Alert button
Picture for Sayaka Shiota

Sayaka Shiota

Alert button

A Random Ensemble of Encrypted Vision Transformers for Adversarially Robust Defense

Add code
Bookmark button
Alert button
Feb 11, 2024
Ryota Iijima, Sayaka Shiota, Hitoshi Kiya

Viaarxiv icon

Efficient Fine-Tuning with Domain Adaptation for Privacy-Preserving Vision Transformer

Add code
Bookmark button
Alert button
Jan 10, 2024
Teru Nagamori, Sayaka Shiota, Hitoshi Kiya

Viaarxiv icon

A Random Ensemble of Encrypted models for Enhancing Robustness against Adversarial Examples

Add code
Bookmark button
Alert button
Jan 05, 2024
Ryota Iijima, Sayaka Shiota, Hitoshi Kiya

Viaarxiv icon

A privacy-preserving method using secret key for convolutional neural network-based speech classification

Add code
Bookmark button
Alert button
Oct 06, 2023
Shoko Niwa, Sayaka Shiota, Hitoshi Kiya

Figure 1 for A privacy-preserving method using secret key for convolutional neural network-based speech classification
Figure 2 for A privacy-preserving method using secret key for convolutional neural network-based speech classification
Figure 3 for A privacy-preserving method using secret key for convolutional neural network-based speech classification
Figure 4 for A privacy-preserving method using secret key for convolutional neural network-based speech classification
Viaarxiv icon

Domain Adaptation for Efficiently Fine-tuning Vision Transformer with Encrypted Images

Add code
Bookmark button
Alert button
Sep 07, 2023
Teru Nagamori, Sayaka Shiota, Hitoshi Kiya

Figure 1 for Domain Adaptation for Efficiently Fine-tuning Vision Transformer with Encrypted Images
Figure 2 for Domain Adaptation for Efficiently Fine-tuning Vision Transformer with Encrypted Images
Figure 3 for Domain Adaptation for Efficiently Fine-tuning Vision Transformer with Encrypted Images
Figure 4 for Domain Adaptation for Efficiently Fine-tuning Vision Transformer with Encrypted Images
Viaarxiv icon

Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models

Add code
Bookmark button
Alert button
Jul 26, 2023
Ryota Iijima, Miki Tanaka, Sayaka Shiota, Hitoshi Kiya

Figure 1 for Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models
Figure 2 for Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models
Figure 3 for Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models
Figure 4 for Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models
Viaarxiv icon

Access Control of Semantic Segmentation Models Using Encrypted Feature Maps

Add code
Bookmark button
Alert button
Jun 11, 2022
Hiroki Ito, AprilPyone MaungMaung, Sayaka Shiota, Hitoshi Kiya

Figure 1 for Access Control of Semantic Segmentation Models Using Encrypted Feature Maps
Figure 2 for Access Control of Semantic Segmentation Models Using Encrypted Feature Maps
Figure 3 for Access Control of Semantic Segmentation Models Using Encrypted Feature Maps
Figure 4 for Access Control of Semantic Segmentation Models Using Encrypted Feature Maps
Viaarxiv icon

Adversarial Detector with Robust Classifier

Add code
Bookmark button
Alert button
Feb 05, 2022
Takayuki Osakabe, Maungmaung Aprilpyone, Sayaka Shiota, Hitoshi Kiya

Figure 1 for Adversarial Detector with Robust Classifier
Figure 2 for Adversarial Detector with Robust Classifier
Figure 3 for Adversarial Detector with Robust Classifier
Figure 4 for Adversarial Detector with Robust Classifier
Viaarxiv icon

An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications

Add code
Bookmark button
Alert button
Jan 26, 2022
Hitoshi Kiya, AprilPyone MaungMaung, Yuma Kinoshita, Imaizumi Shoko, Sayaka Shiota

Figure 1 for An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications
Figure 2 for An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications
Figure 3 for An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications
Figure 4 for An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications
Viaarxiv icon

JTubeSpeech: corpus of Japanese speech collected from YouTube for speech recognition and speaker verification

Add code
Bookmark button
Alert button
Dec 17, 2021
Shinnosuke Takamichi, Ludwig Kürzinger, Takaaki Saeki, Sayaka Shiota, Shinji Watanabe

Figure 1 for JTubeSpeech: corpus of Japanese speech collected from YouTube for speech recognition and speaker verification
Figure 2 for JTubeSpeech: corpus of Japanese speech collected from YouTube for speech recognition and speaker verification
Figure 3 for JTubeSpeech: corpus of Japanese speech collected from YouTube for speech recognition and speaker verification
Figure 4 for JTubeSpeech: corpus of Japanese speech collected from YouTube for speech recognition and speaker verification
Viaarxiv icon