of ConvMixer Models
Figure 4 for On the Adversarial Transferability of ConvMixer Models
Viaarxiv icon

On the Transferability of Adversarial Examples between Encrypted Models

Add code
Bookmark button
Alert button
Sep 07, 2022
Miki Tanaka, Isao Echizen, Hitoshi Kiya

Figure 1 for On the Transferability of Adversarial Examples between Encrypted Models
Figure 2 for On the Transferability of Adversarial Examples between Encrypted Models
Figure 3 for On the Transferability of Adversarial Examples between Encrypted Models
Figure 4 for On the Transferability of Adversarial Examples between Encrypted Models
Viaarxiv icon

A Detection Method of Temporally Operated Videos Using Robust Hashing

Add code
Bookmark button
Alert button
Aug 11, 2022
Shoko Niwa, Miki Tanaka, Hitoshi Kiya

Figure 1 for A Detection Method of Temporally Operated Videos Using Robust Hashing
Figure 2 for A Detection Method of Temporally Operated Videos Using Robust Hashing
Figure 3 for A Detection Method of Temporally Operated Videos Using Robust Hashing
Figure 4 for A Detection Method of Temporally Operated Videos Using Robust Hashing
Viaarxiv icon

A universal detector of CNN-generated images using properties of checkerboard artifacts in the frequency domain

Add code
Bookmark button
Alert button
Aug 04, 2021
Miki Tanaka, Sayaka Shiota, Hitoshi Kiya

Figure 1 for A universal detector of CNN-generated images using properties of checkerboard artifacts in the frequency domain
Figure 2 for A universal detector of CNN-generated images using properties of checkerboard artifacts in the frequency domain
Figure 3 for A universal detector of CNN-generated images using properties of checkerboard artifacts in the frequency domain
Viaarxiv icon

Fake-image detection with Robust Hashing

Add code
Bookmark button
Alert button
Feb 02, 2021
Miki Tanaka, Kiya Hitoshi

Figure 1 for Fake-image detection with Robust Hashing
Figure 2 for Fake-image detection with Robust Hashing
Figure 3 for Fake-image detection with Robust Hashing
Figure 4 for Fake-image detection with Robust Hashing
Viaarxiv icon

CycleGAN without checkerboard artifacts for counter-forensics of fake-image detection

Add code
Bookmark button
Alert button
Dec 01, 2020
Takayuki Osakabe, Miki Tanaka, Yuma Kinoshita, Hitoshi Kiya

Figure 1 for CycleGAN without checkerboard artifacts for counter-forensics of fake-image detection
Figure 2 for CycleGAN without checkerboard artifacts for counter-forensics of fake-image detection
Figure 3 for CycleGAN without checkerboard artifacts for counter-forensics of fake-image detection
Figure 4 for CycleGAN without checkerboard artifacts for counter-forensics of fake-image detection
Viaarxiv icon