Targeted Attack and Defense for Deep Hashing

被引:12
|
作者
Wang, Xunguang [1 ]
Zhang, Zheng [1 ,2 ]
Lu, Guangming [1 ]
Xu, Yong [1 ,2 ]
机构
[1] Harbin Inst Technol, Shenzhen Key Lab Visual Object Detect & Recognit, Shenzhen 518055, Peoples R China
[2] Peng Cheng Lab, Shenzhen 518055, Peoples R China
基金
中国国家自然科学基金;
关键词
deep hashing; similarity retrieval; adversarial example; targeted attack; adversarial defense; adversarial training;
D O I
10.1145/3404835.3463233
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep hashing methods have been intensively studied and successfully applied in massive fast image retrieval. However, inherited from the deficiency of deep neural networks, deep hashing models can be easily fooled by adversarial examples, which brings a serious security risk to hashing based retrieval. In this paper, we propose a novel targeted attack method and the first defense scheme for deep hashing based retrieval. Specifically, a simple yet effective PrototypeNet is designed to generate category-level semantic embedding (dubbed prototype code) regarded as the semantic representative of the target label, which preserves the semantic similarity with relevant labels and dissimilarity with irrelevant labels. Subsequently, we conduct the targeted attack by minimizing the Hamming distance between the hash code of the adversarial sample and the prototype code. Moreover, we provide an adversarial training algorithm to improve the adversarial robustness of deep hashing networks. Extensive experiments demonstrate our method can produce high-quality adversarial samples with the benefit of superior targeted attack performance over state-of-the-arts. Importantly, our adversarial defense framework can significantly boost the robustness of hashing networks against adversarial attacks on deep hashing based retrieval. The code is available at https://github.com/xunguangwang/Targeted- Attack-and-Defense-for-Deep-Hashing.
引用
收藏
页码:2298 / 2302
页数:5
相关论文
共 50 条
  • [31] Adversarial Attack and Defense on Deep Learning for Air Transportation Communication Jamming
    Liu, Mingqian
    Zhang, Zhenju
    Chen, Yunfei
    Ge, Jianhua
    Zhao, Nan
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (01) : 973 - 986
  • [32] Research on Deep Learning-Powered Malware Attack and Defense Techniques
    Ji T.-T.
    Fang B.-X.
    Cui X.
    Wang Z.-R.
    Gan R.-L.
    Han Y.
    Yu W.-Q.
    Jisuanji Xuebao/Chinese Journal of Computers, 2021, 44 (04): : 669 - 695
  • [33] In Defense of Locality-Sensitive Hashing
    Ding, Kun
    Huo, Chunlei
    Fan, Bin
    Xiang, Shiming
    Pan, Chunhong
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2018, 29 (01) : 87 - 103
  • [34] Deep Video Hashing
    Liong, Venice Erin
    Lu, Jiwen
    Tan, Yap-Peng
    Zhou, Jie
    IEEE TRANSACTIONS ON MULTIMEDIA, 2017, 19 (06) : 1209 - 1219
  • [35] Deep Priority Hashing
    Cao, Zhangjie
    Sun, Ziping
    Long, Mingsheng
    Wang, Jianmin
    Yu, Philip S.
    PROCEEDINGS OF THE 2018 ACM MULTIMEDIA CONFERENCE (MM'18), 2018, : 1653 - 1661
  • [36] Targeted Attention Attack on Deep Learning Models in Road Sign Recognition
    Yang, Xinghao
    Liu, Weifeng
    Zhang, Shengli
    Liu, Wei
    Tao, Dacheng
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) : 4980 - 4990
  • [37] ViTH-RFG: Vision Transformer Hashing With Residual Fuzzy Generation for Targeted Attack in Medical Image Retrieval
    Ding, Weiping
    Liu, Chuansheng
    Huang, Jiashuang
    Cheng, Chun
    Ju, Hengrong
    IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2024, 32 (10) : 5571 - 5584
  • [38] Adversarial Deep Learning for Cognitive Radio Security: Jamming Attack and Defense Strategies
    Shi, Yi
    Sagduyu, Yalin E.
    Erpek, Tugba
    Davaslioglu, Kemal
    Lu, Zhuo
    Li, Jason H.
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2018,
  • [39] Intelligent defense strategies: Comprehensive attack detection in VANET with deep reinforcement learning
    Sultana, Rukhsar
    Grover, Jyoti
    Tripathi, Meenakshi
    PERVASIVE AND MOBILE COMPUTING, 2024, 103
  • [40] DDoS attack detection and defense based on hybrid deep learning model in SDN
    Li C.
    Wu Y.
    Qian Z.
    Sun Z.
    Wang W.
    2018, Editorial Board of Journal on Communications (39): : 176 - 187