April 25, 2022, 1:20 a.m. | Xunguang Wang, Xu Yuan, Zheng Zhang, Guangming Lu, Xiaomeng Li

cs.CR updates on arXiv.org arxiv.org

Deep hashing has been extensively utilized in massive image retrieval because
of its efficiency and effectiveness. Recently, it becomes a hot issue to study
adversarial examples which poses a security challenge to deep hashing models.
However, there is still a critical bottleneck: how to find a superior and exact
semantic representative as the guide to further enhance the adversarial attack
and defense in deep hashing based retrieval. We, for the first time, attempt to
design an effective adversarial learning with …

adversarial hashing

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Cybersecurity Triage Analyst

@ Peraton | Linthicum, MD, United States

Associate DevSecOps Engineer

@ LinQuest | Los Angeles, California, United States

DORA Compliance Program Manager

@ Resillion | Brussels, Belgium

Head of Workplace Risk and Compliance

@ Wise | London, United Kingdom