Targeted Attack and Defense for Deep Hashing

被引:12
|
作者
Wang, Xunguang [1 ]
Zhang, Zheng [1 ,2 ]
Lu, Guangming [1 ]
Xu, Yong [1 ,2 ]
机构
[1] Harbin Inst Technol, Shenzhen Key Lab Visual Object Detect & Recognit, Shenzhen 518055, Peoples R China
[2] Peng Cheng Lab, Shenzhen 518055, Peoples R China
基金
中国国家自然科学基金;
关键词
deep hashing; similarity retrieval; adversarial example; targeted attack; adversarial defense; adversarial training;
D O I
10.1145/3404835.3463233
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep hashing methods have been intensively studied and successfully applied in massive fast image retrieval. However, inherited from the deficiency of deep neural networks, deep hashing models can be easily fooled by adversarial examples, which brings a serious security risk to hashing based retrieval. In this paper, we propose a novel targeted attack method and the first defense scheme for deep hashing based retrieval. Specifically, a simple yet effective PrototypeNet is designed to generate category-level semantic embedding (dubbed prototype code) regarded as the semantic representative of the target label, which preserves the semantic similarity with relevant labels and dissimilarity with irrelevant labels. Subsequently, we conduct the targeted attack by minimizing the Hamming distance between the hash code of the adversarial sample and the prototype code. Moreover, we provide an adversarial training algorithm to improve the adversarial robustness of deep hashing networks. Extensive experiments demonstrate our method can produce high-quality adversarial samples with the benefit of superior targeted attack performance over state-of-the-arts. Importantly, our adversarial defense framework can significantly boost the robustness of hashing networks against adversarial attacks on deep hashing based retrieval. The code is available at https://github.com/xunguangwang/Targeted- Attack-and-Defense-for-Deep-Hashing.
引用
收藏
页码:2298 / 2302
页数:5
相关论文
共 50 条
  • [21] Securing federated learning: a defense strategy against targeted data poisoning attack
    Ansam Khraisat
    Ammar Alazab
    Moutaz Alazab
    Tony Jan
    Sarabjot Singh
    Md. Ashraf Uddin
    Discover Internet of Things, 5 (1):
  • [22] ATTACK AND DEFENSE
    WHITTAKER, JK
    SOCIAL WORK, 1969, 14 (01) : 3 - 3
  • [23] DEFENSE OR ATTACK
    BURFOOT, RM
    ELECTRONICS WORLD & WIRELESS WORLD, 1995, (1709): : 323 - 325
  • [24] ATTACK ON DEFENSE
    不详
    ECONOMIST, 1956, 178 (10): : 576 - 576
  • [25] Attack and defense
    Jonsson, Eirikur
    LAEKNABLADID, 2022, 108 (09): : 385 - 385
  • [26] Multi-Targeted Poisoning Attack in Deep Neural Networks
    Kwon H.
    Cho S.
    IEICE Transactions on Information and Systems, 2022, E105D (11): : 1916 - 1920
  • [27] Deep Reinforcement Learning for Distribution System Cyber Attack Defense with DERs
    Selim, Alaa
    Zhao, Junbo
    Ding, Fei
    Miao, Fei
    Park, Sung-Yeul
    2023 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE, ISGT, 2023,
  • [28] An Attack-Resistant Hashing Scheme
    Peng, Tao
    Leckie, Christopher
    Ramamohanarao, Kotagiri
    2007 AUSTRALASIANTELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE, 2007, : 484 - 487
  • [29] Membership Inference Attack and Defense for Wireless Signal Classifiers With Deep Learning
    Shi, Yi
    Sagduyu, Yalin E.
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (07) : 4032 - 4043
  • [30] Understanding Adversarial Attack and Defense towards Deep Compressed Neural Networks
    Liu, Qi
    Liu, Tao
    Wen, Wujie
    CYBER SENSING 2018, 2018, 10630