ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2004.07955
  4. Cited By
Targeted Attack for Deep Hashing based Retrieval
v1v2v3 (latest)

Targeted Attack for Deep Hashing based Retrieval

European Conference on Computer Vision (ECCV), 2020
15 April 2020
Jiawang Bai
Bin Chen
Yiming Li
Dongxian Wu
Weiwei Guo
Shutao Xia
En-Hui Yang
    AAML
ArXiv (abs)PDFHTML

Papers citing "Targeted Attack for Deep Hashing based Retrieval"

41 / 41 papers shown
DiffHash: Text-Guided Targeted Attack via Diffusion Models against Deep Hashing Image Retrieval
DiffHash: Text-Guided Targeted Attack via Diffusion Models against Deep Hashing Image Retrieval
Zechao Liu
Zheng Zhou
Xiangkun Chen
Tao Liang
Dapeng Lang
DiffMAAML
232
0
0
16 Sep 2025
Clean Image May be Dangerous: Data Poisoning Attacks Against Deep Hashing
Clean Image May be Dangerous: Data Poisoning Attacks Against Deep Hashing
Shuai Li
Jie Zhang
Yuang Qi
Kejiang Chen
Tianwei Zhang
Weinan Zhang
Nenghai Yu
222
1
0
27 Mar 2025
Protecting Your Video Content: Disrupting Automated Video-based LLM Annotations
Protecting Your Video Content: Disrupting Automated Video-based LLM AnnotationsComputer Vision and Pattern Recognition (CVPR), 2025
Haitong Liu
Kuofeng Gao
Yang Bai
Jinmin Li
Jinxiao Shan
Tao Dai
Shu-Tao Xia
AAML
363
5
0
26 Mar 2025
DAT: Improving Adversarial Robustness via Generative Amplitude Mix-up in
  Frequency Domain
DAT: Improving Adversarial Robustness via Generative Amplitude Mix-up in Frequency DomainNeural Information Processing Systems (NeurIPS), 2024
Fengpeng Li
Kemou Li
Haiwei Wu
Jinyu Tian
Jiantao Zhou
AAML
318
11
0
16 Oct 2024
Demonstration Attack against In-Context Learning for Code Intelligence
Demonstration Attack against In-Context Learning for Code Intelligence
Yifei Ge
Weisong Sun
Yihang Lou
Chunrong Fang
Yiran Zhang
Yiming Li
Xiaofang Zhang
Yang Liu
Zhihong Zhao
Zhenyu Chen
AAML
174
3
0
03 Oct 2024
Adversarial Robustness for Visual Grounding of Multimodal Large Language
  Models
Adversarial Robustness for Visual Grounding of Multimodal Large Language Models
Kuofeng Gao
Yang Bai
Jiawang Bai
Yong Yang
Shu-Tao Xia
AAML
303
29
0
16 May 2024
Inducing High Energy-Latency of Large Vision-Language Models with
  Verbose Images
Inducing High Energy-Latency of Large Vision-Language Models with Verbose ImagesInternational Conference on Learning Representations (ICLR), 2024
Kuofeng Gao
Yang Bai
Jindong Gu
Shu-Tao Xia
Juil Sock
Zhifeng Li
Wei Liu
VLM
290
77
0
20 Jan 2024
Collapse-Aware Triplet Decoupling for Adversarially Robust Image
  Retrieval
Collapse-Aware Triplet Decoupling for Adversarially Robust Image RetrievalInternational Conference on Machine Learning (ICML), 2023
Qiwei Tian
Chenhao Lin
Subrat Kishore Dutta
Qian Li
Chao Shen
381
3
0
12 Dec 2023
GSE: Group-wise Sparse and Explainable Adversarial Attacks
GSE: Group-wise Sparse and Explainable Adversarial AttacksInternational Conference on Learning Representations (ICLR), 2023
Shpresim Sadiku
Moritz Wagner
Sebastian Pokutta
AAML
439
5
0
29 Nov 2023
Semantic-Aware Adversarial Training for Reliable Deep Hashing Retrieval
Semantic-Aware Adversarial Training for Reliable Deep Hashing RetrievalIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2023
Xu Yuan
Zheng Zhang
Xunguang Wang
Lin Wu
AAML
358
25
0
23 Oct 2023
One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training
One-bit Flip is All You Need: When Bit-flip Attack Meets Model TrainingIEEE International Conference on Computer Vision (ICCV), 2023
Jianshuo Dong
Han Qiu
Yiming Li
Tianwei Zhang
Yuan-Fang Li
Zeqi Lai
Chao Zhang
Shutao Xia
AAML
166
31
0
12 Aug 2023
A Comprehensive Study on the Robustness of Image Classification and
  Object Detection in Remote Sensing: Surveying and Benchmarking
A Comprehensive Study on the Robustness of Image Classification and Object Detection in Remote Sensing: Surveying and BenchmarkingJournal of remote sensing (JRS), 2023
