default search action
April Pyone Maung Maung
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]April Pyone Maung Maung, Isao Echizen, Hitoshi Kiya:
On the Security of Learnable Image Encryption for Privacy-Preserving Deep Learning. IEEE Access 12: 126415-126425 (2024) - [i30]Tinghui Ouyang, AprilPyone MaungMaung, Koichi Konishi, Yoshiki Seo, Isao Echizen:
Stability Analysis of ChatGPT-based Sentiment Analysis in AI Quality Assurance. CoRR abs/2401.07441 (2024) - [i29]AprilPyone MaungMaung, Huy H. Nguyen, Hitoshi Kiya, Isao Echizen:
Fine-Tuning Text-To-Image Diffusion Models for Class-Wise Spurious Feature Generation. CoRR abs/2402.08200 (2024) - [i28]Felix Hsieh, Huy H. Nguyen, AprilPyone MaungMaung, Dmitrii Usynin, Isao Echizen:
Mitigating Backdoor Attacks using Activation-Guided Model Editing. CoRR abs/2407.07662 (2024) - 2023
- [j8]Hitoshi Kiya, Ryota Iijima, April Pyone Maung Maung, Yuma Kinoshita:
Image and Model Transformation with Secret Key for Vision Transformer. IEICE Trans. Inf. Syst. 106(1): 2-11 (2023) - [j7]Teru Nagamori, Hiroki Ito, April Pyone Maung Maung, Hitoshi Kiya:
Access Control with Encrypted Feature Maps for Object Detection Models. IEICE Trans. Inf. Syst. 106(1): 12-21 (2023) - [j6]Zheng Qi, AprilPyone MaungMaung, Hitoshi Kiya:
Privacy-Preserving Image Classification Using ConvMixer with Adaptative Permutation Matrix and Block-Wise Scrambled Image Encryption. J. Imaging 9(4): 85 (2023) - [c15]AprilPyone MaungMaung, Isao Echizen, Hitoshi Kiya:
Hindering Adversarial Attacks with Multiple Encrypted Patch Embeddings. APSIPA ASC 2023: 1398-1404 - [i27]Zheng Qi, AprilPyone MaungMaung, Hitoshi Kiya:
Color-NeuraCrypt: Privacy-Preserving Color-Image Classification Using Extended Random Neural Networks. CoRR abs/2301.04875 (2023) - [i26]AprilPyone MaungMaung, Makoto Shing, Kentaro Mitsui, Kei Sawada, Fumio Okura:
Text-Guided Scene Sketch-to-Photo Synthesis. CoRR abs/2302.06883 (2023) - [i25]AprilPyone MaungMaung, Hitoshi Kiya:
Generative Model-Based Attack on Learnable Image Encryption for Privacy-Preserving Deep Learning. CoRR abs/2303.05036 (2023) - [i24]AprilPyone MaungMaung, Isao Echizen, Hitoshi Kiya:
Hindering Adversarial Attacks with Multiple Encrypted Patch Embeddings. CoRR abs/2309.01620 (2023) - [i23]AprilPyone MaungMaung, Isao Echizen, Hitoshi Kiya:
Efficient Key-Based Adversarial Defense for ImageNet by Using Pre-trained Model. CoRR abs/2311.16577 (2023) - 2022
- [j5]MaungMaung AprilPyone, Hitoshi Kiya:
Privacy-Preserving Image Classification Using an Isotropic Network. IEEE Multim. 29(2): 23-33 (2022) - [c14]Zheng Qi, AprilPyone MaungMaung, Yuma Kinoshita, Hitoshi Kiya:
Privacy-Preserving Image Classification Using Vision Transformer. EUSIPCO 2022: 543-547 - [c13]Zheng Qi, AprilPyone MaungMaung, Hitoshi Kiya:
Privacy-Preserving Image Classification Using ConvMixer with Adaptive Permutation Matrix. GCCE 2022: 148-151 - [c12]Teru Nagamori, Hiroki Ito, MaungMaung AprilPyone, Hitoshi Kiya:
Access Control of Object Detection Models Using Encrypted Feature Maps. LifeTech 2022: 175-178 - [c11]Takayuki Osakabe, AprilPyone MaungMaung, Sayaka Shiota, Hitoshi Kiya:
Adversarial Detector with Robust Classifier. LifeTech 2022: 179-182 - [i22]Hitoshi Kiya, AprilPyone MaungMaung, Yuma Kinoshita, Shoko Imaizumi, Sayaka Shiota:
An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications. CoRR abs/2201.11006 (2022) - [i21]Teru Nagamori, Hiroki Ito, April Pyone Maung Maung, Hitoshi Kiya:
Access Control of Object Detection Models Using Encrypted Feature Maps. CoRR abs/2202.00265 (2022) - [i20]Takayuki Osakabe, MaungMaung AprilPyone, Sayaka Shiota, Hitoshi Kiya:
Adversarial Detector with Robust Classifier. CoRR abs/2202.02503 (2022) - [i19]AprilPyone MaungMaung, Hitoshi Kiya:
Privacy-Preserving Image Classification Using Isotropic Network. CoRR abs/2204.07707 (2022) - [i18]Zheng Qi, AprilPyone MaungMaung, Yuma Kinoshita, Hitoshi Kiya:
Privacy-Preserving Image Classification Using Vision Transformer. CoRR abs/2205.12041 (2022) - [i17]Hiroki Ito, AprilPyone MaungMaung, Sayaka Shiota, Hitoshi Kiya:
Access Control of Semantic Segmentation Models Using Encrypted Feature Maps. CoRR abs/2206.05422 (2022) - [i16]Hitoshi Kiya, Ryota Iijima, MaungMaung AprilPyone, Yuma Kinoshita:
Image and Model Transformation with Secret Key for Vision Transformer. CoRR abs/2207.05366 (2022) - [i15]Zheng Qi, AprilPyone MaungMaung, Hitoshi Kiya:
