ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2011.09473
  4. Cited By
Adversarial collision attacks on image hashing functions

Adversarial collision attacks on image hashing functions

18 November 2020
Brian Dolhansky
Cristian Canton Ferrer
    AAML
ArXiv (abs)PDFHTML

Papers citing "Adversarial collision attacks on image hashing functions"

12 / 12 papers shown
Title
Perceptual Hash Inversion Attacks on Image-Based Sexual Abuse Removal
  Tools
Perceptual Hash Inversion Attacks on Image-Based Sexual Abuse Removal Tools
Sophie Hawkes
Christian Weinert
Teresa Almeida
M. Mehrnezhad
138
0
0
08 Dec 2024
Deep perceptual hashing algorithms with hidden dual purpose: when
  client-side scanning does facial recognition
Deep perceptual hashing algorithms with hidden dual purpose: when client-side scanning does facial recognition
Shubham Jain
Ana-Maria Cretu
Antoine Cully
Yves-Alexandre de Montjoye
102
8
0
20 Jun 2023
Robust, privacy-preserving, transparent, and auditable on-device
  blocklisting
Robust, privacy-preserving, transparent, and auditable on-device blocklisting
Kurt Thomas
Sarah Meiklejohn
Michael A. Specter
Xiang Wang
Xavier Llorà
Stephan Somogyi
D. Kleidermacher
100
2
0
06 Apr 2023
SoK: Content Moderation for End-to-End Encryption
SoK: Content Moderation for End-to-End Encryption
Sarah Scheffler
Jonathan R. Mayer
132
28
0
07 Mar 2023
Hamming Distributions of Popular Perceptual Hashing Techniques
Hamming Distributions of Popular Perceptual Hashing Techniques
Sean McKeown
William J. Buchanan
40
13
0
15 Dec 2022
Re-purposing Perceptual Hashing based Client Side Scanning for Physical
  Surveillance
Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance
Ashish Hooda
Andrey Labunets
Tadayoshi Kohno
Earlence Fernandes
90
2
0
08 Dec 2022
Active Image Indexing
Active Image Indexing
Pierre Fernandez
Matthijs Douze
Edouard Grave
Teddy Furon
VLM
94
10
0
05 Oct 2022
ARIA: Adversarially Robust Image Attribution for Content Provenance
ARIA: Adversarially Robust Image Attribution for Content Provenance
Maksym Andriushchenko
Xiaochen Li
Geoffrey Oxholm
Thomas Gittings
Tu Bui
Nicolas Flammarion
John Collomosse
AAML
85
4
0
25 Feb 2022
Do You See What I See? Capabilities and Limits of Automated Multimedia
  Content Analysis
Do You See What I See? Capabilities and Limits of Automated Multimedia Content Analysis
Carey Shenkman
Dhanaraj Thakur
Emma Llansó
66
8
0
15 Dec 2021
Learning to Break Deep Perceptual Hashing: The Use Case NeuralHash
Learning to Break Deep Perceptual Hashing: The Use Case NeuralHash
Lukas Struppek
Dominik Hintersdorf
Daniel Neider
Kristian Kersting
MIACV
229
53
0
12 Nov 2021
Adversarial Detection Avoidance Attacks: Evaluating the robustness of
  perceptual hashing-based client-side scanning
Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning
Shubham Jain
Ana-Maria Cretu
Yves-Alexandre de Montjoye
97
37
0
17 Jun 2021
Billion-scale similarity search with GPUs
Billion-scale similarity search with GPUs
Jeff Johnson
Matthijs Douze
Edouard Grave
661
4,052
0
28 Feb 2017
1