{"id":"https://openalex.org/W4406858731","doi":"https://doi.org/10.1109/tifs.2025.3534585","title":"All Points Guided Adversarial Generator for Targeted Attack Against Deep Hashing Retrieval","display_name":"All Points Guided Adversarial Generator for Targeted Attack Against Deep Hashing Retrieval","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4406858731","doi":"https://doi.org/10.1109/tifs.2025.3534585"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3534585","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3534585","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035138193","display_name":"Rongxin Tu","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Rongxin Tu","raw_affiliation_strings":["Guangdong Key Laboratory of Information Security, School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China","School of Computer Science and Engineering, Sun Yat-Sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Key Laboratory of Information Security, School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-Sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077333494","display_name":"Xiangui Kang","orcid":"https://orcid.org/0000-0002-3134-0353"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangui Kang","raw_affiliation_strings":["Guangdong Key Laboratory of Information Security, School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China","School of Computer Science and Engineering, Sun Yat-Sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Key Laboratory of Information Security, School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-Sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079559561","display_name":"Chee Wei Tan","orcid":"https://orcid.org/0000-0002-6624-9752"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Chee Wei Tan","raw_affiliation_strings":["College of Computing and Data Science, Nanyang Technological University, Jurong West, Singapore","College of Computing and Data Science, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"College of Computing and Data Science, Nanyang Technological University, Jurong West, Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"College of Computing and Data Science, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093293797","display_name":"Chi-Hung Chi","orcid":"https://orcid.org/0009-0004-4336-3407"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Chi-Hung Chi","raw_affiliation_strings":["College of Computing and Data Science, Nanyang Technological University, Jurong West, Singapore","College of Computing and Data Science, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"College of Computing and Data Science, Nanyang Technological University, Jurong West, Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"College of Computing and Data Science, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101720092","display_name":"Kwok\u2010Yan Lam","orcid":null},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Kwok-Yan Lam","raw_affiliation_strings":["College of Computing and Data Science, Nanyang Technological University, Jurong West, Singapore","College of Computing and Data Science, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"College of Computing and Data Science, Nanyang Technological University, Jurong West, Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"College of Computing and Data Science, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5035138193"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":1.2181,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.75631976,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"20","issue":null,"first_page":"1695","last_page":"1709"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8400659561157227},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.708702802658081},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6235188245773315},{"id":"https://openalex.org/keywords/generator","display_name":"Generator (circuit theory)","score":0.5578137636184692},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3621947169303894},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35080116987228394},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3331851363182068},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.10385727882385254}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8400659561157227},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.708702802658081},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6235188245773315},{"id":"https://openalex.org/C2780992000","wikidata":"https://www.wikidata.org/wiki/Q17016113","display_name":"Generator (circuit theory)","level":3,"score":0.5578137636184692},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3621947169303894},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35080116987228394},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3331851363182068},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.10385727882385254},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3534585","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3534585","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G101025129","display_name":null,"funder_award_id":"023321-00011","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1303975003","display_name":null,"funder_award_id":"62072484","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6665157100","display_name":null,"funder_award_id":"2514050000889","funder_id":"https://openalex.org/F4320321921","funder_display_name":"Natural Science Foundation of Guangdong Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321921","display_name":"Natural