Search Results for author: Ryota Iijima

Found 9 papers, 0 papers with code

A Random Ensemble of Encrypted models for Enhancing Robustness against Adversarial Examples

no code implementations5 Jan 2024 Ryota Iijima, Sayaka Shiota, Hitoshi Kiya

In previous studies, it was confirmed that the vision transformer (ViT) is more robust against the property of adversarial transferability than convolutional neural network (CNN) models such as ConvMixer, and moreover encrypted ViT is more robust than ViT without any encryption.

Monitoring with Rich Data

no code implementations28 Dec 2023 Mira Frick, Ryota Iijima, Yuhta Ishii

We consider moral hazard problems where a principal has access to rich monitoring data about an agent's action.

Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models

no code implementations26 Jul 2023 Ryota Iijima, Miki Tanaka, Sayaka Shiota, Hitoshi Kiya

In previous studies, it was confirmed that the vision transformer (ViT) is more robust against the property of adversarial transferability than convolutional neural network (CNN) models such as ConvMixer, and moreover encrypted ViT is more robust than ViT without any encryption.

On the Adversarial Transferability of ConvMixer Models

no code implementations19 Sep 2022 Ryota Iijima, Miki Tanaka, Isao Echizen, Hitoshi Kiya

Deep neural networks (DNNs) are well known to be vulnerable to adversarial examples (AEs).

Image Classification

An Access Control Method with Secret Key for Semantic Segmentation Models

no code implementations28 Aug 2022 Teru Nagamori, Ryota Iijima, Hitoshi Kiya

A novel method for access control with a secret key is proposed to protect models from unauthorized access in this paper.

Image Classification Segmentation +1

An Encryption Method of ConvMixer Models without Performance Degradation

no code implementations25 Jul 2022 Ryota Iijima, Hitoshi Kiya

In an experiment, the effectiveness of the proposed method is evaluated in terms of classification accuracy and model protection in an image classification task on the CIFAR10 dataset.

Adversarial Defense Classification +2

Image and Model Transformation with Secret Key for Vision Transformer

no code implementations12 Jul 2022 Hitoshi Kiya, Ryota Iijima, MaungMaung AprilPyone, Yuma Kinoshita

In this paper, we propose a combined use of transformed images and vision transformer (ViT) models transformed with a secret key.

Image Classification

Protection of SVM Model with Secret Key from Unauthorized Access

no code implementations17 Nov 2021 Ryota Iijima, AprilPyone MaungMaung, Hitoshi Kiya

In this paper, we propose a block-wise image transformation method with a secret key for support vector machine (SVM) models.

Cannot find the paper you are looking for? You can Submit a new open access paper.