AprilPyone MaungMaung
Tokyo Metropolitan University
H-index: 11
Asia-Japan
Top articles of AprilPyone MaungMaung
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Fine-Tuning Text-To-Image Diffusion Models for Class-Wise Spurious Feature Generation | arXiv preprint arXiv:2402.08200 | AprilPyone MaungMaung Huy H Nguyen Hitoshi Kiya Isao Echizen | 2024/2/13 |
Stability Analysis of ChatGPT-based Sentiment Analysis in AI Quality Assurance | arXiv preprint arXiv:2401.07441 | Tinghui Ouyang AprilPyone MaungMaung Koichi Konishi Yoshiki Seo Isao Echizen | 2024/1/15 |
Generative Model-Based Attack on Learnable Image Encryption for Privacy-Preserving Deep Learning | arXiv preprint arXiv:2303.05036 | AprilPyone MaungMaung Hitoshi Kiya | 2023/3/9 |
Text-Guided Scene Sketch-to-Photo Synthesis | arXiv preprint arXiv:2302.06883 | AprilPyone MaungMaung Makoto Shing Kentaro Mitsui Kei Sawada Fumio Okura | 2023/2/14 |
Color-neuracrypt: Privacy-preserving color-image classification using extended random neural networks | arXiv preprint arXiv:2301.04875 | Zheng Qi AprilPyone MaungMaung Hitoshi Kiya | 2023/1/12 |
Efficient Key-Based Adversarial Defense for ImageNet by Using Pre-trained Model | arXiv preprint arXiv:2311.16577 | AprilPyone MaungMaung Isao Echizen Hitoshi Kiya | 2023/11/28 |
Access Control with Encrypted Feature Maps for Object Detection Models | IEICE TRANSACTIONS on Information and Systems | Teru Nagamori Hiroki Ito AprilPyone MaungMaung Hitoshi Kiya | 2023/1/1 |
Hindering Adversarial Attacks with Multiple Encrypted Patch Embeddings | AprilPyone MaungMaung Isao Echizen Hitoshi Kiya | 2023/10/31 | |
Image and model transformation with secret key for vision transformer | IEICE TRANSACTIONS on Information and Systems | Hitoshi Kiya Ryota Iijima Aprilpyone Maungmaung Yuma Kinoshita | 2023/1/1 |
Privacy-Preserving Image Classification Using ConvMixer with Adaptative Permutation Matrix and Block-Wise Scrambled Image Encryption | Journal of Imaging | Zheng Qi AprilPyone MaungMaung Hitoshi Kiya | 2023/4/18 |
Privacy-preserving image classification using isotropic network | arXiv preprint arXiv:2204.07707 | AprilPyone MaungMaung Hitoshi Kiya | 2022/4/16 |
Privacy-preserving image classification using vision transformer | Zheng Qi AprilPyone MaungMaung Yuma Kinoshita Hitoshi Kiya | 2022/8/29 | |
Adversarial detector with robust classifier | Takayuki Osakabe Maungmaung Aprilpyone Sayaka Shiota Hitoshi Kiya | 2022/3/7 | |
Access control of semantic segmentation models using encrypted feature maps | APSIPA Transactions on Signal and Information Processing | Hiroki Ito MaungMaung AprilPyone Sayaka Shiota Hitoshi Kiya | 2022/6/11 |
Access control of object detection models using encrypted feature maps | Teru Nagamori Hiroki Ito MaungMaung AprilPyone Hitoshi Kiya | 2022/3/7 | |
Adversarial Robustness of Secret Key-Based Defenses against AutoAttack | IEICE Technical Report; IEICE Tech. Rep. | Miki Tanaka April Pyone MaungMaung Isao Echizen Hitoshi Kiya | 2022/6/9 |
A Study on Defense Against Adversarial Examples and Unauthorized Access for Convolutional Neural Networks | April Pyone Maung Maung | 2022/3 | |
Protection of SVM model with secret key from unauthorized access | Ryota Iijima MaungMaung AprilPyone Hitoshi Kiay | 2022/4/30 | |
An overview of compressible and learnable image transformation with secret key and its applications | Hitoshi Kiya April Pyone Maung Maung Yuma Kinoshita Shoko Imaizumi Sayaka Shiota | 2022/1/26 | |
Privacy-preserving image classification using an isotropic network | IEEE MultiMedia | MaungMaung AprilPyone Hitoshi Kiya | 2022/4/19 |