no code implementations • 11 Feb 2024 • Ryota Iijima, Sayaka Shiota, Hitoshi Kiya
Deep neural networks (DNNs) are well known to be vulnerable to adversarial examples (AEs).
no code implementations • 5 Jan 2024 • Ryota Iijima, Sayaka Shiota, Hitoshi Kiya
In previous studies, it was confirmed that the vision transformer (ViT) is more robust against the property of adversarial transferability than convolutional neural network (CNN) models such as ConvMixer, and moreover encrypted ViT is more robust than ViT without any encryption.
no code implementations • 28 Dec 2023 • Mira Frick, Ryota Iijima, Yuhta Ishii
We consider moral hazard problems where a principal has access to rich monitoring data about an agent's action.
no code implementations • 26 Jul 2023 • Ryota Iijima, Miki Tanaka, Sayaka Shiota, Hitoshi Kiya
In previous studies, it was confirmed that the vision transformer (ViT) is more robust against the property of adversarial transferability than convolutional neural network (CNN) models such as ConvMixer, and moreover encrypted ViT is more robust than ViT without any encryption.
no code implementations • 19 Sep 2022 • Ryota Iijima, Miki Tanaka, Isao Echizen, Hitoshi Kiya
Deep neural networks (DNNs) are well known to be vulnerable to adversarial examples (AEs).
no code implementations • 28 Aug 2022 • Teru Nagamori, Ryota Iijima, Hitoshi Kiya
A novel method for access control with a secret key is proposed to protect models from unauthorized access in this paper.
no code implementations • 25 Jul 2022 • Ryota Iijima, Hitoshi Kiya
In an experiment, the effectiveness of the proposed method is evaluated in terms of classification accuracy and model protection in an image classification task on the CIFAR10 dataset.
no code implementations • 12 Jul 2022 • Hitoshi Kiya, Ryota Iijima, MaungMaung AprilPyone, Yuma Kinoshita
In this paper, we propose a combined use of transformed images and vision transformer (ViT) models transformed with a secret key.
no code implementations • 17 Nov 2021 • Ryota Iijima, AprilPyone MaungMaung, Hitoshi Kiya
In this paper, we propose a block-wise image transformation method with a secret key for support vector machine (SVM) models.