Targeted Attack of Deep Hashing Via Prototype-Supervised Adversarial Networks

被引:11
|
作者
Zhang, Zheng [1 ,2 ]
Wang, Xunguang [3 ]
Lu, Guangming [3 ]
Shen, Fumin [4 ,5 ]
Zhu, Lei [6 ]
机构
[1] Harbin Inst Technol, Shenzhen Key Lab Visual Object Detect & Recognit, Shenzhen 518055, Peoples R China
[2] Peng Cheng Lab, Shenzhen 518055, Peoples R China
[3] Harbin Inst Technol, Sch Comp Sci & Technol, Shenzhen 518055, Peoples R China
[4] Univ Elect Sci & Technol China, Ctr Future Media, Chengdu 610054, Peoples R China
[5] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[6] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan 47856, Shandong, Peoples R China
基金
中国国家自然科学基金;
关键词
Semantics; Prototypes; Generators; Optimization; Cats; Binary codes; Task analysis; Adversarial example; targeted attack; deep hashing; similarity retrieval; generative adversarial network; IMAGE RETRIEVAL;
D O I
10.1109/TMM.2021.3097506
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to its powerful capability of representation learning and efficient computation, deep hashing has made significant progress in large-scale image retrieval. It has been recognized that deep neural networks are vulnerable to adversarial examples, which is a practical secure problem but seldom studied in deep hashing-based retrieval field. In this paper, we propose a novel prototype-supervised adversarial network (ProS-GAN), which formulates a flexible generative architecture for efficient and effective targeted hashing attack. To the best of our knowledge, this is one of the first generation-based methods to attack deep hashing networks. Generally, our proposed framework consists of three parts, i.e., a PrototypeNet, a Generator and a Discriminator. Specifically, the designed PrototypeNet embeds the target label into the semantic representation and learns the prototype code as the category-level representative of the target label. Moreover, the semantic representation and the original image are jointly fed into the generator for flexible targeted attack. Particularly, the prototype code is adopted to supervise the generator to construct the targeted adversarial example by minimizing the Hamming distance between the hash code of the adversarial example and the prototype code. Furthermore, the generator fools the discriminator to simultaneously encourage the adversarial examples visually realistic and the semantic representation informative. Extensive experiments demonstrate that the proposed framework can efficiently produce adversarial examples with better targeted attack performance and transferability over state-of-the-art targeted attack methods of deep hashing. The source code is available at https://github.com/xunguangwang/ProS-GAN_Trans.
引用
收藏
页码:3392 / 3404
页数:13
相关论文
共 50 条
  • [1] Prototype-supervised Adversarial Network for Targeted Attack of Deep Hashing
    Wang, Xunguang
    Zhang, Zheng
    Wu, Baoyuan
    Shen, Fumin
    Lu, Guangming
    2021 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, CVPR 2021, 2021, : 16352 - 16361
  • [2] Targeted Adversarial Attack Against Deep Cross-Modal Hashing Retrieval
    Wang, Tianshi
    Zhu, Lei
    Zhang, Zheng
    Zhang, Huaxiang
    Han, Junwei
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2023, 33 (10) : 6159 - 6172
  • [3] Targeted Universal Adversarial Attack on Deep Hash Networks
    Meng, Fanlei
    Chen, Xiangru
    Cao, Yuan
    PROCEEDINGS OF THE 4TH ANNUAL ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA RETRIEVAL, ICMR 2024, 2024, : 165 - 174
  • [4] Targeted Attack and Defense for Deep Hashing
    Wang, Xunguang
    Zhang, Zheng
    Lu, Guangming
    Xu, Yong
    SIGIR '21 - PROCEEDINGS OF THE 44TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, 2021, : 2298 - 2302
  • [5] All Points Guided Adversarial Generator for Targeted Attack Against Deep Hashing Retrieval
    Tu, Rongxin
    Kang, Xiangui
    Tan, Chee Wei
    Chi, Chi-Hung
    Lam, Kwok-Yan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 1695 - 1709
  • [6] AdvHash: Set-to-set Targeted Attack on Deep Hashing with One Single Adversarial Patch
    Hu, Shengshan
    Zhang, Yechao
    Liu, Xiaogeng
    Zhang, Leo Yu
    Li, Minghui
    Jin, Hai
    PROCEEDINGS OF THE 29TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, MM 2021, 2021, : 2335 - 2343
  • [7] Deep Semantic Hashing with Generative Adversarial Networks
    Qiu, Zhaofan
    Pan, Yingwei
    Yao, Ting
    Mei, Tao
    SIGIR'17: PROCEEDINGS OF THE 40TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, 2017, : 225 - 234
  • [8] A Smart Adversarial Attack on Deep Hashing Based Image Retrieval
    Lu, Junda
    Chen, Mingyang
    Sun, Yifang
    Wang, Wei
    Wang, Yi
    Yang, Xiaochun
    PROCEEDINGS OF THE 2021 INTERNATIONAL CONFERENCE ON MULTIMEDIA RETRIEVAL (ICMR '21), 2021, : 227 - 235
  • [9] Toward Cross-Brain-Computer Interface: A Prototype-Supervised Adversarial Transfer Learning Approach With Multiple Sources
    Zhang, Jia
    Fang, Jinglong
    Liu, Siwei
    Liu, Dezheng
    Wu, Hanrui
    Long, Jinyi
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2024, 73
  • [10] Adversarial Binary Mutual Learning for Semi-Supervised Deep Hashing
    Wang, Guanan
    Hu, Qinghao
    Yang, Yang
    Cheng, Jian
    Hou, Zeng-Guang
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2022, 33 (08) : 4110 - 4124