B-2-3: Deep Generative Models for Media Clones and Its Detection |
All times are in New Zealand Time (UTC +13) |
Presentation Time: Wednesday, December 9, 17:15 - 19:15 Check your Time Zone |
B-2-3.1: AN EXTENSION OF ENCRYPTION-INSPIRED ADVERSARIAL DEFENSE WITH SECRET KEYS AGAINST ADVERSARIAL EXAMPLES |
AprilPyone MaungMaung; Tokyo Metropolitan University |
Hitoshi Kiya; Tokyo Metropolitan University |
B-2-3.2: DETECTION OF CLONED RECOGNIZERS: A DEFENDING METHOD AGAINST RECOGNIZER CLONING ATTACK |
Yuto Mori; Osaka University |
Kazuaki Nakamura; Osaka University |
Naoko Nitta; Osaka University |
Noboru Babaguchi; Osaka University |
B-2-3.3: CLASSIFICATION OF VIDEO RECAPTURED FROM DISPLAY DEVICE |
Minoru Kuribayashi; Okayama University |
Kodai Kamakari; Okayama University |
Kento Kawata; Okayama University |
Nobuo Funabiki; Okayama University |
B-2-3.4: DETECTION OF ADVERSARIAL EXAMPLES BASED ON SENSITIVITIES TO NOISE REMOVAL FILTER |
Akinori Higashi; Okayama University |
Minoru Kuribayashi; Okayama University |
Nobuo Funabiki; Okayama University |
Huy Nguyen; National Institute of Informatics |
Isao Echizen; National Institute of Informatics |
B-2-3.5: A QR SYMBOL WITH ECDSA FOR BOTH PUBLIC AND SECRET AREAS USING RHOMBIC SUB-CELLS |
Nobuyuki Teraura; Terrara Code Research Institute |
Isao Echizen; National Institute of Informatics |
Keiichi Iwamura; Tokyo University of Science |
B-2-3.6: DEEP FACE RECOGNIZER PRIVACY ATTACK: MODEL INVERSION INITIALIZATION BY A DEEP GENERATIVE ADVERSARIAL DATA SPACE DISCRIMINATOR |
Mahdi Khosravy; Osaka University |
Kazuki Nakamura; Osaka University |
Naoko Nitta; Osaka University |
Noboru Babaguchi; Osaka University |
B-2-3.7: COLOR TRANSFER TO ANONYMIZED GAIT IMAGES WHILE MAINTAINING ANONYMIZATION |
Ngoc-Dung T. Tieu; National Institute of Informatics, |
Junichi Yamagishi; National Institute of Informatics, |
Isao Echizen; National Institute of Informatics, |