ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2101.08783
  4. Cited By
A Person Re-identification Data Augmentation Method with Adversarial
  Defense Effect
v1v2v3 (latest)

A Person Re-identification Data Augmentation Method with Adversarial Defense Effect

21 January 2021
Yunpeng Gong
Zhiyong Zeng
Liwen Chen
Yi-Xiao Luo
Bin Weng
Feng Ye
    AAML
ArXiv (abs)PDFHTMLGithub (20★)

Papers citing "A Person Re-identification Data Augmentation Method with Adversarial Defense Effect"

31 / 31 papers shown
Title
Transferable, Controllable, and Inconspicuous Adversarial Attacks on
  Person Re-identification With Deep Mis-Ranking
Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-identification With Deep Mis-Ranking
Hongjun Wang
Guangrun Wang
Ya Li
Dongyu Zhang
Liang Lin
AAML
52
84
0
08 Apr 2020
Circle Loss: A Unified Perspective of Pair Similarity Optimization
Circle Loss: A Unified Perspective of Pair Similarity Optimization
Yifan Sun
Changmao Cheng
Yuhan Zhang
Chi Zhang
Liang Zheng
Zhongdao Wang
Yichen Wei
93
859
0
25 Feb 2020
AANet: Attribute Attention Network for Person Re-Identifications
AANet: Attribute Attention Network for Person Re-Identifications
Chiat-Pin Tay
Sharmili Roy
Kim-Hui Yap
3DPC
107
306
0
19 Dec 2019
Second-order Non-local Attention Networks for Person Re-identification
Second-order Non-local Attention Networks for Person Re-identification
Bryan (Ning) Xia
Xia
Yuan Gong
Yizhe Zhang
C. Poellabauer
3DPC
70
182
0
31 Aug 2019
Interaction-and-Aggregation Network for Person Re-identification
Interaction-and-Aggregation Network for Person Re-identification
Rui Hou
Bingpeng Ma
Hong Chang
Xinqian Gu
Shiguang Shan
Xilin Chen
3DPC
119
341
0
19 Jul 2019
Omni-Scale Feature Learning for Person Re-Identification
Omni-Scale Feature Learning for Person Re-Identification
Kaiyang Zhou
Yongxin Yang
Andrea Cavallaro
Tao Xiang
85
832
0
02 May 2019
Joint Discriminative and Generative Learning for Person
  Re-identification
Joint Discriminative and Generative Learning for Person Re-identification
Zhedong Zheng
Xiaodong Yang
Zhiding Yu
Liang Zheng
Yi Yang
Jan Kautz
GAN
46
751
0
15 Apr 2019
Relation-Aware Global Attention for Person Re-identification
Relation-Aware Global Attention for Person Re-identification
Zhizheng Zhang
Cuiling Lan
Wenjun Zeng
Xin Jin
Zhibo Chen
3DPC
83
480
0
05 Apr 2019
Auto-ReID: Searching for a Part-aware ConvNet for Person
  Re-Identification
Auto-ReID: Searching for a Part-aware ConvNet for Person Re-Identification
Ruijie Quan
Xuanyi Dong
Yuehua Wu
Linchao Zhu
Yi Yang
3DPC
55
224
0
23 Mar 2019
Bag of Tricks and A Strong Baseline for Deep Person Re-identification
Bag of Tricks and A Strong Baseline for Deep Person Re-identification
Hao Luo
Youzhi Gu
Xingyu Liao
Shenqi Lai
Wei Jiang
BDL3DPC
138
1,178
0
17 Mar 2019
Adversarial Metric Attack and Defense for Person Re-identification
Adversarial Metric Attack and Defense for Person Re-identification
S. Bai
Yingwei Li
Yuyin Zhou
Qizhu Li
Philip Torr
AAML
49
17
0
30 Jan 2019
Theoretically Principled Trade-off between Robustness and Accuracy
Theoretically Principled Trade-off between Robustness and Accuracy
Hongyang R. Zhang
Yaodong Yu
Jiantao Jiao
Eric Xing
L. Ghaoui
Michael I. Jordan
143
2,559
0
24 Jan 2019
VectorDefense: Vectorization as a Defense to Adversarial Examples
VectorDefense: Vectorization as a Defense to Adversarial Examples
V. Kabilan
Brandon L. Morris
Anh Totti Nguyen
AAML
50
21
0
23 Apr 2018
Harmonious Attention Network for Person Re-Identification
