Block-wise image transformation with secret key for adversarially robust defense MM AprilPyone, H Kiya IEEE Transactions on Information Forensics and Security 16, 2709-2723, 2021 | 44 | 2021 |
An overview of compressible and learnable image transformation with secret key and its applications H Kiya, APM Maung, Y Kinoshita, S Imaizumi, S Shiota APSIPA Transactions on Signal and Information Processing 11 (1), 2022 | 24 | 2022 |
Image to perturbation: An image transformation network for generating visually protected images for privacy-preserving deep neural networks H Ito, Y Kinoshita, M Aprilpyone, H Kiya IEEE Access 9, 64629-64638, 2021 | 23 | 2021 |
Encryption inspired adversarial defense for visual classification M Maung, A Pyone, H Kiya 2020 IEEE International Conference on Image Processing (ICIP), 1681-1685, 2020 | 22* | 2020 |
A protection method of trained CNN model with a secret key from unauthorized access AP MaungMaung, H Kiya APSIPA Transactions on Signal and Information Processing 10, e10, 2021 | 18 | 2021 |
Privacy-preserving image classification using an isotropic network MM AprilPyone, H Kiya IEEE MultiMedia 29 (2), 23-33, 2022 | 17 | 2022 |
Adversarial robustness by one bit double quantization for visual classification M Aprilpyone, Y Kinoshita, H Kiya IEEE Access 7, 177932-177943, 2019 | 14 | 2019 |
Training DNN model with secret key for model protection A Pyone, M Maung, H Kiya 2020 IEEE 9th Global Conference on Consumer Electronics (GCCE), 818-821, 2020 | 13 | 2020 |
Piracy-resistant DNN watermarking by block-wise image transformation with secret key AP Maung Maung, H Kiya Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia …, 2021 | 11 | 2021 |
Image and model transformation with secret key for vision transformer H Kiya, R Iijima, A Maungmaung, Y Kinoshita IEICE TRANSACTIONS on Information and Systems 106 (1), 2-11, 2023 | 6 | 2023 |
Access control using spatially invariant permutation of feature maps for semantic segmentation models H Ito, MM AprilPyone, H Kiya 2021 Asia-Pacific Signal and Information Processing Association Annual …, 2021 | 6 | 2021 |
Adversarial test on learnable image encryption MM AprilPyone, W Sirichotedumrong, H Kiya 2019 IEEE 8th Global Conference on Consumer Electronics (GCCE), 667-669, 2019 | 6 | 2019 |
Privacy-preserving image classification using vision transformer Z Qi, AP MaungMaung, Y Kinoshita, H Kiya 2022 30th European Signal Processing Conference (EUSIPCO), 543-547, 2022 | 5 | 2022 |
Ensemble of key-based models: Defense against black-box adversarial attacks AP MaungMaung, H Kiya 2021 IEEE 10th Global Conference on Consumer Electronics (GCCE), 95-98, 2021 | 5 | 2021 |
Lightweight authentication for MP4 format container using subtitle track KS Wong, CS Chan, A Maungmaung IEICE TRANSACTIONS on Information and Systems 103 (1), 2-10, 2020 | 5 | 2020 |
Authentication of mp4 file by perceptual hash and data hiding APM Maung, Y Tew, KS Wong Malaysian Journal of Computer Science 32 (4), 304-314, 2019 | 5 | 2019 |
Authentication for aac compressed audio using data hiding IM Maung, Y Tew, KS Wong 2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), 1-2, 2016 | 5 | 2016 |
Reversible data hiding methods based on audio and video synchronization in mp4 container I MaungMaung, KS Wong, K Tanaka 2016 International Symposium on Intelligent Signal Processing and …, 2016 | 4 | 2016 |
Access control of semantic segmentation models using encrypted feature maps H Ito, MM AprilPyone, S Shiota, H Kiya APSIPA Transactions on Signal and Information Processing 11 (1), 2022 | 2 | 2022 |
Transfer learning-based model protection with secret key MM AprilPyone, H Kiya 2021 IEEE International Conference on Image Processing (ICIP), 3877-3881, 2021 | 2 | 2021 |