Search Results for author: Sayaka Shiota

Found 17 papers, 1 papers with code

A Random Ensemble of Encrypted models for Enhancing Robustness against Adversarial Examples

no code implementations5 Jan 2024 Ryota Iijima, Sayaka Shiota, Hitoshi Kiya

In previous studies, it was confirmed that the vision transformer (ViT) is more robust against the property of adversarial transferability than convolutional neural network (CNN) models such as ConvMixer, and moreover encrypted ViT is more robust than ViT without any encryption.

A privacy-preserving method using secret key for convolutional neural network-based speech classification

no code implementations6 Oct 2023 Shoko Niwa, Sayaka Shiota, Hitoshi Kiya

To promote research on privacy preservation for speech classification, we provide an encryption method with a secret key in CNN-based speech classification systems.

Automatic Speech Recognition Automatic Speech Recognition (ASR) +5

Domain Adaptation for Efficiently Fine-tuning Vision Transformer with Encrypted Images

no code implementations5 Sep 2023 Teru Nagamori, Sayaka Shiota, Hitoshi Kiya

In recent years, deep neural networks (DNNs) trained with transformed data have been applied to various applications such as privacy-preserving learning, access control, and adversarial defenses.

Domain Adaptation Privacy Preserving

Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models

no code implementations26 Jul 2023 Ryota Iijima, Miki Tanaka, Sayaka Shiota, Hitoshi Kiya

In previous studies, it was confirmed that the vision transformer (ViT) is more robust against the property of adversarial transferability than convolutional neural network (CNN) models such as ConvMixer, and moreover encrypted ViT is more robust than ViT without any encryption.

Access Control of Semantic Segmentation Models Using Encrypted Feature Maps

no code implementations11 Jun 2022 Hiroki Ito, AprilPyone MaungMaung, Sayaka Shiota, Hitoshi Kiya

In this paper, we propose an access control method with a secret key for semantic segmentation models for the first time so that unauthorized users without a secret key cannot benefit from the performance of trained models.

Segmentation Semantic Segmentation

Adversarial Detector with Robust Classifier

no code implementations5 Feb 2022 Takayuki Osakabe, MaungMaung AprilPyone, Sayaka Shiota, Hitoshi Kiya

Deep neural network (DNN) models are wellknown to easily misclassify prediction results by using input images with small perturbations, called adversarial examples.

An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications

no code implementations26 Jan 2022 Hitoshi Kiya, AprilPyone MaungMaung, Yuma Kinoshita, Shoko Imaizumi, Sayaka Shiota

In this paper, we focus on a class of image transformation referred to as learnable image encryption, which is applicable to privacy-preserving machine learning and adversarially robust defense.

BIG-bench Machine Learning Privacy Preserving

A universal detector of CNN-generated images using properties of checkerboard artifacts in the frequency domain

no code implementations4 Aug 2021 Miki Tanaka, Sayaka Shiota, Hitoshi Kiya

In addition, an ensemble of the proposed detector with emphasized spectrums and a conventional detector is proposed to improve the performance of these methods.

An Image Fusion Scheme for Single-Shot High Dynamic Range Imaging with Spatially Varying Exposures

no code implementations22 Aug 2019 Chihiro Go, Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya

This paper proposes a novel multi-exposure image fusion (MEF) scheme for single-shot high dynamic range imaging with spatially varying exposures (SVE).

Multi-Exposure Image Fusion Scene Segmentation

Single-Shot High Dynamic Range Imaging with Spatially Varying Exposures Considering Hue Distortion

no code implementations1 Aug 2019 Chihiro Go, Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya

We proposes a novel single-shot high dynamic range imaging scheme with spatially varying exposures (SVE) considering hue distortion.

A Retinex-based Image Enhancement Scheme with Noise Aware Shadow-up Function

no code implementations8 Nov 2018 Chien Cheng Chien, Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya

This paper proposes a novel image contrast enhancement method based on both a noise aware shadow-up function and Retinex (retina and cortex) decomposition.

Image Enhancement

A Pseudo Multi-Exposure Fusion Method Using Single Image

no code implementations1 Aug 2018 Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya

The proposed method enables us to produce pseudo multi-exposure images from a single image.

Multi-Exposure Image Fusion

Multi-Exposure Image Fusion Based on Exposure Compensation

no code implementations23 Jun 2018 Yuma Kinoshita, Taichi Yoshida, Sayaka Shiota, Hitoshi Kiya

This paper proposes a novel multi-exposure image fusion method based on exposure compensation.

Multi-Exposure Image Fusion

Super-Resolution using Convolutional Neural Networks without Any Checkerboard Artifacts

1 code implementation7 Jun 2018 Yusuke Sugawara, Sayaka Shiota, Hitoshi Kiya

It is well-known that a number of excellent super-resolution (SR) methods using convolutional neural networks (CNNs) generate checkerboard artifacts.

Super-Resolution

Automatic Exposure Compensation for Multi-Exposure Image Fusion

no code implementations29 May 2018 Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya

In conventional works, it has been pointed out that the quality of those multi-exposure images can be improved by adjusting the luminance of them.

Multi-Exposure Image Fusion

Cannot find the paper you are looking for? You can Submit a new open access paper.