Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Targeted attack method for deep hash retrieval and terminal equipment

A hash and depth technology, applied in the field of targeted attack methods and terminal equipment, can solve the problems of lack of targeted attack methods, unfavorable retrieval system robustness and security, etc., achieve good targeted attack effects, and optimize anti-noise. , the effect of improving security and robustness

Pending Publication Date: 2020-12-22
PENG CHENG LAB +1
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to provide a targeted attack method and terminal equipment for deep hash retrieval in view of the deficiencies of the prior art, aiming at solving the lack of a targeted attack method for deep hash retrieval in the prior art , which is not conducive to the research on the robustness and security of the retrieval system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Targeted attack method for deep hash retrieval and terminal equipment
  • Targeted attack method for deep hash retrieval and terminal equipment
  • Targeted attack method for deep hash retrieval and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention provides a targeted attack method, storage medium and terminal equipment for deep hash retrieval. In order to make the purpose, technical solution and effect of the present invention clearer and clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples . It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0033] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a targeted attack method for deep hash retrieval and terminal equipment, and the method comprises the steps: providing a sample set with a label t, inputting all samples in thesample set into a deep hash retrieval model, and generating a corresponding hash code; obtaining a representative hash code ha by adopting a bit voting algorithm; specifying the size of the hyper-parameter alpha to be 0-1, and designing a loss function; calculating the gradient of x' by using a gradient descent method and updating x' by using the gradient; projecting the generated adversarial sample x' to enable the x' to meet infinite constraints and image space; judging whether a preset updating frequency is reached or not, and if so, obtaining an adversarial sample x'; and inputting the adversarial sample x' into the deep hash retrieval model, and returning a sample of an expected category. When the deep hash retrieval model is designed, the attack method is adopted, the safety and robustness of the model can be improved, and the generated adversarial sample can enable the retrieval model to return to a category sample expected by an attacker.

Description

technical field [0001] The invention relates to the technical field of hash retrieval, in particular to a targeted attack method and terminal equipment for deep hash retrieval. Background technique [0002] Large-scale data approximate nearest neighbor retrieval has the characteristics of high efficiency and high performance, and is used in many search engines to retrieve images or videos, such as Google and Bing. Among these approximate nearest neighbor search methods, hash-based retrieval has received more attention, which can map data to a compact binary space, thereby using Hamming distance to measure similarity and improve computational efficiency. [0003] The hash retrieval method based on deep learning can achieve the best performance in the current hash retrieval. However, many studies have shown that the deep learning model is vulnerable to adversarial attacks, which affects the performance of the deep learning model. According to different attack purposes, advers...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F16/903G06F21/62
CPCG06F16/90335G06F21/6227
Inventor 夏树涛白家旺陈斌戴涛李清齐竹云
Owner PENG CHENG LAB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products