Skip to main content

Showing 1–11 of 11 results for author: Iijima, R

.
  1. arXiv:2402.07183  [pdf, other

    cs.AI

    A Random Ensemble of Encrypted Vision Transformers for Adversarially Robust Defense

    Authors: Ryota Iijima, Sayaka Shiota, Hitoshi Kiya

    Abstract: Deep neural networks (DNNs) are well known to be vulnerable to adversarial examples (AEs). In previous studies, the use of models encrypted with a secret key was demonstrated to be robust against white-box attacks, but not against black-box ones. In this paper, we propose a novel method using the vision transformer (ViT) that is a random ensemble of encrypted models for enhancing robustness agains… ▽ More

    Submitted 11 February, 2024; originally announced February 2024.

    Comments: 9 pages

  2. arXiv:2401.02633  [pdf, ps, other

    cs.CR cs.CV

    A Random Ensemble of Encrypted models for Enhancing Robustness against Adversarial Examples

    Authors: Ryota Iijima, Sayaka Shiota, Hitoshi Kiya

    Abstract: Deep neural networks (DNNs) are well known to be vulnerable to adversarial examples (AEs). In addition, AEs have adversarial transferability, which means AEs generated for a source model can fool another black-box model (target model) with a non-trivial probability. In previous studies, it was confirmed that the vision transformer (ViT) is more robust against the property of adversarial transferab… ▽ More

    Submitted 4 January, 2024; originally announced January 2024.

    Comments: 4 pages

  3. arXiv:2312.16789  [pdf, ps, other

    econ.TH cs.GT

    Monitoring with Rich Data

    Authors: Mira Frick, Ryota Iijima, Yuhta Ishii

    Abstract: We consider moral hazard problems where a principal has access to rich monitoring data about an agent's action. Rather than focusing on optimal contracts (which are known to in general be complicated), we characterize the optimal rate at which the principal's payoffs can converge to the first-best payoff as the amount of data grows large. Our main result suggests a novel rationale for the widely o… ▽ More

    Submitted 2 July, 2024; v1 submitted 27 December, 2023; originally announced December 2023.

  4. arXiv:2308.07612  [pdf, other

    cs.CR

    Block-Wise Encryption for Reliable Vision Transformer models

    Authors: Hitoshi Kiya, Ryota Iijima, Teru Nagamori

    Abstract: This article presents block-wise image encryption for the vision transformer and its applications. Perceptual image encryption for deep learning enables us not only to protect the visual information of plain images but to also embed unique features controlled with a key into images and models. However, when using conventional perceptual encryption methods, the performance of models is degraded due… ▽ More

    Submitted 15 August, 2023; originally announced August 2023.

    Comments: 7 figures, 3 tables. arXiv admin note: substantial text overlap with arXiv:2207.05366

  5. arXiv:2307.13985  [pdf, other

    cs.CR cs.CV

    Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models

    Authors: Ryota Iijima, Miki Tanaka, Sayaka Shiota, Hitoshi Kiya

    Abstract: Deep neural networks (DNNs) are well known to be vulnerable to adversarial examples (AEs). In addition, AEs have adversarial transferability, which means AEs generated for a source model can fool another black-box model (target model) with a non-trivial probability. In previous studies, it was confirmed that the vision transformer (ViT) is more robust against the property of adversarial transferab… ▽ More

    Submitted 26 July, 2023; originally announced July 2023.

    Comments: 4 pages, 3 figures

  6. arXiv:2301.08107  [pdf, other

    cs.HC

    SHITARA: Sending Haptic Induced Touchable Alarm by Ring-shaped Air vortex

    Authors: Ryosei Kojima, Akihisa Shitara, Tatsuki Fushimi, Ryogo Niwa, Atushi Shinoda, Ryo Iijima, Kengo Tanaka, Sayan Sarcar, Yoichi Ochiai

    Abstract: Social interaction begins with the other person's attention, but it is difficult for a d/Deaf or hard-of-hearing (DHH) person to notice the initial conversation cues. Wearable or visual devices have been proposed previously. However, these devices are cumbersome to wear or must stay within the DHH person's vision. In this study, we have proposed SHITARA, a novel accessibility method with air vorte… ▽ More

    Submitted 7 November, 2023; v1 submitted 19 January, 2023; originally announced January 2023.

