B-2-3: Deep Generative Models for Media Clones and Its Detection |
All times are in New Zealand Time (UTC +13) |
| Presentation Time: Wednesday, December 9, 17:15 - 19:15 Check your Time Zone |
| B-2-3.1: AN EXTENSION OF ENCRYPTION-INSPIRED ADVERSARIAL DEFENSE WITH SECRET KEYS AGAINST ADVERSARIAL EXAMPLES |
| AprilPyone MaungMaung; Tokyo Metropolitan University |
| Hitoshi Kiya; Tokyo Metropolitan University |
| B-2-3.2: DETECTION OF CLONED RECOGNIZERS: A DEFENDING METHOD AGAINST RECOGNIZER CLONING ATTACK |
| Yuto Mori; Osaka University |
| Kazuaki Nakamura; Osaka University |
| Naoko Nitta; Osaka University |
| Noboru Babaguchi; Osaka University |
| B-2-3.3: CLASSIFICATION OF VIDEO RECAPTURED FROM DISPLAY DEVICE |
| Minoru Kuribayashi; Okayama University |
| Kodai Kamakari; Okayama University |
| Kento Kawata; Okayama University |
| Nobuo Funabiki; Okayama University |
| B-2-3.4: DETECTION OF ADVERSARIAL EXAMPLES BASED ON SENSITIVITIES TO NOISE REMOVAL FILTER |
| Akinori Higashi; Okayama University |
| Minoru Kuribayashi; Okayama University |
| Nobuo Funabiki; Okayama University |
| Huy Nguyen; National Institute of Informatics |
| Isao Echizen; National Institute of Informatics |
| B-2-3.5: A QR SYMBOL WITH ECDSA FOR BOTH PUBLIC AND SECRET AREAS USING RHOMBIC SUB-CELLS |
| Nobuyuki Teraura; Terrara Code Research Institute |
| Isao Echizen; National Institute of Informatics |
| Keiichi Iwamura; Tokyo University of Science |
| B-2-3.6: DEEP FACE RECOGNIZER PRIVACY ATTACK: MODEL INVERSION INITIALIZATION BY A DEEP GENERATIVE ADVERSARIAL DATA SPACE DISCRIMINATOR |
| Mahdi Khosravy; Osaka University |
| Kazuki Nakamura; Osaka University |
| Naoko Nitta; Osaka University |
| Noboru Babaguchi; Osaka University |
| B-2-3.7: COLOR TRANSFER TO ANONYMIZED GAIT IMAGES WHILE MAINTAINING ANONYMIZATION |
| Ngoc-Dung T. Tieu; National Institute of Informatics, |
| Junichi Yamagishi; National Institute of Informatics, |
| Isao Echizen; National Institute of Informatics, |