BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label.
Shengshan HuZiqi ZhouYechao ZhangLeo Yu ZhangYifeng ZhengYuanyuan HeHai JinPublished in: CoRR (2022)
Keyphrases
- countermeasures
- security threats
- order preserving
- multi label
- malicious users
- image labeling
- hamming distance
- nearest neighbor search
- file organization
- security protocols
- data structure
- hash tables
- denial of service attacks
- malicious attacks
- hash functions
- sat instances
- attack detection
- hashing algorithm
- traffic analysis
- dos attacks
- watermarking technique
- security mechanisms
- digital images
- knn
- high dimensional