Autor: |
Wang, Tianshi, Li, Fengling, Zhu, Lei, Li, Jingjing, Zhang, Zheng, Shen, Heng Tao |
Zdroj: |
ACM Transactions on Information Systems; Jul2024, Vol. 42 Issue 4, p1-27, 27p |
Abstrakt: |
The article presents an invisible black-box backdoor attack against deep cross-modal hashing retrieval, addressing its vulnerability to backdoor attacks and the challenges posed by multi-modal data and hash quantization. Topics include developing a trigger generator to craft imperceptible triggers, designing an injection network for embedding triggers into benign samples, and proposing strategies to mitigate the impact of hash quantization on attack performance. |
Databáze: |
Complementary Index |
Externí odkaz: |
|