Skip to main content

Showing 1–17 of 17 results for author: MaungMaung, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.07662  [pdf, other

    cs.CV cs.CR

    Mitigating Backdoor Attacks using Activation-Guided Model Editing

    Authors: Felix Hsieh, Huy H. Nguyen, AprilPyone MaungMaung, Dmitrii Usynin, Isao Echizen

    Abstract: Backdoor attacks compromise the integrity and reliability of machine learning models by embedding a hidden trigger during the training process, which can later be activated to cause unintended misbehavior. We propose a novel backdoor mitigation approach via machine unlearning to counter such backdoor attacks. The proposed method utilizes model activation of domain-equivalent unseen data to guide t… ▽ More

    Submitted 30 September, 2024; v1 submitted 10 July, 2024; originally announced July 2024.

  2. arXiv:2402.08200  [pdf, other

    cs.CV

    Fine-Tuning Text-To-Image Diffusion Models for Class-Wise Spurious Feature Generation

    Authors: AprilPyone MaungMaung, Huy H. Nguyen, Hitoshi Kiya, Isao Echizen

    Abstract: We propose a method for generating spurious features by leveraging large-scale text-to-image diffusion models. Although the previous work detects spurious features in a large-scale dataset like ImageNet and introduces Spurious ImageNet, we found that not all spurious images are spurious across different classifiers. Although spurious images help measure the reliance of a classifier, filtering many… ▽ More

    Submitted 12 February, 2024; originally announced February 2024.

  3. arXiv:2401.07441  [pdf, other

    cs.CL

    Stability Analysis of ChatGPT-based Sentiment Analysis in AI Quality Assurance

    Authors: Tinghui Ouyang, AprilPyone MaungMaung, Koichi Konishi, Yoshiki Seo, Isao Echizen

    Abstract: In the era of large AI models, the complex architecture and vast parameters present substantial challenges for effective AI quality management (AIQM), e.g. large language model (LLM). This paper focuses on investigating the quality assurance of a specific LLM-based AI product--a ChatGPT-based sentiment analysis system. The study delves into stability issues related to both the operation and robust… ▽ More

    Submitted 14 January, 2024; originally announced January 2024.

  4. arXiv:2311.16577  [pdf, other

    cs.CV

    Efficient Key-Based Adversarial Defense for ImageNet by Using Pre-trained Model

    Authors: AprilPyone MaungMaung, Isao Echizen, Hitoshi Kiya

    Abstract: In this paper, we propose key-based defense model proliferation by leveraging pre-trained models and utilizing recent efficient fine-tuning techniques on ImageNet-1k classification. First, we stress that deploying key-based models on edge devices is feasible with the latest model deployment advancements, such as Apple CoreML, although the mainstream enterprise edge artificial intelligence (Edge AI… ▽ More

    Submitted 28 November, 2023; originally announced November 2023.

  5. arXiv:2309.01620  [pdf, other

    cs.CV

    Hindering Adversarial Attacks with Multiple Encrypted Patch Embeddings

    Authors: AprilPyone MaungMaung, Isao Echizen, Hitoshi Kiya

    Abstract: In this paper, we propose a new key-based defense focusing on both efficiency and robustness. Although the previous key-based defense seems effective in defending against adversarial examples, carefully designed adaptive attacks can bypass the previous defense, and it is difficult to train the previous defense on large datasets like ImageNet. We build upon the previous defense with two major impro… ▽ More

    Submitted 4 September, 2023; originally announced September 2023.

    Comments: To appear in APSIPA ASC 2023

  6. arXiv:2303.05036  [pdf, other

    cs.CV cs.CR

    Generative Model-Based Attack on Learnable Image Encryption for Privacy-Preserving Deep Learning

    Authors: AprilPyone MaungMaung, Hitoshi Kiya

    Abstract: In this paper, we propose a novel generative model-based attack on learnable image encryption methods proposed for privacy-preserving deep learning. Various learnable encryption methods have been studied to protect the sensitive visual information of plain images, and some of them have been investigated to be robust enough against all existing attacks. However, previous attacks on image encryption… ▽ More

    Submitted 9 March, 2023; originally announced March 2023.

    Comments: arXiv admin note: text overlap with arXiv:2209.07953

  7. arXiv:2302.06883  [pdf, other

    cs.CV

    Text-Guided Scene Sketch-to-Photo Synthesis

    Authors: AprilPyone MaungMaung, Makoto Shing, Kentaro Mitsui, Kei Sawada, Fumio Okura

    Abstract: We propose a method for scene-level sketch-to-photo synthesis with text guidance. Although object-level sketch-to-photo synthesis has been widely studied, whole-scene synthesis is still challenging without reference photos that adequately reflect the target style. To this end, we leverage knowledge from recent large-scale pre-trained generative models, resulting in text-guided sketch-to-photo synt… ▽ More

    Submitted 14 February, 2023; originally announced February 2023.

  8. arXiv:2301.04875  [pdf, other

    cs.CR cs.CV

    Color-NeuraCrypt: Privacy-Preserving Color-Image Classification Using Extended Random Neural Networks

    Authors: Zheng Qi, AprilPyone MaungMaung, Hitoshi Kiya

    Abstract: In recent years, with the development of cloud computing platforms, privacy-preserving methods for deep learning have become an urgent problem. NeuraCrypt is a private random neural network for privacy-preserving that allows data owners to encrypt the medical data before the data uploading, and data owners can train and then test their models in a cloud server with the encrypted data directly. How… ▽ More

    Submitted 12 January, 2023; originally announced January 2023.

