Dual-branch autoencoder network for attacking deep hashing image retrieval models
Due to its powerful representation learning capabilities and efficient computing capabilities, deep learning-based hashing (deep hashing) methods are widely used in large-scale image retrieval.However, there are less studies on the security of deep hashing models.A dual-branch autoencoder network (D...
Saved in:
Main Authors: | Sizheng FU, Chunjie CAO, Zhiyuan LIU, Fangjian TAO, Jingzhang SUN |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2023-11-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2023246/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Trojan message attack on the concatenated hash functions
by: Shi-Wei CHEN, et al.
Published: (2016-08-01) -
Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding
by: Gao-li WANG, et al.
Published: (2014-02-01) -
Preimage and pseudo collision attacks on round-reduced DHA-256 hash function
by: Jian ZOU, et al.
Published: (2013-06-01) -
Improved preimage and pseudo-collision attacks on SM3 hash function
by: Jian ZOU, et al.
Published: (2018-01-01) -
Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
by: Junling Pei, et al.
Published: (2023-05-01)