BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label.
Shengshan HuZiqi ZhouYechao ZhangLeo Yu ZhangYifeng ZhengYuanyuan HeHai JinPublished in: ACM Multimedia (2022)
Keyphrases
- countermeasures
- malicious attacks
- hash functions
- multi label
- watermarking scheme
- image labeling
- chosen plaintext
- security threats
- deep learning
- file organization
- order preserving
- data structure
- locality sensitive hashing
- security protocols
- watermarking technique
- traffic analysis
- class labels
- security risks
- text categorization
- digital images
- linear hashing
- hashing algorithm
- nearest neighbor
- hamming distance
- denial of service attacks
- video copy detection