  9. Access Control with Encrypted Feature Maps for Object Detection Models

    Authors: Teru Nagamori, Hiroki Ito, AprilPyone MaungMaung, Hitoshi Kiya

    Abstract: In this paper, we propose an access control method with a secret key for object detection models for the first time so that unauthorized users without a secret key cannot benefit from the performance of trained models. The method enables us not only to provide a high detection performance to authorized users but to also degrade the performance for unauthorized users. The use of transformed images… ▽ More

    Submitted 29 September, 2022; originally announced September 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2206.05422

  10. arXiv:2209.07953  [pdf, other

    cs.CV

    StyleGAN Encoder-Based Attack for Block Scrambled Face Images

    Authors: AprilPyone MaungMaung, Hitoshi Kiya

    Abstract: In this paper, we propose an attack method to block scrambled face images, particularly Encryption-then-Compression (EtC) applied images by utilizing the existing powerful StyleGAN encoder and decoder for the first time. Instead of reconstructing identical images as plain ones from encrypted images, we focus on recovering styles that can reveal identifiable information from the encrypted images. T… ▽ More

    Submitted 16 September, 2022; originally announced September 2022.

    Comments: To appear in APSIPA ASC 2022

  11. arXiv:2208.02556  [pdf, other

    cs.CV cs.CR

    Privacy-Preserving Image Classification Using ConvMixer with Adaptive Permutation Matrix

    Authors: Zheng Qi, AprilPyone MaungMaung, Hitoshi Kiya

    Abstract: In this paper, we propose a privacy-preserving image classification method using encrypted images under the use of the ConvMixer structure. Block-wise scrambled images, which are robust enough against various attacks, have been used for privacy-preserving image classification tasks, but the combined use of a classification network and an adaptation network is needed to reduce the influence of imag… ▽ More

    Submitted 4 August, 2022; originally announced August 2022.

    Comments: arXiv admin note: text overlap with arXiv:2205.12041

  12. arXiv:2206.05422  [pdf, other

    cs.CV eess.IV

    Access Control of Semantic Segmentation Models Using Encrypted Feature Maps

    Authors: Hiroki Ito, AprilPyone MaungMaung, Sayaka Shiota, Hitoshi Kiya

    Abstract: In this paper, we propose an access control method with a secret key for semantic segmentation models for the first time so that unauthorized users without a secret key cannot benefit from the performance of trained models. The method enables us not only to provide a high segmentation performance to authorized users but to also degrade the performance for unauthorized users. We first point out tha… ▽ More

    Submitted 11 June, 2022; originally announced June 2022.

  13. arXiv:2205.12041  [pdf, other

    cs.CV

    Privacy-Preserving Image Classification Using Vision Transformer

    Authors: Zheng Qi, AprilPyone MaungMaung, Yuma Kinoshita, Hitoshi Kiya

    Abstract: In this paper, we propose a privacy-preserving image classification method that is based on the combined use of encrypted images and the vision transformer (ViT). The proposed method allows us not only to apply images without visual information to ViT models for both training and testing but to also maintain a high classification accuracy. ViT utilizes patch embedding and position embedding for im… ▽ More

    Submitted 24 May, 2022; originally announced May 2022.

  14. arXiv:2204.07707  [pdf, other

    cs.CV eess.IV

    Privacy-Preserving Image Classification Using Isotropic Network

    Authors: AprilPyone MaungMaung, Hitoshi Kiya

    Abstract: In this paper, we propose a privacy-preserving image classification method that uses encrypted images and an isotropic network such as the vision transformer. The proposed method allows us not only to apply images without visual information to deep neural networks (DNNs) for both training and testing but also to maintain a high classification accuracy. In addition, compressible encrypted images, c… ▽ More

    Submitted 15 April, 2022; originally announced April 2022.

  15. arXiv:2201.11006  [pdf, other

    cs.CV cs.CR

    An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications

    Authors: Hitoshi Kiya, AprilPyone MaungMaung, Yuma Kinoshita, Shoko Imaizumi, Sayaka Shiota

    Abstract: This article presents an overview of image transformation with a secret key and its applications. Image transformation with a secret key enables us not only to protect visual information on plain images but also to embed unique features controlled with a key into images. In addition, numerous encryption methods can generate encrypted images that are compressible and learnable for machine learning.… ▽ More

    Submitted 15 April, 2022; v1 submitted 26 January, 2022; originally announced January 2022.

  16. arXiv:2111.08927  [pdf, other

    cs.CV

    Protection of SVM Model with Secret Key from Unauthorized Access

    Authors: Ryota Iijima, AprilPyone MaungMaung, Hitoshi Kiya

    Abstract: In this paper, we propose a block-wise image transformation method with a secret key for support vector machine (SVM) models. Models trained by using transformed images offer a poor performance to unauthorized users without a key, while they can offer a high performance to authorized users with a key. The proposed method is demonstrated to be robust enough against unauthorized access even under th… ▽ More

    Submitted 17 November, 2021; originally announced November 2021.

    Comments: To appear in IWAIT 2022

  17. arXiv:2105.14756  [pdf, other

    cs.CV cs.CR

    A Protection Method of Trained CNN Model with Secret Key from Unauthorized Access

    Authors: AprilPyone MaungMaung, Hitoshi Kiya

    Abstract: In this paper, we propose a novel method for protecting convolutional neural network (CNN) models with a secret key set so that unauthorized users without the correct key set cannot access trained models. The method enables us to protect not only from copyright infringement but also the functionality of a model from unauthorized access without any noticeable overhead. We introduce three block-wise… ▽ More

    Submitted 31 May, 2021; originally announced May 2021.