Targeted Mismatch Adversarial Attack: Query with a Flower to Retrieve the Tower

08/24/2019
by   Giorgos Tolias, et al.
15

Access to online visual search engines implies sharing of private user content - the query images. We introduce the concept of targeted mismatch attack for deep learning based retrieval systems to generate an adversarial image to conceal the query image. The generated image looks nothing like the user intended query, but leads to identical or very similar retrieval results. Transferring attacks to fully unseen networks is challenging. We show successful attacks to partially unknown systems, by designing various loss functions for the adversarial image construction. These include loss functions, for example, for unknown global pooling operation or unknown input resolution by the retrieval system. We evaluate the attacks on standard retrieval benchmarks and compare the results retrieved with the original and adversarial image.

READ FULL TEXT

page 1

page 7

page 8

research
03/04/2021

QAIR: Practical Query-efficient Black-Box Attacks for Image Retrieval

We study the query-based attack against image retrieval to evaluate its ...
research
07/12/2019

Unsupervised Adversarial Attacks on Deep Feature-based Retrieval with GAN

Studies show that Deep Neural Network (DNN)-based image classification m...
research
05/23/2023

QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems

Current adversarial attacks against speaker recognition systems (SRSs) r...
research
12/01/2018

Effects of Loss Functions And Target Representations on Adversarial Robustness

Understanding and evaluating the robustness of neural networks against a...
research
10/05/2022

On Adversarial Robustness of Deep Image Deblurring

Recent approaches employ deep learning-based solutions for the recovery ...
research
03/17/2021

Can Targeted Adversarial Examples Transfer When the Source and Target Models Have No Label Space Overlap?

We design blackbox transfer-based targeted adversarial attacks for an en...
research
08/23/2021

Multi-Expert Adversarial Attack Detection in Person Re-identification Using Context Inconsistency

The success of deep neural networks (DNNs) haspromoted the widespread ap...

Please sign up or login with your details

Forgot password? Click here to reset