Skip to content

tswang0116/IB3A

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

IB3A

Source code for the paper "Invisible Black-Box Backdoor Attack against Deep Cross-Modal Hashing Retrieval".

Requirements

  • python == 3.7.10
  • pytorch == 1.4.0
  • torchvision == 0.2.1
  • numpy == 1.19.2
  • h5py == 3.4.0
  • scipy == 1.7.1

Datasets

We use three cross-modal datasets for experiments. Since MS-COCO do not have common text features, we use the pre-trained BERT model to extract 1024-dimension text features. All datasets are available by the following link:

Knockoffs

We provide an knockoff of 32-bit DCMH on the FLICKR-25K dataset. The knockoff can be obtained by the following link:

Victim models

We carry out backdoor attack for three cross-modal hashing methods, including DCMH, CPAH, DADH. All attacked hashing models can be obtained by the following link:

Citation

Coming soon...

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages