Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ensemble of Models Trained by Key-based Transformed Images for Adversarially Robust Defense Against Black-box Attacks., and . CoRR, (2020)Pixel-Based Image Encryption Without Key Management for Privacy-Preserving Deep Neural Networks., , and . IEEE Access, (2019)Hue-Correction Scheme Considering Non-Linear Camera Response for Multi-Exposure Image Fusion., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 103-A (12): 1562-1570 (2020)Reinhard's global operator based inverse tone mapping with one parameter., , and . IWSDA, page 49-53. IEEE, (2017)Compression performance of extended JPEG XT under various TMOs., , , and . GCCE, page 1-4. IEEE, (2017)A Noise-aware Enhancement Method for Underexposed Images., , and . CoRR, (2019)HOG feature extraction from encrypted images for privacy-preserving machine learning., and . CoRR, (2019)Scene Segmentation-Based Luminance Adjustment for Multi-Exposure Image Fusion., and . CoRR, (2019)Conditions for convergence of a delayless subband adaptive filter and its efficient implementation., and . IEEE Trans. Signal Process., 46 (4): 1158-1167 (1998)Privacy-Preserving Deep Neural Networks Using Pixel-Based Image Encryption Without Common Security Keys., , and . APSIPA, page 1756-1761. IEEE, (2019)