Block-wise image transformation with secret key for adversarially robust defense MM AprilPyone, H Kiya IEEE Transactions on Information Forensics and Security 16, 2709-2723, 2021 | 74 | 2021 |
An overview of compressible and learnable image transformation with secret key and its applications H Kiya, APM Maung, Y Kinoshita, S Imaizumi, S Shiota APSIPA Transactions on Signal and Information Processing 11 (1), 2022 | 63 | 2022 |
Image to perturbation: An image transformation network for generating visually protected images for privacy-preserving deep neural networks H Ito, Y Kinoshita, M Aprilpyone, H Kiya IEEE Access 9, 64629-64638, 2021 | 52 | 2021 |
Privacy-preserving image classification using an isotropic network MM AprilPyone, H Kiya IEEE MultiMedia 29 (2), 23-33, 2022 | 40 | 2022 |
Encryption inspired adversarial defense for visual classification M Maung, A Pyone, H Kiya 2020 IEEE International Conference on Image Processing (ICIP), 1681-1685, 2020 | 38* | 2020 |
A protection method of trained CNN model with a secret key from unauthorized access AP MaungMaung, H Kiya APSIPA Transactions on Signal and Information Processing 10, e10, 2021 | 32 | 2021 |
Piracy-resistant DNN watermarking by block-wise image transformation with secret key AP Maung Maung, H Kiya Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia …, 2021 | 28 | 2021 |
Privacy-preserving image classification using vision transformer Z Qi, AP MaungMaung, Y Kinoshita, H Kiya 2022 30th European Signal Processing Conference (EUSIPCO), 543-547, 2022 | 27 | 2022 |
Training DNN model with secret key for model protection A Pyone, M Maung, H Kiya 2020 IEEE 9th Global Conference on Consumer Electronics (GCCE), 818-821, 2020 | 26 | 2020 |
Image and model transformation with secret key for vision transformer H Kiya, R Iijima, A Maungmaung, Y Kinoshita IEICE TRANSACTIONS on Information and Systems 106 (1), 2-11, 2023 | 23 | 2023 |
Adversarial robustness by one bit double quantization for visual classification M Aprilpyone, Y Kinoshita, H Kiya IEEE Access 7, 177932-177943, 2019 | 22 | 2019 |
Ensemble of key-based models: Defense against black-box adversarial attacks AP MaungMaung, H Kiya 2021 IEEE 10th Global Conference on Consumer Electronics (GCCE), 95-98, 2021 | 12 | 2021 |
Adversarial test on learnable image encryption MM AprilPyone, W Sirichotedumrong, H Kiya 2019 IEEE 8th Global Conference on Consumer Electronics (GCCE), 667-669, 2019 | 12 | 2019 |
Authentication of MP4 file by perceptual hash and data hiding APM Maung, Y Tew, KS Wong Malaysian Journal of Computer Science 32 (4), 304-314, 2019 | 10 | 2019 |
Lightweight authentication for MP4 format container using subtitle track KS Wong, CS Chan, A Maungmaung IEICE TRANSACTIONS on Information and Systems 103 (1), 2-10, 2020 | 9 | 2020 |
Access control using spatially invariant permutation of feature maps for semantic segmentation models H Ito, MM AprilPyone, H Kiya 2021 Asia-Pacific Signal and Information Processing Association Annual …, 2021 | 7 | 2021 |
Transfer learning-based model protection with secret key MM AprilPyone, H Kiya 2021 IEEE International Conference on Image Processing (ICIP), 3877-3881, 2021 | 7 | 2021 |
Authentication for aac compressed audio using data hiding IM Maung, Y Tew, KS Wong 2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), 1-2, 2016 | 6 | 2016 |
Privacy-Preserving Image Classification Using ConvMixer with Adaptative Permutation Matrix and Block-Wise Scrambled Image Encryption Z Qi, AP MaungMaung, H Kiya Journal of Imaging 9 (4), 85, 2023 | 5 | 2023 |
Generative model-based attack on learnable image encryption for privacy-preserving deep learning AP MaungMaung, H Kiya arXiv preprint arXiv:2303.05036, 2023 | 5 | 2023 |