Targeted Attack for Deep Hashing based Retrieval
暂无分享,去创建一个
Bin Chen | Jiawang Bai | Yiming Li | Dongxian Wu | Shu-tao Xia | Weiwei Guo | En-hui Yang
[1] Manuel Torres,et al. Evaluation of Information Retrieval Systems , 2003, JISBD.
[2] Heng Tao Shen,et al. Unsupervised Deep Hashing with Similarity-Adaptive and Discrete Optimization , 2018, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[3] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[4] Jian Sun,et al. Graph Cuts for Supervised Binary Coding , 2014, ECCV.
[5] Giorgos Tolias,et al. Targeted Mismatch Adversarial Attack: Query With a Flower to Retrieve the Tower , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[6] Natalia Gimelshein,et al. PyTorch: An Imperative Style, High-Performance Deep Learning Library , 2019, NeurIPS.
[7] James Bailey,et al. Adversarial Camouflage: Hiding Physical-World Attacks With Natural Styles , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[8] Baoyuan Wu,et al. Sparse Adversarial Attack via Perturbation Factorization , 2020, ECCV.
[9] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[10] Nicu Sebe,et al. A Survey on Learning to Hash , 2016, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[11] Anqi Xu,et al. Physical Adversarial Textures That Fool Visual Object Tracking , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[12] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[13] Jiwen Lu,et al. Deep Hashing via Discrepancy Minimization , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[14] Wei Liu,et al. Efficient Decision-Based Black-Box Adversarial Attacks on Face Recognition , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[15] Wei Liu,et al. Learning to Hash for Indexing Big Data—A Survey , 2015, Proceedings of the IEEE.
[16] Meng Wang,et al. Spectral Hashing With Semantically Consistent Graph for Image Indexing , 2013, IEEE Transactions on Multimedia.
[17] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[18] Wei Liu,et al. Supervised Discrete Hashing , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[19] James Bailey,et al. Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets , 2020, ICLR.
[20] David A. Wagner,et al. Audio Adversarial Examples: Targeted Attacks on Speech-to-Text , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[21] Hong Liu,et al. Universal Perturbation Attack Against Image Retrieval , 2018, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[22] Baoyuan Wu,et al. Boosting Decision-Based Black-Box Adversarial Attacks with Random Sign Flip , 2020, ECCV.
[23] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[24] Bin Chen,et al. Adversarial Attack on Deep Product Quantization Network for Image Retrieval , 2020, AAAI.
[25] Dacheng Tao,et al. Adversarial Examples for Hamming Space Search , 2020, IEEE Transactions on Cybernetics.
[26] James Bailey,et al. Understanding Adversarial Attacks on Deep Learning Based Medical Image Analysis Systems , 2019, Pattern Recognit..
[27] Xuelong Li,et al. Deep Binary Reconstruction for Cross-Modal Hashing , 2017, IEEE Transactions on Multimedia.
[28] Zheng Lin,et al. Deep Supervised Hashing for Multi-Label and Large-Scale Image Retrieval , 2017, ICMR.
[29] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[30] Chao Ma,et al. Supervised Recurrent Hashing for Large Scale Video Retrieval , 2016, ACM Multimedia.
[31] Michael S. Bernstein,et al. ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.
[32] Tat-Seng Chua,et al. NUS-WIDE: a real-world web image database from National University of Singapore , 2009, CIVR '09.
[33] Jiwen Lu,et al. Neighborhood Preserving Hashing for Scalable Video Retrieval , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[34] Atul Prakash,et al. Robust Physical-World Attacks on Deep Learning Visual Classification , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[35] Kurt Keutzer,et al. Trust Region Based Adversarial Attack on Neural Networks , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[36] Lijun Zhang,et al. Semi-Supervised Deep Hashing with a Bipartite Graph , 2017, IJCAI.
[37] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[38] Jun Zhu,et al. Boosting Adversarial Attacks with Momentum , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[39] Shu-Tao Xia,et al. Improving Query Efficiency of Black-box Adversarial Attack , 2020, ECCV.
[40] Baoyuan Wu,et al. Exact Adversarial Attack to Image Captioning via Structured Output Learning With Latent Variables , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[41] Hanjiang Lai,et al. Supervised Hashing for Image Retrieval via Image Representation Learning , 2014, AAAI.
[42] Rongrong Ji,et al. Supervised hashing with kernels , 2012, 2012 IEEE Conference on Computer Vision and Pattern Recognition.
[43] Shiguang Shan,et al. Deep Supervised Hashing for Fast Image Retrieval , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[44] Wai Keung Wong,et al. Deep Supervised Hashing With Anchor Graph , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[45] Jianmin Wang,et al. Deep Hashing Network for Efficient Similarity Retrieval , 2016, AAAI.
[46] Dacheng Tao,et al. DistillHash: Unsupervised Deep Hashing by Distilling Data Pairs , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[47] Tong Zhang,et al. Solving large scale linear prediction problems using stochastic gradient descent algorithms , 2004, ICML.
[48] Mubarak Shah,et al. UCF101: A Dataset of 101 Human Actions Classes From Videos in The Wild , 2012, ArXiv.
[49] Tieniu Tan,et al. Deep semantic ranking based hashing for multi-label image retrieval , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[50] Hai Li,et al. Feature Space Perturbations Yield More Transferable Adversarial Examples , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[51] Meng Wang,et al. Self-Supervised Video Hashing With Hierarchical Binary Auto-Encoder , 2018, IEEE Transactions on Image Processing.
[52] Jiwen Lu,et al. Deep Video Hashing , 2017, IEEE Transactions on Multimedia.
[53] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[54] Cordelia Schmid,et al. Towards Understanding Action Recognition , 2013, 2013 IEEE International Conference on Computer Vision.
[55] Jianmin Wang,et al. Deep Cauchy Hashing for Hamming Space Retrieval , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[56] Colin Raffel,et al. Imperceptible, Robust, and Targeted Adversarial Examples for Automatic Speech Recognition , 2019, ICML.
[57] Ling Shao,et al. Unsupervised Deep Video Hashing via Balanced Code for Large-Scale Video Retrieval , 2019, IEEE Transactions on Image Processing.
[58] Hanjiang Lai,et al. Simultaneous feature learning and hash coding with deep neural networks , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[59] Philip S. Yu,et al. HashNet: Deep Learning to Hash by Continuation , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[60] Wei Liu,et al. Self-Supervised Adversarial Hashing Networks for Cross-Modal Retrieval , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[61] Dan Boneh,et al. Ensemble Adversarial Training: Attacks and Defenses , 2017, ICLR.