Alert button
Picture for Ryota Iijima

Ryota Iijima

Alert button

A Random Ensemble of Encrypted Vision Transformers for Adversarially Robust Defense

Add code
Bookmark button
Alert button
Feb 11, 2024
Ryota Iijima, Sayaka Shiota, Hitoshi Kiya

Viaarxiv icon

A Random Ensemble of Encrypted models for Enhancing Robustness against Adversarial Examples

Add code
Bookmark button
Alert button
Jan 05, 2024
Ryota Iijima, Sayaka Shiota, Hitoshi Kiya

Viaarxiv icon

Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models

Add code
Bookmark button
Alert button
Jul 26, 2023
Ryota Iijima, Miki Tanaka, Sayaka Shiota, Hitoshi Kiya

Figure 1 for Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models
Figure 2 for Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models
Figure 3 for Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models
Figure 4 for Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models
Viaarxiv icon

On the Adversarial Transferability of ConvMixer Models

Add code
Bookmark button
Alert button
Sep 19, 2022
Ryota Iijima, Miki Tanaka, Isao Echizen, Hitoshi Kiya

Figure 1 for On the Adversarial Transferability of ConvMixer Models
Figure 2 for On the Adversarial Transferability of ConvMixer Models
Figure 3 for On the Adversarial Transferability of ConvMixer Models
Figure 4 for On the Adversarial Transferability of ConvMixer Models
Viaarxiv icon

An Access Control Method with Secret Key for Semantic Segmentation Models

Add code
Bookmark button
Alert button
Aug 28, 2022
Teru Nagamori, Ryota Iijima, Hitoshi Kiya

Figure 1 for An Access Control Method with Secret Key for Semantic Segmentation Models
Figure 2 for An Access Control Method with Secret Key for Semantic Segmentation Models
Figure 3 for An Access Control Method with Secret Key for Semantic Segmentation Models
Figure 4 for An Access Control Method with Secret Key for Semantic Segmentation Models
Viaarxiv icon

An Encryption Method of ConvMixer Models without Performance Degradation

Add code
Bookmark button
Alert button
Jul 25, 2022
Ryota Iijima, Hitoshi Kiya

Figure 1 for An Encryption Method of ConvMixer Models without Performance Degradation
Figure 2 for An Encryption Method of ConvMixer Models without Performance Degradation
Figure 3 for An Encryption Method of ConvMixer Models without Performance Degradation
Figure 4 for An Encryption Method of ConvMixer Models without Performance Degradation
Viaarxiv icon

Image and Model Transformation with Secret Key for Vision Transformer

Add code
Bookmark button
Alert button
Jul 12, 2022
Hitoshi Kiya, Ryota Iijima, MaungMaung Aprilpyone, Yuma Kinoshita

Figure 1 for Image and Model Transformation with Secret Key for Vision Transformer
Figure 2 for Image and Model Transformation with Secret Key for Vision Transformer
Figure 3 for Image and Model Transformation with Secret Key for Vision Transformer
Figure 4 for Image and Model Transformation with Secret Key for Vision Transformer
Viaarxiv icon

Protection of SVM Model with Secret Key from Unauthorized Access

Add code
Bookmark button
Alert button
Nov 17, 2021
Ryota Iijima, AprilPyone MaungMaung, Hitoshi Kiya

Figure 1 for Protection of SVM Model with Secret Key from Unauthorized Access
Figure 2 for Protection of SVM Model with Secret Key from Unauthorized Access
Figure 3 for Protection of SVM Model with Secret Key from Unauthorized Access
Figure 4 for Protection of SVM Model with Secret Key from Unauthorized Access
Viaarxiv icon