Targeted Attack of Deep Hashing Via Prototype-Supervised Adversarial Networks

被引:11
|
作者
Zhang, Zheng [1 ,2 ]
Wang, Xunguang [3 ]
Lu, Guangming [3 ]
Shen, Fumin [4 ,5 ]
Zhu, Lei [6 ]
机构
[1] Harbin Inst Technol, Shenzhen Key Lab Visual Object Detect & Recognit, Shenzhen 518055, Peoples R China
[2] Peng Cheng Lab, Shenzhen 518055, Peoples R China
[3] Harbin Inst Technol, Sch Comp Sci & Technol, Shenzhen 518055, Peoples R China
[4] Univ Elect Sci & Technol China, Ctr Future Media, Chengdu 610054, Peoples R China
[5] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[6] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan 47856, Shandong, Peoples R China
基金
中国国家自然科学基金;
关键词
Semantics; Prototypes; Generators; Optimization; Cats; Binary codes; Task analysis; Adversarial example; targeted attack; deep hashing; similarity retrieval; generative adversarial network; IMAGE RETRIEVAL;
D O I
10.1109/TMM.2021.3097506
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to its powerful capability of representation learning and efficient computation, deep hashing has made significant progress in large-scale image retrieval. It has been recognized that deep neural networks are vulnerable to adversarial examples, which is a practical secure problem but seldom studied in deep hashing-based retrieval field. In this paper, we propose a novel prototype-supervised adversarial network (ProS-GAN), which formulates a flexible generative architecture for efficient and effective targeted hashing attack. To the best of our knowledge, this is one of the first generation-based methods to attack deep hashing networks. Generally, our proposed framework consists of three parts, i.e., a PrototypeNet, a Generator and a Discriminator. Specifically, the designed PrototypeNet embeds the target label into the semantic representation and learns the prototype code as the category-level representative of the target label. Moreover, the semantic representation and the original image are jointly fed into the generator for flexible targeted attack. Particularly, the prototype code is adopted to supervise the generator to construct the targeted adversarial example by minimizing the Hamming distance between the hash code of the adversarial example and the prototype code. Furthermore, the generator fools the discriminator to simultaneously encourage the adversarial examples visually realistic and the semantic representation informative. Extensive experiments demonstrate that the proposed framework can efficiently produce adversarial examples with better targeted attack performance and transferability over state-of-the-art targeted attack methods of deep hashing. The source code is available at https://github.com/xunguangwang/ProS-GAN_Trans.
引用
收藏
页码:3392 / 3404
页数:13
相关论文
共 50 条
  • [31] SSAH: Semi-Supervised Adversarial Deep Hashing with Self-Paced Hard Sample Generation
    Jin, Sheng
    Zhou, Shangchen
    Li, Yao
    Chen, Chao
    Sun, Xiaoshuai
    Yao, Hongxun
    Hua, Xian-Sheng
    THIRTY-FOURTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THE THIRTY-SECOND INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE AND THE TENTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2020, 34 : 11157 - 11164
  • [32] Dual-Targeted adversarial example in evasion attack on graph neural networks
    Kwon, Hyun
    Kim, Dae-Jin
    SCIENTIFIC REPORTS, 2025, 15 (01):
  • [33] Weakly Supervised Facial Attribute Manipulation via Deep Adversarial Network
    Wang, Yilin
    Wang, Suhang
    Qi, Guojun
    Tang, Jiliang
    Li, Baoxin
    2018 IEEE WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION (WACV 2018), 2018, : 112 - 121
  • [34] Priority Adversarial Example in Evasion Attack on Multiple Deep Neural Networks
    Kwon, Hyun
    Yoon, Hyunsoo
    Choi, Daeseon
    2019 1ST INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE IN INFORMATION AND COMMUNICATION (ICAIIC 2019), 2019, : 399 - 404
  • [35] Understanding Adversarial Attack and Defense towards Deep Compressed Neural Networks
    Liu, Qi
    Liu, Tao
    Wen, Wujie
    CYBER SENSING 2018, 2018, 10630
  • [36] Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training
    Wang, Derui
    Li, Chaoran
    Wen, Sheng
    Nepal, Surya
    Xiang, Yang
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 953 - 965
  • [37] Self-supervised Learning of PSMNet via Generative Adversarial Networks
    Yang, Xinyi
    Lai, Haifeng
    Zou, Bin
    Fu, Hang
    Long, Qian
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT VI, ICIC 2024, 2024, 14880 : 469 - 479
  • [38] Multi-Targeted Poisoning Attack in Deep Neural Networks
    Kwon H.
    Cho S.
    IEICE Transactions on Information and Systems, 2022, E105D (11): : 1916 - 1920
  • [39] AN ADVERSARIAL AND DEEP HASHING-BASED HIERARCHICAL SUPERVISED CROSS-MODAL IMAGE AND TEXT RETRIEVAL ALGORITHM
    Chen, Ruidong
    Qiang, Baohua
    Zhou, Mingliang
    Zhang, Shihao
    Zheng, Hong
    Tang, Chenghua
    International Journal of Robotics and Automation, 2024, 39 (01): : 77 - 86
  • [40] Cyclical Adversarial Attack Pierces Black-box Deep Neural Networks
    Huang, Lifeng
    Wei, Shuxin
    Gao, Chengying
    Liu, Ning
    PATTERN RECOGNITION, 2022, 131