Picture for Miki Tanaka

Miki Tanaka

Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models

Add code
Jul 26, 2023
Viaarxiv icon

On the Adversarial Transferability of ConvMixer Models

Add code
Sep 19, 2022
Figure 1 for On the Adversarial Transferability of ConvMixer Models
Figure 2 for On the Adversarial Transferability of ConvMixer Models
Figure 3 for On the Adversarial Transferability of ConvMixer Models
Figure 4 for On the Adversarial Transferability of ConvMixer Models
Viaarxiv icon

On the Transferability of Adversarial Examples between Encrypted Models

Add code
Sep 07, 2022
Figure 1 for On the Transferability of Adversarial Examples between Encrypted Models
Figure 2 for On the Transferability of Adversarial Examples between Encrypted Models
Figure 3 for On the Transferability of Adversarial Examples between Encrypted Models
Figure 4 for On the Transferability of Adversarial Examples between Encrypted Models
Viaarxiv icon

A Detection Method of Temporally Operated Videos Using Robust Hashing

Add code
Aug 11, 2022
Figure 1 for A Detection Method of Temporally Operated Videos Using Robust Hashing
Figure 2 for A Detection Method of Temporally Operated Videos Using Robust Hashing
Figure 3 for A Detection Method of Temporally Operated Videos Using Robust Hashing
Figure 4 for A Detection Method of Temporally Operated Videos Using Robust Hashing
Viaarxiv icon

A universal detector of CNN-generated images using properties of checkerboard artifacts in the frequency domain

Add code
Aug 04, 2021
Figure 1 for A universal detector of CNN-generated images using properties of checkerboard artifacts in the frequency domain
Figure 2 for A universal detector of CNN-generated images using properties of checkerboard artifacts in the frequency domain
Figure 3 for A universal detector of CNN-generated images using properties of checkerboard artifacts in the frequency domain
Viaarxiv icon

Fake-image detection with Robust Hashing

Add code
Feb 02, 2021
Figure 1 for Fake-image detection with Robust Hashing
Figure 2 for Fake-image detection with Robust Hashing
Figure 3 for Fake-image detection with Robust Hashing
Figure 4 for Fake-image detection with Robust Hashing
Viaarxiv icon

CycleGAN without checkerboard artifacts for counter-forensics of fake-image detection

Add code
Dec 01, 2020
Figure 1 for CycleGAN without checkerboard artifacts for counter-forensics of fake-image detection
Figure 2 for CycleGAN without checkerboard artifacts for counter-forensics of fake-image detection
Figure 3 for CycleGAN without checkerboard artifacts for counter-forensics of fake-image detection
Figure 4 for CycleGAN without checkerboard artifacts for counter-forensics of fake-image detection
Viaarxiv icon