ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2004.07955
  4. Cited By
Targeted Attack for Deep Hashing based Retrieval

Targeted Attack for Deep Hashing based Retrieval

15 April 2020
Jiawang Bai
Bin Chen
Yiming Li
Dongxian Wu
Weiwei Guo
Shutao Xia
En-Hui Yang
    AAML
ArXivPDFHTML

Papers citing "Targeted Attack for Deep Hashing based Retrieval"

14 / 14 papers shown
Title
Collapse-Aware Triplet Decoupling for Adversarially Robust Image
  Retrieval
Collapse-Aware Triplet Decoupling for Adversarially Robust Image Retrieval
Qiwei Tian
Chenhao Lin
Zhengyu Zhao
Qian Li
Chao Shen
31
2
0
12 Dec 2023
Semantic-Aware Adversarial Training for Reliable Deep Hashing Retrieval
Semantic-Aware Adversarial Training for Reliable Deep Hashing Retrieval
Xu Yuan
Zheng-Wei Zhang
Xunguang Wang
Lin Wu
AAML
37
11
0
23 Oct 2023
A Comprehensive Study on the Robustness of Image Classification and
  Object Detection in Remote Sensing: Surveying and Benchmarking
A Comprehensive Study on the Robustness of Image Classification and Object Detection in Remote Sensing: Surveying and Benchmarking
Shaohui Mei
Jiawei Lian
Xiaofei Wang
Yuru Su
Mingyang Ma
Lap-Pui Chau
AAML
23
11
0
21 Jun 2023
Robust, privacy-preserving, transparent, and auditable on-device
  blocklisting
Robust, privacy-preserving, transparent, and auditable on-device blocklisting
Kurt Thomas
Sarah Meiklejohn
Michael A. Specter
Xiang Wang
Xavier Llorà
Stephan Somogyi
D. Kleidermacher
11
2
0
06 Apr 2023
Backdoor Learning for NLP: Recent Advances, Challenges, and Future
  Research Directions
Backdoor Learning for NLP: Recent Advances, Challenges, and Future Research Directions
Marwan Omar
SILM
AAML
33
20
0
14 Feb 2023
Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset
  Copyright Protection
Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protection
Yiming Li
Yang Bai
Yong Jiang
Yong-Liang Yang
Shutao Xia
Bo Li
AAML
50
98
0
27 Sep 2022
LAS-AT: Adversarial Training with Learnable Attack Strategy
LAS-AT: Adversarial Training with Learnable Attack Strategy
Xiaojun Jia
Yong Zhang
Baoyuan Wu
Ke Ma
Jue Wang
Xiaochun Cao
AAML
47
131
0
13 Mar 2022
Deep Hash Distillation for Image Retrieval
Deep Hash Distillation for Image Retrieval
Young Kyun Jang
Geonmo Gu
ByungSoo Ko
Isaac Kang
N. Cho
21
34
0
16 Dec 2021
Advances in adversarial attacks and defenses in computer vision: A
  survey
Advances in adversarial attacks and defenses in computer vision: A survey
Naveed Akhtar
Ajmal Mian
Navid Kardan
M. Shah
AAML
26
235
0
01 Aug 2021
Improving Query Efficiency of Black-box Adversarial Attack
Improving Query Efficiency of Black-box Adversarial Attack
Yang Bai
Yuyuan Zeng
Yong Jiang
Yisen Wang
Shutao Xia
Weiwei Guo
AAML
MLAU
29
52
0
24 Sep 2020
Backdoor Learning: A Survey
Backdoor Learning: A Survey
Yiming Li
Yong Jiang
Zhifeng Li
Shutao Xia
AAML
45
589
0
17 Jul 2020
Adversarial Camouflage: Hiding Physical-World Attacks with Natural
  Styles
Adversarial Camouflage: Hiding Physical-World Attacks with Natural Styles
Ranjie Duan
Xingjun Ma
Yisen Wang
James Bailey
•. A. K. Qin
Yun Yang
AAML
167
224
0
08 Mar 2020
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
287
5,842
0
08 Jul 2016
Supervised Discrete Hashing
Fumin Shen
Chunhua Shen
Wei Liu
Heng Tao Shen
50
1,102
0
05 Mar 2015
1