Login / Signup
Exploring Targeted Universal Adversarial Attack for Deep Hashing.
Fei Zhu
Wanqian Zhang
Dayan Wu
Lin Wang
Bo Li
Weiping Wang
Published in:
ICASSP (2024)
Keyphrases
</>
file organization
hash functions
countermeasures
random projections
multi agent
nearest neighbor search
databases
neural network
hamming distance
secret key
hash table
order preserving
abstract argumentation
locality sensitive
data corruption
key exchange protocol