Picture for Hiroki Ito

Hiroki Ito

Access Control with Encrypted Feature Maps for Object Detection Models

Sep 29, 2022
Figure 1 for Access Control with Encrypted Feature Maps for Object Detection Models
Figure 2 for Access Control with Encrypted Feature Maps for Object Detection Models
Figure 3 for Access Control with Encrypted Feature Maps for Object Detection Models
Figure 4 for Access Control with Encrypted Feature Maps for Object Detection Models
Viaarxiv icon

Access Control of Semantic Segmentation Models Using Encrypted Feature Maps

Jun 11, 2022
Figure 1 for Access Control of Semantic Segmentation Models Using Encrypted Feature Maps
Figure 2 for Access Control of Semantic Segmentation Models Using Encrypted Feature Maps
Figure 3 for Access Control of Semantic Segmentation Models Using Encrypted Feature Maps
Figure 4 for Access Control of Semantic Segmentation Models Using Encrypted Feature Maps
Viaarxiv icon

Access Control of Object Detection Models Using Encrypted Feature Maps

Feb 01, 2022
Figure 1 for Access Control of Object Detection Models Using Encrypted Feature Maps
Figure 2 for Access Control of Object Detection Models Using Encrypted Feature Maps
Figure 3 for Access Control of Object Detection Models Using Encrypted Feature Maps
Figure 4 for Access Control of Object Detection Models Using Encrypted Feature Maps
Viaarxiv icon

Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models

Sep 03, 2021
Figure 1 for Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models
Figure 2 for Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models
Figure 3 for Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models
Figure 4 for Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models
Viaarxiv icon

Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access

Jul 20, 2021
Figure 1 for Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access
Figure 2 for Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access
Figure 3 for Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access
Figure 4 for Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access
Viaarxiv icon

Image Transformation Network for Privacy-Preserving Deep Neural Networks and Its Security Evaluation

Aug 07, 2020
Figure 1 for Image Transformation Network for Privacy-Preserving Deep Neural Networks and Its Security Evaluation
Figure 2 for Image Transformation Network for Privacy-Preserving Deep Neural Networks and Its Security Evaluation
Figure 3 for Image Transformation Network for Privacy-Preserving Deep Neural Networks and Its Security Evaluation
Figure 4 for Image Transformation Network for Privacy-Preserving Deep Neural Networks and Its Security Evaluation
Viaarxiv icon