Targeted Attack of Deep Hashing Via Prototype-Supervised Adversarial Networks

被引:11
|
作者
Zhang, Zheng [1 ,2 ]
Wang, Xunguang [3 ]
Lu, Guangming [3 ]
Shen, Fumin [4 ,5 ]
Zhu, Lei [6 ]
机构
[1] Harbin Inst Technol, Shenzhen Key Lab Visual Object Detect & Recognit, Shenzhen 518055, Peoples R China
[2] Peng Cheng Lab, Shenzhen 518055, Peoples R China
[3] Harbin Inst Technol, Sch Comp Sci & Technol, Shenzhen 518055, Peoples R China
[4] Univ Elect Sci & Technol China, Ctr Future Media, Chengdu 610054, Peoples R China
[5] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[6] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan 47856, Shandong, Peoples R China
基金
中国国家自然科学基金;
关键词
Semantics; Prototypes; Generators; Optimization; Cats; Binary codes; Task analysis; Adversarial example; targeted attack; deep hashing; similarity retrieval; generative adversarial network; IMAGE RETRIEVAL;
D O I
10.1109/TMM.2021.3097506
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to its powerful capability of representation learning and efficient computation, deep hashing has made significant progress in large-scale image retrieval. It has been recognized that deep neural networks are vulnerable to adversarial examples, which is a practical secure problem but seldom studied in deep hashing-based retrieval field. In this paper, we propose a novel prototype-supervised adversarial network (ProS-GAN), which formulates a flexible generative architecture for efficient and effective targeted hashing attack. To the best of our knowledge, this is one of the first generation-based methods to attack deep hashing networks. Generally, our proposed framework consists of three parts, i.e., a PrototypeNet, a Generator and a Discriminator. Specifically, the designed PrototypeNet embeds the target label into the semantic representation and learns the prototype code as the category-level representative of the target label. Moreover, the semantic representation and the original image are jointly fed into the generator for flexible targeted attack. Particularly, the prototype code is adopted to supervise the generator to construct the targeted adversarial example by minimizing the Hamming distance between the hash code of the adversarial example and the prototype code. Furthermore, the generator fools the discriminator to simultaneously encourage the adversarial examples visually realistic and the semantic representation informative. Extensive experiments demonstrate that the proposed framework can efficiently produce adversarial examples with better targeted attack performance and transferability over state-of-the-art targeted attack methods of deep hashing. The source code is available at https://github.com/xunguangwang/ProS-GAN_Trans.
引用
收藏
页码:3392 / 3404
页数:13
相关论文
共 50 条
  • [41] Query efficient black-box adversarial attack on deep neural networks
    Bai, Yang
    Wang, Yisen
    Zeng, Yuyuan
    Jiang, Yong
    Xia, Shu-Tao
    PATTERN RECOGNITION, 2023, 133
  • [42] Invisible Adversarial Attack against Deep Neural Networks: An Adaptive Penalization Approach
    Wang, Zhibo
    Song, Mengkai
    Zheng, Siyan
    Zhang, Zhifei
    Song, Yang
    Wang, Qian
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1474 - 1488
  • [43] Invisible Adversarial Attack against Deep Neural Networks: An Adaptive Penalization Approach
    Wang, Zhibo
    Song, Mengkai
    Zheng, Siyan
    Zhang, Zhifei
    Song, Yang
    Wang, Qian
    IEEE Transactions on Dependable and Secure Computing, 2021, 18 (03): : 1474 - 1488
  • [44] AdvGuard: Fortifying Deep Neural Networks Against Optimized Adversarial Example Attack
    Kwon, Hyun
    Lee, Jun
    IEEE ACCESS, 2024, 12 : 5345 - 5356
  • [45] Gradient-based Adversarial Attack Detection via Deep Feature Extraction
    Michel, Andy
    Ewetz, Rickard
    SOUTHEASTCON 2022, 2022, : 213 - 220
  • [46] Boosting Transferability of Targeted Adversarial Examples via Hierarchical Generative Networks
    Yang, Xiao
    Dong, Yinpeng
    Pang, Tianyu
    Su, Hang
    Zhu, Jun
    COMPUTER VISION - ECCV 2022, PT IV, 2022, 13664 : 725 - 742
  • [47] Hardening Deep Neural Networks via Adversarial Model Cascades
    Vijaykeerthy, Deepak
    Suri, Anshuman
    Mehta, Sameep
    Kumaraguru, Ponnurangam
    2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2019,
  • [48] Deep Domain Generalization via Conditional Invariant Adversarial Networks
    Li, Ya
    Tian, Xinmei
    Gong, Mingming
    Liu, Yajing
    Liu, Tongliang
    Zhang, Kun
    Tao, Dacheng
    COMPUTER VISION - ECCV 2018, PT 15, 2018, 11219 : 647 - 663
  • [49] Adversarial Label Poisoning Attack on Graph Neural Networks via Label Propagation
    Liu, Ganlin
    Huang, Xiaowei
    Yi, Xinping
    COMPUTER VISION - ECCV 2022, PT V, 2022, 13665 : 227 - 243
  • [50] Detect and Remove Watermark in Deep Neural Networks via Generative Adversarial Networks
    Sun, Shichang
    Wang, Haoqi
    Xue, Mingfu
    Zhang, Yushu
    Wang, Jian
    Liu, Weiqiang
    INFORMATION SECURITY (ISC 2021), 2021, 13118 : 341 - 357