2020
DOI: 10.1007/978-3-030-58452-8_36
|View full text |Cite
|
Sign up to set email alerts
|

Targeted Attack for Deep Hashing Based Retrieval

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
58
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 66 publications
(61 citation statements)
references
References 42 publications
1
58
0
Order By: Relevance
“…The method in [261] can match the predicted distance to a different target scene or directly fabricate the depth of specific instances in the scene. Targeted attacks on hashing based retrieval are proposed in [262], [119], whereas a universal perturbation for image retrieval systems is computed in [263]. An example of adversarial attack on Graph Matching can be found in [264].…”
Section: E Miscellaneous Attacksmentioning
confidence: 99%
“…The method in [261] can match the predicted distance to a different target scene or directly fabricate the depth of specific instances in the scene. Targeted attacks on hashing based retrieval are proposed in [262], [119], whereas a universal perturbation for image retrieval systems is computed in [263]. An example of adversarial attack on Graph Matching can be found in [264].…”
Section: E Miscellaneous Attacksmentioning
confidence: 99%
“…For the attack on deep hashing based retrieval models, HAG [34] is the state-of-the-art untargeted method, it solved the vanishing gradient problem but it still used the idea of pushing the embedding of adversary query away from that of the original one. For the targeted attack, DHTA [3] improved [30] by calculating an anchor code and then move the adversarial query close to it.…”
Section: Adversarial Attack On Retrieval Systemsmentioning
confidence: 99%
“…In the right side figure, when (q) has the same () with ℎ(r ) (e.g., 1 for Case 1), our function wishes to change the () of (q) and assign a gradient on it. When (q) is around 0 (e.g., 3 ), its gradient is relatively larger than the others, and the gradient decreases to 0 fast when (q) • ℎ(r ) have different () (e.g., 2 ). However, the gradient of the inner product based function stay at the same value.…”
Section: Untargeted Adversarial Attackmentioning
confidence: 99%
See 2 more Smart Citations