DeepAI AI Chat
Log In Sign Up

Reliable and Efficient Evaluation of Adversarial Robustness for Deep Hashing-Based Retrieval

by   Xunguang Wang, et al.

Deep hashing has been extensively applied to massive image retrieval due to its efficiency and effectiveness. Recently, several adversarial attacks have been presented to reveal the vulnerability of deep hashing models against adversarial examples. However, existing attack methods suffer from degraded performance or inefficiency because they underutilize the semantic relations between original samples or spend a lot of time learning these relations with a deep neural network. In this paper, we propose a novel Pharos-guided Attack, dubbed PgA, to evaluate the adversarial robustness of deep hashing networks reliably and efficiently. Specifically, we design pharos code to represent the semantics of the benign image, which preserves the similarity to semantically relevant samples and dissimilarity to irrelevant ones. It is proven that we can quickly calculate the pharos code via a simple math formula. Accordingly, PgA can directly conduct a reliable and efficient attack on deep hashing-based retrieval by maximizing the similarity between the hash code of the adversarial example and the pharos code. Extensive experiments on the benchmark datasets verify that the proposed algorithm outperforms the prior state-of-the-arts in both attack strength and speed.


page 1

page 2

page 3

page 4


Centralized Adversarial Learning for Robust Deep Hashing

Deep hashing has been extensively utilized in massive image retrieval be...

BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label

Due to its powerful feature learning capability and high efficiency, dee...

Prototype-supervised Adversarial Network for Targeted Attack of Deep Hashing

Due to its powerful capability of representation learning and high-effic...

Improved Deep Classwise Hashing With Centers Similarity Learning for Image Retrieval

Deep supervised hashing for image retrieval has attracted researchers' a...

Weighted Contrastive Hashing

The development of unsupervised hashing is advanced by the recent popula...

Security analysis of cancellable biometrics using constrained-optimized similarity-based attack

Cancellable biometrics (CB) intentionally distorts biometric template fo...

Adversarial Attacks on Neural Models of Code via Code Difference Reduction

Deep learning has been widely used to solve various code-based tasks by ...