# IB3A **Repository Path**: LeeWlving/IB3A ## Basic Information - **Project Name**: IB3A - **Description**: No description available - **Primary Language**: Unknown - **License**: AFL-3.0 - **Default Branch**: main - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2024-03-14 - **Last Updated**: 2024-03-14 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # IB3A Source code for the paper "Invisible Black-Box Backdoor Attack against Deep Cross-Modal Hashing Retrieval". ## Requirements * python == 3.7.10 * pytorch == 1.4.0 * torchvision == 0.2.1 * numpy == 1.19.2 * h5py == 3.4.0 * scipy == 1.7.1 ## Datasets We use three cross-modal datasets for experiments. Since MS-COCO do not have common text features, we use the pre-trained BERT model to extract 1024-dimension text features. All datasets are available by the following link: * FLICKR-25K: https://pan.baidu.com/s/1Ie9PDqC9mAmBdxqX0KJ0ng
Password: yjkd * MS-COCO: https://pan.baidu.com/s/1ocZTVx1GFFdceoSYbIWkbQ
Password: 2a6l * NUS-WIDE: https://pan.baidu.com/s/1Yvqt4Bdjsq1gPaJn2IqIEw
Password: doi1 ## Knockoffs We provide an knockoff of 32-bit DCMH on the FLICKR-25K dataset. The knockoff can be obtained by the following link: * The Trained 32-bit DCMH on FLICKR-25K: https://pan.baidu.com/s/1JcQd_SepWVz-Js4X8yqjPQ
Password: b6sd ## Victim models We carry out backdoor attack for three cross-modal hashing methods, including DCMH, CPAH, DADH. All attacked hashing models can be obtained by the following link: * Deep Cross-Modal Hashing (DCMH): https://github.com/WendellGul/DCMH * Consistency-Preserving Adversarial Hashing (CPAH): https://github.com/comrados/cpah * Deep Adversarial Discrete Hashing (DADH): https://github.com/Zjut-MultimediaPlus/DADH ## Citation Coming soon...