Prototype-supervised Adversarial Network for Targeted Attack of Deep Hashing

被引:33
|
作者
Wang, Xunguang [1 ]
Zhang, Zheng [1 ,2 ]
Wu, Baoyuan [3 ,4 ]
Shen, Fumin [5 ,6 ]
Lu, Guangming [1 ]
机构
[1] Harbin Inst Technol, Shenzhen, Peoples R China
[2] Peng Cheng Lab, Shenzhen, Peoples R China
[3] Chinese Univ Hong Kong, Sch Data Sci, Shenzhen, Peoples R China
[4] Shenzhen Res Inst Big Data, Secure Comp Lab Big Data, Shenzhen, Peoples R China
[5] Univ Elect Sci & Technol China, Chengdu, Peoples R China
[6] Koala Uran Tech, Chengdu, Peoples R China
基金
中国国家自然科学基金;
关键词
IMAGE RETRIEVAL;
D O I
10.1109/CVPR46437.2021.01609
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Due to its powerful capability of representation learning and high-efficiency computation, deep hashing has made significant progress in large-scale image retrieval. However, deep hashing networks are vulnerable to adversarial examples, which is a practical secure problem but seldom studied in hashing-based retrieval field. In this paper, we propose a novel prototype-supervised adversarial network (ProS-GAN), which formulates a flexible generative architecture for efficient and effective targeted hashing attack. To the best of our knowledge, this is the first generation-based method to attack deep hashing networks. Generally, our proposed framework consists of three parts, i.e., a PrototypeNet, a generator and a discriminator. Specifically, the designed PrototypeNet embeds the target label into the semantic representation and learns the prototype code as the category-level representative of the target label. Moreover, the semantic representation and the original image are jointly fed into the generator for flexible targeted attack. Particularly, the prototype code is adopted to supervise the generator to construct the targeted adversarial example by minimizing the Hamming distance between the hash code of the adversarial example and the prototype code. Furthermore, the generator is against the discriminator to simultaneously encourage the adversarial examples visually realistic and the semantic representation informative. Extensive experiments verify that the proposed framework can efficiently produce adversarial examples with better targeted attack performance and transferability over state-of-the-art targeted attack methods of deep hashing.
引用
收藏
页码:16352 / 16361
页数:10
相关论文
共 50 条
  • [21] Deep Discrete Supervised Hashing
    Jiang, Qing-Yuan
    Cui, Xue
    Li, Wu-Jun
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2018, 27 (12) : 5996 - 6009
  • [22] DFH-GAN: A Deep Face Hashing with Generative Adversarial Network
    Zhou, Lanxiang
    Wang, Yifei
    Xiao, Bo
    Xu, Qianfang
    2020 25TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2021, : 7012 - 7019
  • [23] Efficient Non-Targeted Attack for Deep Hashing Based Image Retrieval
    Qin, Chuan
    Wu, Liang
    Zhang, Xinpeng
    Feng, Guorui
    IEEE SIGNAL PROCESSING LETTERS, 2021, 28 : 1893 - 1897
  • [24] Deep Polarized Network for Supervised Learning of Accurate Binary Hashing Codes
    Fan, Lixin
    Ng, Kam Woh
    Ju, Ce
    Zhang, Tianyu
    Chan, Chee Seng
    PROCEEDINGS OF THE TWENTY-NINTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2020, : 825 - 831
  • [25] Deep Supervised Hashing with Information Loss
    Zhang, Xueni
    Zhou, Lei
    Bai, Xiao
    Hancock, Edwin
    STRUCTURAL, SYNTACTIC, AND STATISTICAL PATTERN RECOGNITION, S+SSPR 2018, 2018, 11004 : 395 - 405
  • [26] Deep Supervised Hashing with Anchor Graph
    Chen, Yudong
    Lai, Zhihui
    Ding, Yujuan
    Lin, Kaiyi
    Wong, Wai Keung
    2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2019), 2019, : 9795 - 9803
  • [27] Adversarial Attack on Deep Product Quantization Network for Image Retrieval
    Feng, Yan
    Chen, Bin
    Dai, Tao
    Xia, Shu-Tao
    THIRTY-FOURTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THE THIRTY-SECOND INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE AND THE TENTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2020, 34 : 10786 - 10793
  • [28] Adversarial Attack Defense Based on the Deep Image Prior Network
    Sutanto, Richard Evan
    Lee, Sukho
    INFORMATION SCIENCE AND APPLICATIONS, 2020, 621 : 519 - 526
  • [29] Deep Supervised Hashing with Triplet Labels
    Wang, Xiaofang
    Shi, Yi
    Kitani, Kris M.
    COMPUTER VISION - ACCV 2016, PT I, 2017, 10111 : 70 - 84
  • [30] Deep Supervised Hashing with Nonlinear Projections
    Su, Sen
    Chen, Gang
    Cheng, Xiang
    Bi, Rong
    PROCEEDINGS OF THE TWENTY-SIXTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2017, : 2786 - 2792