Privacy-Preserving Image Classification Using ConvMixer with Adaptive Permutation Matrix. CoRR abs/2208.02556 (2022) - [i14]AprilPyone MaungMaung, Hitoshi Kiya:
StyleGAN Encoder-Based Attack for Block Scrambled Face Images. CoRR abs/2209.07953 (2022) - [i13]Teru Nagamori, Hiroki Ito, AprilPyone MaungMaung, Hitoshi Kiya:
Access Control with Encrypted Feature Maps for Object Detection Models. CoRR abs/2209.14831 (2022) - 2021
- [j4]Hiroki Ito, Yuma Kinoshita, MaungMaung AprilPyone, Hitoshi Kiya:
Image to Perturbation: An Image Transformation Network for Generating Visually Protected Images for Privacy-Preserving Deep Neural Networks. IEEE Access 9: 64629-64638 (2021) - [j3]MaungMaung AprilPyone, Hitoshi Kiya:
Block-Wise Image Transformation With Secret Key for Adversarially Robust Defense. IEEE Trans. Inf. Forensics Secur. 16: 2709-2723 (2021) - [c10]Hiroki Ito, MaungMaung AprilPyone, Hitoshi Kiya:
Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models. APSIPA ASC 2021: 1833-1838 - [c9]MaungMaung AprilPyone, Hitoshi Kiya:
A Protection Method of Trained CNN Model Using Feature Maps Transformed With Secret Key From Unauthorized Access. APSIPA ASC 2021: 1851-1857 - [c8]AprilPyone MaungMaung, Hitoshi Kiya:
Ensemble of Key-Based Models: Defense Against Black-Box Adversarial Attacks. GCCE 2021: 95-98 - [c7]MaungMaung AprilPyone, Hitoshi Kiya:
Transfer Learning-Based Model Protection With Secret Key. ICIP 2021: 3877-3881 - [c6]April Pyone Maung Maung, Hitoshi Kiya:
Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret Key. IH&MMSec 2021: 159-164 - [i12]MaungMaung AprilPyone, Hitoshi Kiya:
Transfer Learning-Based Model Protection With Secret Key. CoRR abs/2103.03525 (2021) - [i11]MaungMaung AprilPyone, Hitoshi Kiya:
Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret Key. CoRR abs/2104.04241 (2021) - [i10]MaungMaung AprilPyone, Hitoshi Kiya:
A Protection Method of Trained CNN Model with Secret Key from Unauthorized Access. CoRR abs/2105.14756 (2021) - [i9]Hiroki Ito, MaungMaung AprilPyone, Hitoshi Kiya:
Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access. CoRR abs/2107.09362 (2021) - [i8]MaungMaung AprilPyone, Hitoshi Kiya:
A Protection Method of Trained CNN Model Using Feature Maps Transformed With Secret Key From Unauthorized Access. CoRR abs/2109.00224 (2021) - [i7]Hiroki Ito, MaungMaung AprilPyone, Hitoshi Kiya:
Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models. CoRR abs/2109.01332 (2021) - [i6]Ryota Iijima, AprilPyone MaungMaung, Hitoshi Kiya:
Protection of SVM Model with Secret Key from Unauthorized Access. CoRR abs/2111.08927 (2021) - 2020
- [j2]KokSheik Wong, ChuanSheng Chan, MaungMaung AprilPyone:
Lightweight Authentication for MP4 Format Container Using Subtitle Track. IEICE Trans. Inf. Syst. 103-D(1): 2-10 (2020) - [c5]MaungMaung AprilPyone, Hitoshi Kiya:
An Extension of Encryption-Inspired Adversarial Defense with Secret Keys against Adversarial Examples. APSIPA 2020: 1369-1374 - [c4]April Pyone Maung Maung, Hitoshi Kiya:
Training DNN Model with Secret Key for Model Protection. GCCE 2020: 818-821 - [c3]April Pyone Maung Maung, Hitoshi Kiya:
Encryption Inspired Adversarial Defense For Visual Classification. ICIP 2020: 1681-1685 - [i5]MaungMaung AprilPyone, Hitoshi Kiya:
Encryption Inspired Adversarial Defense for Visual Classification. CoRR abs/2005.07998 (2020) - [i4]April Pyone Maung Maung, Hitoshi Kiya:
Training DNN Model with Secret Key for Model Protection. CoRR abs/2008.02450 (2020) - [i3]MaungMaung AprilPyone, Hitoshi Kiya:
Block-wise Image Transformation with Secret Key for Adversarially Robust Defense. CoRR abs/2010.00801 (2020) - [i2]MaungMaung AprilPyone, Hitoshi Kiya:
Ensemble of Models Trained by Key-based Transformed Images for Adversarially Robust Defense Against Black-box Attacks. CoRR abs/2011.07697 (2020)
2010 – 2019
- 2019
- [j1]MaungMaung AprilPyone, Yuma Kinoshita, Hitoshi Kiya:
Adversarial Robustness by One Bit Double Quantization for Visual Classification. IEEE Access 7: 177932-177943 (2019) - [c2]MaungMaung AprilPyone, Yuma Kinoshita, Hitoshi Kiya:
Filtering Adversarial Noise with Double Quantization. APSIPA 2019: 1745-1749 - [c1]MaungMaung AprilPyone, Warit Sirichotedumrong, Hitoshi Kiya:
Adversarial Test on Learnable Image Encryption. GCCE 2019: 667-669 - [i1]MaungMaung AprilPyone, Warit Sirichotedumrong, Hitoshi Kiya:
Adversarial Test on Learnable Image Encryption. CoRR abs/1907.13342 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint