Picture for MaungMaung AprilPyone

MaungMaung AprilPyone

Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models

Add code
Sep 03, 2021
Figure 1 for Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models
Figure 2 for Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models
Figure 3 for Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models
Figure 4 for Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models
Viaarxiv icon

A Protection Method of Trained CNN Model Using Feature Maps Transformed With Secret Key From Unauthorized Access

Add code
Sep 01, 2021
Figure 1 for A Protection Method of Trained CNN Model Using Feature Maps Transformed With Secret Key From Unauthorized Access
Figure 2 for A Protection Method of Trained CNN Model Using Feature Maps Transformed With Secret Key From Unauthorized Access
Figure 3 for A Protection Method of Trained CNN Model Using Feature Maps Transformed With Secret Key From Unauthorized Access
Figure 4 for A Protection Method of Trained CNN Model Using Feature Maps Transformed With Secret Key From Unauthorized Access
Viaarxiv icon

Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access

Add code
Jul 20, 2021
Figure 1 for Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access
Figure 2 for Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access
Figure 3 for Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access
Figure 4 for Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access
Viaarxiv icon

Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret Key

Add code
Apr 09, 2021
Figure 1 for Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret Key
Figure 2 for Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret Key
Figure 3 for Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret Key
Figure 4 for Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret Key
Viaarxiv icon

Transfer Learning-Based Model Protection With Secret Key

Add code
Mar 05, 2021
Figure 1 for Transfer Learning-Based Model Protection With Secret Key
Figure 2 for Transfer Learning-Based Model Protection With Secret Key
Figure 3 for Transfer Learning-Based Model Protection With Secret Key
Figure 4 for Transfer Learning-Based Model Protection With Secret Key
Viaarxiv icon

Ensemble of Models Trained by Key-based Transformed Images for Adversarially Robust Defense Against Black-box Attacks

Add code
Nov 16, 2020
Figure 1 for Ensemble of Models Trained by Key-based Transformed Images for Adversarially Robust Defense Against Black-box Attacks
Figure 2 for Ensemble of Models Trained by Key-based Transformed Images for Adversarially Robust Defense Against Black-box Attacks
Figure 3 for Ensemble of Models Trained by Key-based Transformed Images for Adversarially Robust Defense Against Black-box Attacks
Figure 4 for Ensemble of Models Trained by Key-based Transformed Images for Adversarially Robust Defense Against Black-box Attacks
Viaarxiv icon

Block-wise Image Transformation with Secret Key for Adversarially Robust Defense

Add code
Oct 02, 2020
Figure 1 for Block-wise Image Transformation with Secret Key for Adversarially Robust Defense
Figure 2 for Block-wise Image Transformation with Secret Key for Adversarially Robust Defense
Figure 3 for Block-wise Image Transformation with Secret Key for Adversarially Robust Defense
Figure 4 for Block-wise Image Transformation with Secret Key for Adversarially Robust Defense
Viaarxiv icon

Training DNN Model with Secret Key for Model Protection

Add code
Aug 06, 2020
Figure 1 for Training DNN Model with Secret Key for Model Protection
Figure 2 for Training DNN Model with Secret Key for Model Protection
Figure 3 for Training DNN Model with Secret Key for Model Protection
Figure 4 for Training DNN Model with Secret Key for Model Protection
Viaarxiv icon

Encryption Inspired Adversarial Defense for Visual Classification

Add code
May 16, 2020
Figure 1 for Encryption Inspired Adversarial Defense for Visual Classification
Figure 2 for Encryption Inspired Adversarial Defense for Visual Classification
Figure 3 for Encryption Inspired Adversarial Defense for Visual Classification
Figure 4 for Encryption Inspired Adversarial Defense for Visual Classification
Viaarxiv icon

Adversarial Test on Learnable Image Encryption

Add code
Jul 31, 2019
Figure 1 for Adversarial Test on Learnable Image Encryption
Figure 2 for Adversarial Test on Learnable Image Encryption
Figure 3 for Adversarial Test on Learnable Image Encryption
Figure 4 for Adversarial Test on Learnable Image Encryption
Viaarxiv icon