Shaohui Mei
Jiawei Lian
Xiaofei Wang
Yuru Su
Mingyang Ma
Lap-Pui Chau
AAML
407
15
0
21 Jun 2023
Unsupervised Multi-Criteria Adversarial Detection in Deep Image
  Retrieval
Unsupervised Multi-Criteria Adversarial Detection in Deep Image RetrievalSecurity and Privacy in Communication Networks (SecureComm), 2023
Yanru Xiao
Cong Wang
Xing Gao
AAML
303
0
0
09 Apr 2023
Robust, privacy-preserving, transparent, and auditable on-device
  blocklisting
Robust, privacy-preserving, transparent, and auditable on-device blocklisting
Kurt Thomas
Sarah Meiklejohn
Michael A. Specter
Xiang Wang
Xavier Llorà
Stephan Somogyi
D. Kleidermacher
276
2
0
06 Apr 2023
Backdoor Defense via Adaptively Splitting Poisoned Dataset
Backdoor Defense via Adaptively Splitting Poisoned DatasetComputer Vision and Pattern Recognition (CVPR), 2023
Kuofeng Gao
Yang Bai
Jindong Gu
Yong-Liang Yang
Shutao Xia
AAML
267
79
0
23 Mar 2023
Reliable and Efficient Evaluation of Adversarial Robustness for Deep
  Hashing-Based Retrieval
Reliable and Efficient Evaluation of Adversarial Robustness for Deep Hashing-Based Retrieval
Xunguang Wang
Jiawang Bai
Xin-Chao Xu
Xuelong Li
AAML
279
1
0
22 Mar 2023
Backdoor Learning for NLP: Recent Advances, Challenges, and Future
  Research Directions
Backdoor Learning for NLP: Recent Advances, Challenges, and Future Research Directions
Marwan Omar
SILMAAML
254
21
0
14 Feb 2023
Untargeted Backdoor Attack against Object Detection
Untargeted Backdoor Attack against Object DetectionIEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2022
C. Luo
Yiming Li
Yong Jiang
Shutao Xia
AAML
311
48
0
02 Nov 2022
Backdoor Defense via Suppressing Model Shortcuts
Backdoor Defense via Suppressing Model ShortcutsIEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2022
Shengyuan Yang
Yiming Li
Yong Jiang
Shutao Xia
AAML
315
14
0
02 Nov 2022
Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset
  Copyright Protection
Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright ProtectionNeural Information Processing Systems (NeurIPS), 2022
Yiming Li
Yang Bai
Yong Jiang
Yong-Liang Yang
Shutao Xia
Bo Li
AAML
566
147
0
27 Sep 2022
A Large-scale Multiple-objective Method for Black-box Attack against
  Object Detection
A Large-scale Multiple-objective Method for Black-box Attack against Object DetectionEuropean Conference on Computer Vision (ECCV), 2022
Yaning Tan
Longkang Li
Yanbo Fan
Yang Liu
Jingzhi Li
Baoyuan Wu
Xiaochun Cao
AAML
247
58
0
16 Sep 2022
Hardly Perceptible Trojan Attack against Neural Networks with Bit Flips
Hardly Perceptible Trojan Attack against Neural Networks with Bit FlipsEuropean Conference on Computer Vision (ECCV), 2022
Jiawang Bai
Kuofeng Gao
Dihong Gong
Shutao Xia
Zhifeng Li
Wen Liu
AAML
211
40
0
27 Jul 2022
Versatile Weight Attack via Flipping Limited Bits
Versatile Weight Attack via Flipping Limited BitsIEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2022
Jiawang Bai
Baoyuan Wu
Zhifeng Li
Shutao Xia
AAML
269
26
0
25 Jul 2022
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean
  Label
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean LabelACM Multimedia (ACM MM), 2022
Shengshan Hu
Ziqi Zhou
Yechao Zhang
L. Zhang
Yifeng Zheng
Yuanyuan HE
Hai Jin
AAML
535
55
0
01 Jul 2022
Disappeared Command: Spoofing Attack On Automatic Speech Recognition
  Systems with Sound Masking
Disappeared Command: Spoofing Attack On Automatic Speech Recognition Systems with Sound Masking
Jinghui Xu
Jifeng Zhu
Yong-Liang Yang
276
1
0
19 Apr 2022
CgAT: Center-Guided Adversarial Training for Deep Hashing-Based
  Retrieval
CgAT: Center-Guided Adversarial Training for Deep Hashing-Based RetrievalThe Web Conference (WWW), 2022
Xunguang Wang
Yinqun Lin
Xuelong Li
AAMLGAN
421
10
0
18 Apr 2022
LAS-AT: Adversarial Training with Learnable Attack Strategy