Harmonious Attention Network for Person Re-Identification
Wei Li
Xiatian Zhu
S. Gong
55
1,351
0
22 Feb 2018
Beyond Part Models: Person Retrieval with Refined Part Pooling (and a
  Strong Convolutional Baseline)
Beyond Part Models: Person Retrieval with Refined Part Pooling (and a Strong Convolutional Baseline)
Yifan Sun
Liang Zheng
Yi Yang
Q. Tian
Shengjin Wang
137
2,178
0
26 Nov 2017
Person Transfer GAN to Bridge Domain Gap for Person Re-Identification
Person Transfer GAN to Bridge Domain Gap for Person Re-Identification
Longhui Wei
Shiliang Zhang
Wen Gao
Q. Tian
GAN
98
1,669
0
23 Nov 2017
AlignedReID: Surpassing Human-Level Performance in Person
  Re-Identification
AlignedReID: Surpassing Human-Level Performance in Person Re-Identification
Xuan Zhang
Haowen Luo
Xing Fan
Weilai Xiang
Yixiao Sun
Qiqi Xiao
Wei Jiang
Chi Zhang
Jian Sun
59
502
0
22 Nov 2017
Countering Adversarial Images using Input Transformations
Countering Adversarial Images using Input Transformations
Chuan Guo
Mayank Rana
Moustapha Cissé
Laurens van der Maaten
AAML
123
1,406
0
31 Oct 2017
PixelDefend: Leveraging Generative Models to Understand and Defend
  against Adversarial Examples
PixelDefend: Leveraging Generative Models to Understand and Defend against Adversarial Examples
Yang Song
Taesup Kim
Sebastian Nowozin
Stefano Ermon
Nate Kushman
AAML
110
791
0
30 Oct 2017
Random Erasing Data Augmentation
Random Erasing Data Augmentation
Zhun Zhong
Liang Zheng
Guoliang Kang
Shaozi Li
Yi Yang
96
3,644
0
16 Aug 2017
Biologically inspired protection of deep networks from adversarial
  attacks
Biologically inspired protection of deep networks from adversarial attacks
Aran Nayebi
Surya Ganguli
AAML
71
115
0
27 Mar 2017
Re-ranking Person Re-identification with k-reciprocal Encoding
Re-ranking Person Re-identification with k-reciprocal Encoding
Zhun Zhong
Liang Zheng
Donglin Cao
Shaozi Li
132
1,504
0
29 Jan 2017
Unlabeled Samples Generated by GAN Improve the Person Re-identification
  Baseline in vitro
Unlabeled Samples Generated by GAN Improve the Person Re-identification Baseline in vitro
Zhedong Zheng
Liang Zheng
Yi Yang
GAN
78
1,887
0
26 Jan 2017
Dense Associative Memory is Robust to Adversarial Inputs
Dense Associative Memory is Robust to Adversarial Inputs
Dmitry Krotov
J. Hopfield
AAML
67
112
0
04 Jan 2017
Towards Evaluating the Robustness of Neural Networks
Towards Evaluating the Robustness of Neural Networks
Nicholas Carlini
D. Wagner
OODAAML
266
8,579
0
16 Aug 2016
A study of the effect of JPG compression on adversarial images
A study of the effect of JPG compression on adversarial images
Gintare Karolina Dziugaite
Zoubin Ghahramani
Daniel M. Roy
AAML
86
534
0
02 Aug 2016
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILMAAML
545
5,909
0
08 Jul 2016
DeepFool: a simple and accurate method to fool deep neural networks
DeepFool: a simple and accurate method to fool deep neural networks
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
P. Frossard
AAML
154
4,903
0
14 Nov 2015
Learning with a Strong Adversary
Learning with a Strong Adversary
Ruitong Huang
Bing Xu
Dale Schuurmans
Csaba Szepesvári
AAML
79
358
0
10 Nov 2015
Explaining and Harnessing Adversarial Examples
Explaining and Harnessing Adversarial Examples
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
AAMLGAN
280
19,107
0
20 Dec 2014
Intriguing properties of neural networks
Intriguing properties of neural networks
Christian Szegedy
Wojciech Zaremba
Ilya Sutskever
Joan Bruna
D. Erhan
Ian Goodfellow
Rob Fergus
AAML
280
14,961
1
21 Dec 2013
1