ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2004.04199
  4. Cited By
Transferable, Controllable, and Inconspicuous Adversarial Attacks on
  Person Re-identification With Deep Mis-Ranking

Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-identification With Deep Mis-Ranking

8 April 2020
Hongjun Wang
Guangrun Wang
Ya Li
Dongyu Zhang
Liang Lin
    AAML
ArXivPDFHTML

Papers citing "Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-identification With Deep Mis-Ranking"

16 / 16 papers shown
Title
Learning to Learn Transferable Generative Attack for Person Re-Identification
Learning to Learn Transferable Generative Attack for Person Re-Identification
Yuan Bian
Min Liu
Xueping Wang
Yunfeng Ma
Yaonan Wang
AAML
OOD
65
1
0
06 Sep 2024
Collapse-Aware Triplet Decoupling for Adversarially Robust Image
  Retrieval
Collapse-Aware Triplet Decoupling for Adversarially Robust Image Retrieval
Qiwei Tian
Chenhao Lin
Zhengyu Zhao
Qian Li
Chao Shen
34
2
0
12 Dec 2023
Robust Ranking Explanations
Robust Ranking Explanations
Chao Chen
Chenghua Guo
Guixiang Ma
Ming Zeng
Xi Zhang
Sihong Xie
FAtt
AAML
35
0
0
08 Jul 2023
Generalist: Decoupling Natural and Robust Generalization
Generalist: Decoupling Natural and Robust Generalization
Hongjun Wang
Yisen Wang
OOD
AAML
49
14
0
24 Mar 2023
Meta Generative Attack on Person Reidentification
Meta Generative Attack on Person Reidentification
M. I. A V Subramanyam
AAML
28
8
0
16 Jan 2023
Synthetic Data in Human Analysis: A Survey
Synthetic Data in Human Analysis: A Survey
Indu Joshi
Marcel Grimmer
Christian Rathgeb
Christoph Busch
F. Brémond
A. Dantcheva
35
46
0
19 Aug 2022
InvisibiliTee: Angle-agnostic Cloaking from Person-Tracking Systems with
  a Tee
InvisibiliTee: Angle-agnostic Cloaking from Person-Tracking Systems with a Tee
Yaxian Li
Bingqing Zhang
Guoping Zhao
Mingyu Zhang
Jiajun Liu
Ziwei Wang
Jirong Wen
22
1
0
15 Aug 2022
Exact Feature Collisions in Neural Networks
Exact Feature Collisions in Neural Networks
Utku Ozbulak
Manvel Gasparyan
Shodhan Rao
W. D. Neve
Arnout Van Messem
AAML
24
1
0
31 May 2022
Self-Ensemble Adversarial Training for Improved Robustness
Self-Ensemble Adversarial Training for Improved Robustness
Hongjun Wang
Yisen Wang
OOD
AAML
13
48
0
18 Mar 2022
Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity
Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity
Cheng Luo
Qinliang Lin
Weicheng Xie
Bizhu Wu
Jinheng Xie
Linlin Shen
AAML
36
101
0
10 Mar 2022
Advances in adversarial attacks and defenses in computer vision: A
  survey
Advances in adversarial attacks and defenses in computer vision: A survey
Naveed Akhtar
Ajmal Mian
Navid Kardan
M. Shah
AAML
26
235
0
01 Aug 2021
Discriminator-Free Generative Adversarial Attack
Discriminator-Free Generative Adversarial Attack
Shaohao Lu
Yuqiao Xian
Ke Yan
Yi Hu
Xing Sun
Xiaowei Guo
Feiyue Huang
Weishi Zheng
AAML
GAN
35
20
0
20 Jul 2021
QAIR: Practical Query-efficient Black-Box Attacks for Image Retrieval
QAIR: Practical Query-efficient Black-Box Attacks for Image Retrieval
Xiaodan Li
Jinfeng Li
YueFeng Chen
Shaokai Ye
Yuan He
Shuhui Wang
Hang Su
Hui Xue
19
44
0
04 Mar 2021
Developing Future Human-Centered Smart Cities: Critical Analysis of
  Smart City Security, Interpretability, and Ethical Challenges
Developing Future Human-Centered Smart Cities: Critical Analysis of Smart City Security, Interpretability, and Ethical Challenges
Kashif Ahmad
Majdi Maabreh
M. Ghaly
Khalil Khan
Junaid Qadir
Ala I. Al-Fuqaha
27
142
0
14 Dec 2020
A Hamiltonian Monte Carlo Method for Probabilistic Adversarial Attack
  and Learning
A Hamiltonian Monte Carlo Method for Probabilistic Adversarial Attack and Learning
Hongjun Wang
Guanbin Li
Xiaobai Liu
Liang Lin
GAN
AAML
16
22
0
15 Oct 2020
Towards Visual Distortion in Black-Box Attacks
Towards Visual Distortion in Black-Box Attacks
Nannan Li
Zhenzhong Chen
25
12
0
21 Jul 2020
1