Science Foundation of Guangdong Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":65,"referenced_works":["https://openalex.org/W1861492603","https://openalex.org/W1993305004","https://openalex.org/W2007972815","https://openalex.org/W2038276547","https://openalex.org/W2130660124","https://openalex.org/W2170942078","https://openalex.org/W2194775991","https://openalex.org/W2799245683","https://openalex.org/W2962847335","https://openalex.org/W2963542245","https://openalex.org/W2964280870","https://openalex.org/W2965860096","https://openalex.org/W2994027480","https://openalex.org/W3009756253","https://openalex.org/W3009806461","https://openalex.org/W3017133364","https://openalex.org/W3034205626","https://openalex.org/W3034239448","https://openalex.org/W3098766884","https://openalex.org/W3108980562","https://openalex.org/W3155075829","https://openalex.org/W3156173975","https://openalex.org/W3171288285","https://openalex.org/W3174191188","https://openalex.org/W3175328093","https://openalex.org/W3198892687","https://openalex.org/W3200993057","https://openalex.org/W3205692356","https://openalex.org/W3206937959","https://openalex.org/W3215404543","https://openalex.org/W4292448859","https://openalex.org/W4293846201","https://openalex.org/W4313153605","https://openalex.org/W4313591709","https://openalex.org/W4321021417","https://openalex.org/W4323022360","https://openalex.org/W4323059284","https://openalex.org/W4367047323","https://openalex.org/W4379382581","https://openalex.org/W4380433178","https://openalex.org/W4382407431","https://openalex.org/W4383752469","https://openalex.org/W4384648175","https://openalex.org/W4385153810","https://openalex.org/W4386076017","https://openalex.org/W4387808640","https://openalex.org/W4388623432","https://openalex.org/W4392910498","https://openalex.org/W4393159260","https://openalex.org/W4393159928","https://openalex.org/W4396712913","https://openalex.org/W4396982245","https://openalex.org/W4399374383","https://openalex.org/W4399423396","https://openalex.org/W4400489826","https://openalex.org/W4400771068","https://openalex.org/W4401326084","https://openalex.org/W4403941856","https://openalex.org/W6637162671","https://openalex.org/W6637373629","https://openalex.org/W6640425456","https://openalex.org/W6688152296","https://openalex.org/W6729756640","https://openalex.org/W6850939649","https://openalex.org/W6875514708"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4310988119","https://openalex.org/W4285226279","https://openalex.org/W4288019534"],"abstract_inverted_index":{"Deep":[0],"hashing":[1,12,24,119],"has":[2],"been":[3],"widely":[4],"used":[5],"in":[6,60,89,96,140,155,234,247,263],"image":[7,190],"retrieval":[8],"tasks,":[9],"while":[10],"deep":[11,23],"networks":[13],"are":[14,114],"vulnerable":[15],"to":[16,30,57,93,159,175,203,209],"adversarial":[17,32,62,71,164,211],"example":[18,212],"attacks.":[19,39],"To":[20],"improve":[21],"the":[22,35,41,47,68,75,83,90,101,106,110,133,156,161,172,177,184,188,221,224,235,243,258],"networks\u2019":[25],"robustness,":[26],"it":[27],"is":[28,271],"essential":[29],"investigate":[31],"attacks":[33,44],"on":[34],"networks,":[36],"especially":[37],"targeted":[38,43,49,146,260,264],"Among":[40],"existing":[42],"for":[45],"hashing,":[46],"generation-based":[48],"attack":[50,102,147,165,261,265],"methods":[51,66,262],"have":[52],"attracted":[53],"increasing":[54],"attention":[55],"due":[56],"their":[58,129],"efficiency":[59],"generating":[61],"examples.":[63],"However,":[64],"these":[65,121,248],"supervise":[67],"generation":[69,162],"of":[70,78,86,109,128,135,163,242],"examples":[72,166],"solely":[73],"with":[74,187],"hash":[76,84,107,122,153,227,232,249],"codes":[77,85,108,123,154,233],"positive":[79],"samples,":[80,131],"without":[81],"employing":[82],"all":[87,151,230],"points":[88],"training":[91,111,157,236],"set":[92,112,158],"directly":[94],"participate":[95],"supervisory":[97],"training,":[98],"thereby":[99,238],"making":[100,239],"less":[103],"effective.":[104],"Since":[105],"samples":[113],"generated":[115],"by":[116],"a":[117,145,200,205,216],"well-trained":[118],"model,":[120],"retain":[124],"rich":[125,244],"semantic":[126,245],"information":[127,246],"corresponding":[130,178],"highlighting":[132],"necessity":[134],"sufficiently":[136],"utilizing":[137],"them.":[138],"Therefore,":[139],"this":[141],"paper,":[142],"we":[143,169,182,214],"propose":[144],"method":[148,256],"that":[149,198,219,254],"utilizes":[150],"points\u2019":[152,231],"guide":[160,210],"directly.":[167],"Specifically,":[168],"first":[170],"decode":[171],"target":[173],"label":[174],"obtain":[176,204],"feature":[179,185],"map.":[180],"Then,":[181],"concatenate":[183],"map":[186],"query":[189],"and":[191,229,267],"feed":[192],"them":[193],"into":[194],"an":[195],"encoder-decoder":[196],"network":[197],"employs":[199],"skip-connection":[201],"strategy":[202],"perturbed":[206,225],"example.":[207],"Furthermore,":[208],"generation,":[213],"introduce":[215],"loss":[217],"function":[218],"exploits":[220],"similarities":[222],"between":[223],"example\u2019s":[226],"code":[228,270],"set,":[237],"sufficient":[240],"utilization":[241],"codes.":[250],"Experimental":[251],"results":[252],"illustrate":[253],"our":[255],"outperforms":[257],"state-of-the-art":[259],"effectiveness":[266],"transferability.":[268],"The":[269],"available":[272],"at":[273],"<uri":[274],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[275],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">https://github.com/rongxintu3/APGA</uri>.":[276]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