LAS-AT: Adversarial Training with Learnable Attack StrategyComputer Vision and Pattern Recognition (CVPR), 2022
Yang Liu
Yong Zhang
Baoyuan Wu
Ke Ma
Jue Wang
Xiaochun Cao
AAML
227
179
0
13 Mar 2022
ARIA: Adversarially Robust Image Attribution for Content Provenance
ARIA: Adversarially Robust Image Attribution for Content Provenance
Maksym Andriushchenko
Xiaochen Li
Geoffrey Oxholm
Thomas Gittings
Tu Bui
Nicolas Flammarion
John Collomosse
AAML
238
4
0
25 Feb 2022
Deep Hash Distillation for Image Retrieval
Deep Hash Distillation for Image Retrieval
Young Kyun Jang
Geonmo Gu
ByungSoo Ko
Isaac Kang
N. Cho
335
48
0
16 Dec 2021
Learning to Break Deep Perceptual Hashing: The Use Case NeuralHash
Learning to Break Deep Perceptual Hashing: The Use Case NeuralHashConference on Fairness, Accountability and Transparency (FAccT), 2021
Lukas Struppek
Dominik Hintersdorf
Daniel Neider
Kristian Kersting
MIACV
579
59
0
12 Nov 2021
Backdoor Attack on Hash-based Image Retrieval via Clean-label Data
  Poisoning
Backdoor Attack on Hash-based Image Retrieval via Clean-label Data Poisoning
Kuofeng Gao
Jiawang Bai
Bin Chen
Dongxian Wu
Shutao Xia
AAML
331
14
0
18 Sep 2021
Advances in adversarial attacks and defenses in computer vision: A
  survey
Advances in adversarial attacks and defenses in computer vision: A survey
Naveed Akhtar
Lin Wang
Navid Kardan
M. Shah
AAML
543
313
0
01 Aug 2021
Anomaly Detection of Adversarial Examples using Class-conditional
  Generative Adversarial Networks
Anomaly Detection of Adversarial Examples using Class-conditional Generative Adversarial NetworksComputers & security (CS), 2021
Hang Wang
David J. Miller
G. Kesidis
GANAAML
308
20
0
21 May 2021
Prototype-supervised Adversarial Network for Targeted Attack of Deep
  Hashing
Prototype-supervised Adversarial Network for Targeted Attack of Deep HashingComputer Vision and Pattern Recognition (CVPR), 2021
Xunguang Wang
Zheng Zhang
Baoyuan Wu
Fumin Shen
Guangming Lu
AAMLGAN
296
53
0
17 May 2021
Targeted Attack against Deep Neural Networks via Flipping Limited Weight
  Bits
Targeted Attack against Deep Neural Networks via Flipping Limited Weight BitsInternational Conference on Learning Representations (ICLR), 2021
Jiawang Bai
Baoyuan Wu
Yong Zhang
Yiming Li
Zhifeng Li
Shutao Xia
AAML
252
88
0
21 Feb 2021
Adversarial collision attacks on image hashing functions
Adversarial collision attacks on image hashing functions
Brian Dolhansky
Cristian Canton Ferrer
AAML
345
22
0
18 Nov 2020
ResNet or DenseNet? Introducing Dense Shortcuts to ResNet
ResNet or DenseNet? Introducing Dense Shortcuts to ResNetIEEE Workshop/Winter Conference on Applications of Computer Vision (WACV), 2020
Chaoning Zhang
Philipp Benz
Dawit Mureja Argaw
Seokju Lee
Junsik Kim
François Rameau
Jean-Charles Bazin
In So Kweon
229
142
0
23 Oct 2020
Revisiting Batch Normalization for Improving Corruption Robustness
Revisiting Batch Normalization for Improving Corruption Robustness
Philipp Benz
Chaoning Zhang
Adil Karjauv
In So Kweon
623
92
0
07 Oct 2020
Improving Query Efficiency of Black-box Adversarial Attack
Improving Query Efficiency of Black-box Adversarial AttackEuropean Conference on Computer Vision (ECCV), 2020
Yang Bai
Yuyuan Zeng
Yong Jiang
Yisen Wang
Shutao Xia
Weiwei Guo
AAMLMLAU
299
59
0
24 Sep 2020
Backdoor Learning: A Survey
Backdoor Learning: A SurveyIEEE Transactions on Neural Networks and Learning Systems (IEEE TNNLS), 2020
Yiming Li
Yong Jiang
Zhifeng Li
Shutao Xia
AAML
733
784
0
17 Jul 2020
A Multi-modal Neural Embeddings Approach for Detecting Mobile
  Counterfeit Apps: A Case Study on Google Play Store
A Multi-modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps: A Case Study on Google Play StoreIEEE Transactions on Mobile Computing (IEEE TMC), 2020
Naveen Karunanayake
Jathushan Rajasegaran
Ashanie Gunathillake
Suranga Seneviratne
Guillaume Jourjon
293
18
0
02 Jun 2020
1
Page 1 of 1