    Comments: 30 pages, 22 figures

  7. arXiv:2209.08724  [pdf, other

    cs.LG

    On the Adversarial Transferability of ConvMixer Models

    Authors: Ryota Iijima, Miki Tanaka, Isao Echizen, Hitoshi Kiya

    Abstract: Deep neural networks (DNNs) are well known to be vulnerable to adversarial examples (AEs). In addition, AEs have adversarial transferability, which means AEs generated for a source model can fool another black-box model (target model) with a non-trivial probability. In this paper, we investigate the property of adversarial transferability between models including ConvMixer, which is an isotropic n… ▽ More

    Submitted 18 September, 2022; originally announced September 2022.

    Comments: 5 pages, 5 figures, 5 tables. arXiv admin note: substantial text overlap with arXiv:2209.02997

  8. arXiv:2208.13135  [pdf, other

    cs.CV cs.CR cs.LG

    An Access Control Method with Secret Key for Semantic Segmentation Models

    Authors: Teru Nagamori, Ryota Iijima, Hitoshi Kiya

    Abstract: A novel method for access control with a secret key is proposed to protect models from unauthorized access in this paper. We focus on semantic segmentation models with the vision transformer (ViT), called segmentation transformer (SETR). Most existing access control methods focus on image classification tasks, or they are limited to CNNs. By using a patch embedding structure that ViT has, trained… ▽ More

    Submitted 28 August, 2022; originally announced August 2022.

    Comments: To appear in the International Conference on Machine Learning and Cybernetics 2022 (ICMLC 2022)

  9. arXiv:2207.11939  [pdf, other

    cs.CR cs.CV

    An Encryption Method of ConvMixer Models without Performance Degradation

    Authors: Ryota Iijima, Hitoshi Kiya

    Abstract: In this paper, we propose an encryption method for ConvMixer models with a secret key. Encryption methods for DNN models have been studied to achieve adversarial defense, model protection and privacy-preserving image classification. However, the use of conventional encryption methods degrades the performance of models compared with that of plain models. Accordingly, we propose a novel method for e… ▽ More

    Submitted 25 July, 2022; originally announced July 2022.

    Comments: 6 pages, 5 figures. arXiv admin note: substantial text overlap with arXiv:2207.05366

  10. Image and Model Transformation with Secret Key for Vision Transformer

    Authors: Hitoshi Kiya, Ryota Iijima, MaungMaung Aprilpyone, Yuma Kinoshita

    Abstract: In this paper, we propose a combined use of transformed images and vision transformer (ViT) models transformed with a secret key. We show for the first time that models trained with plain images can be directly transformed to models trained with encrypted images on the basis of the ViT architecture, and the performance of the transformed models is the same as models trained with plain images when… ▽ More

    Submitted 20 July, 2022; v1 submitted 12 July, 2022; originally announced July 2022.

    Comments: 10 pages, 5 figures

  11. arXiv:2111.08927  [pdf, other

    cs.CV

    Protection of SVM Model with Secret Key from Unauthorized Access

    Authors: Ryota Iijima, AprilPyone MaungMaung, Hitoshi Kiya

    Abstract: In this paper, we propose a block-wise image transformation method with a secret key for support vector machine (SVM) models. Models trained by using transformed images offer a poor performance to unauthorized users without a key, while they can offer a high performance to authorized users with a key. The proposed method is demonstrated to be robust enough against unauthorized access even under th… ▽ More

    Submitted 17 November, 2021; originally announced November 2021.

    Comments: To appear in IWAIT 2022