{"title":"通过秩操纵对医疗保健图像检索的非目标封闭盒攻击","authors":"Wenyun Li;Zheng Zhang;Xiangyuan Lan;Yaowei Wang","doi":"10.1109/TCE.2025.3559103","DOIUrl":null,"url":null,"abstract":"Computer-aided diagnosis always involves a large number of healthcare images, in order to mine such huge medical data, healthcare image retrieval (HIR) attracts a lot of attention from the medical diagnosis research community. However, their security and reliability have yet to be well-studied in the current HIR systems. The closed-box attacks in HIR remain under-explored and challenging, i.e., precisely surrogate stealing without knowing the architecture of the victim model and effective adversarial example generation. In this work, we propose an Untargeted Rank Manipulation Attack (URMA) against deep hashing-based HIR under closed-box scenarios. Specifically, we build a surrogate stealing scheme to explore the correlations between the surrogate model and the original closed box deep hashing model. To enable the attack HIR under the decision-based closed-box setting, we deploy the top-ranking samples returned by the original retrieval models supervising the surrogate model training. Moreover, the designed untargeted embedding generator crafts the high visual quality adversarial example, which lowers the rank of corresponding candidates by adversarial perturbations. When the surrogate model and adversarial generation are adequately trained, the untargeted adversarial attack paradigm is built for deep hashing-based HIR. Extensive experiments validate the efficacy of our URMA with promising attack performance under a closed-box setting on the three public healthcare image datasets. The source code of this paper is available at <uri>https://github.com/li-wenyun/URMA</uri>.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"71 2","pages":"4544-4555"},"PeriodicalIF":10.9000,"publicationDate":"2025-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Untargeted Closed-Box Attack Against Healthcare Image Retrieval via Rank Manipulation\",\"authors\":\"Wenyun Li;Zheng Zhang;Xiangyuan Lan;Yaowei Wang\",\"doi\":\"10.1109/TCE.2025.3559103\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Computer-aided diagnosis always involves a large number of healthcare images, in order to mine such huge medical data, healthcare image retrieval (HIR) attracts a lot of attention from the medical diagnosis research community. However, their security and reliability have yet to be well-studied in the current HIR systems. The closed-box attacks in HIR remain under-explored and challenging, i.e., precisely surrogate stealing without knowing the architecture of the victim model and effective adversarial example generation. In this work, we propose an Untargeted Rank Manipulation Attack (URMA) against deep hashing-based HIR under closed-box scenarios. Specifically, we build a surrogate stealing scheme to explore the correlations between the surrogate model and the original closed box deep hashing model. To enable the attack HIR under the decision-based closed-box setting, we deploy the top-ranking samples returned by the original retrieval models supervising the surrogate model training. Moreover, the designed untargeted embedding generator crafts the high visual quality adversarial example, which lowers the rank of corresponding candidates by adversarial perturbations. When the surrogate model and adversarial generation are adequately trained, the untargeted adversarial attack paradigm is built for deep hashing-based HIR. Extensive experiments validate the efficacy of our URMA with promising attack performance under a closed-box setting on the three public healthcare image datasets. The source code of this paper is available at <uri>https://github.com/li-wenyun/URMA</uri>.\",\"PeriodicalId\":13208,\"journal\":{\"name\":\"IEEE Transactions on Consumer Electronics\",\"volume\":\"71 2\",\"pages\":\"4544-4555\"},\"PeriodicalIF\":10.9000,\"publicationDate\":\"2025-04-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Consumer Electronics\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10960303/\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Consumer Electronics","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10960303/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
Untargeted Closed-Box Attack Against Healthcare Image Retrieval via Rank Manipulation
Computer-aided diagnosis always involves a large number of healthcare images, in order to mine such huge medical data, healthcare image retrieval (HIR) attracts a lot of attention from the medical diagnosis research community. However, their security and reliability have yet to be well-studied in the current HIR systems. The closed-box attacks in HIR remain under-explored and challenging, i.e., precisely surrogate stealing without knowing the architecture of the victim model and effective adversarial example generation. In this work, we propose an Untargeted Rank Manipulation Attack (URMA) against deep hashing-based HIR under closed-box scenarios. Specifically, we build a surrogate stealing scheme to explore the correlations between the surrogate model and the original closed box deep hashing model. To enable the attack HIR under the decision-based closed-box setting, we deploy the top-ranking samples returned by the original retrieval models supervising the surrogate model training. Moreover, the designed untargeted embedding generator crafts the high visual quality adversarial example, which lowers the rank of corresponding candidates by adversarial perturbations. When the surrogate model and adversarial generation are adequately trained, the untargeted adversarial attack paradigm is built for deep hashing-based HIR. Extensive experiments validate the efficacy of our URMA with promising attack performance under a closed-box setting on the three public healthcare image datasets. The source code of this paper is available at https://github.com/li-wenyun/URMA.
期刊介绍:
The main focus for the IEEE Transactions on Consumer Electronics is the engineering and research aspects of the theory, design, construction, manufacture or end use of mass market electronics, systems, software and services for consumers.