Targeted Attack and Defense for Deep Hashing.
Xunguang WangZheng ZhangGuangming LuYong XuPublished in: SIGIR (2021)
Keyphrases
- defense mechanisms
- ddos attacks
- intrusion detection
- file organization
- order preserving
- computer virus
- countermeasures
- hash functions
- data structure
- power analysis
- data sets
- computer viruses
- attack detection
- nearest neighbor search
- database
- detection mechanism
- malicious attacks
- malicious users
- linear hashing
- information systems
- secret key
- network security
- locality sensitive
- target audience
- advanced research projects agency
- data mining
- hamming distance