Picture for Ryota Iijima

Ryota Iijima

A Random Ensemble of Encrypted Vision Transformers for Adversarially Robust Defense

Add code
Feb 11, 2024
Viaarxiv icon

A Random Ensemble of Encrypted models for Enhancing Robustness against Adversarial Examples

Add code
Jan 05, 2024
Viaarxiv icon

Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models

Add code
Jul 26, 2023
Viaarxiv icon

On the Adversarial Transferability of ConvMixer Models

Add code
Sep 19, 2022
Figure 1 for On the Adversarial Transferability of ConvMixer Models
Figure 2 for On the Adversarial Transferability of ConvMixer Models
Figure 3 for On the Adversarial Transferability of ConvMixer Models
Figure 4 for On the Adversarial Transferability of ConvMixer Models
Viaarxiv icon

An Access Control Method with Secret Key for Semantic Segmentation Models

Add code
Aug 28, 2022
Figure 1 for An Access Control Method with Secret Key for Semantic Segmentation Models
Figure 2 for An Access Control Method with Secret Key for Semantic Segmentation Models
Figure 3 for An Access Control Method with Secret Key for Semantic Segmentation Models
Figure 4 for An Access Control Method with Secret Key for Semantic Segmentation Models
Viaarxiv icon

An Encryption Method of ConvMixer Models without Performance Degradation

Add code
Jul 25, 2022
Figure 1 for An Encryption Method of ConvMixer Models without Performance Degradation
Figure 2 for An Encryption Method of ConvMixer Models without Performance Degradation
Figure 3 for An Encryption Method of ConvMixer Models without Performance Degradation
Figure 4 for An Encryption Method of ConvMixer Models without Performance Degradation
Viaarxiv icon

Image and Model Transformation with Secret Key for Vision Transformer

Add code
Jul 12, 2022
Figure 1 for Image and Model Transformation with Secret Key for Vision Transformer
Figure 2 for Image and Model Transformation with Secret Key for Vision Transformer
Figure 3 for Image and Model Transformation with Secret Key for Vision Transformer
Figure 4 for Image and Model Transformation with Secret Key for Vision Transformer
Viaarxiv icon

Protection of SVM Model with Secret Key from Unauthorized Access

Add code
Nov 17, 2021
Figure 1 for Protection of SVM Model with Secret Key from Unauthorized Access
Figure 2 for Protection of SVM Model with Secret Key from Unauthorized Access
Figure 3 for Protection of SVM Model with Secret Key from Unauthorized Access
Figure 4 for Protection of SVM Model with Secret Key from Unauthorized Access
Viaarxiv icon