ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2211.10933
  4. Cited By
Invisible Backdoor Attack with Dynamic Triggers against Person
  Re-identification
v1v2 (latest)

Invisible Backdoor Attack with Dynamic Triggers against Person Re-identification

20 November 2022
Wenli Sun
Xinyang Jiang
Shuguang Dou
Dongsheng Li
Duoqian Miao
Cheng Deng
Cairong Zhao
    AAML
ArXiv (abs)PDFHTML

Papers citing "Invisible Backdoor Attack with Dynamic Triggers against Person Re-identification"

49 / 49 papers shown
Title
Logit Margin Matters: Improving Transferable Targeted Adversarial Attack
  by Logit Calibration
Logit Margin Matters: Improving Transferable Targeted Adversarial Attack by Logit Calibration
Juanjuan Weng
Zhiming Luo
Zhun Zhong
Shaozi Li
N. Sebe
AAML
79
19
0
07 Mar 2023
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean
  Label
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label
Shengshan Hu
Ziqi Zhou
Yechao Zhang
L. Zhang
Yifeng Zheng
Yuanyuan HE
Hai Jin
AAML
95
45
0
01 Jul 2022
BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural
  Networks via Image Quantization and Contrastive Adversarial Learning
BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning
Zhenting Wang
Juan Zhai
Shiqing Ma
AAML
172
101
0
26 May 2022
A Survey of Neural Trojan Attacks and Defenses in Deep Learning
A Survey of Neural Trojan Attacks and Defenses in Deep Learning
Jie Wang
Ghulam Mubashar Hassan
Naveed Akhtar
AAML
69
26
0
15 Feb 2022
Few-Shot Backdoor Attacks on Visual Object Tracking
Few-Shot Backdoor Attacks on Visual Object Tracking
Yiming Li
Haoxiang Zhong
Xingjun Ma
Yong Jiang
Shutao Xia
AAML
96
55
0
31 Jan 2022
FIBA: Frequency-Injection based Backdoor Attack in Medical Image
  Analysis
FIBA: Frequency-Injection based Backdoor Attack in Medical Image Analysis
Yu Feng
Benteng Ma
Jing Zhang
Shanshan Zhao
Yong-quan Xia
Dacheng Tao
AAML
101
87
0
02 Dec 2021
Adversarial Neuron Pruning Purifies Backdoored Deep Models
Adversarial Neuron Pruning Purifies Backdoored Deep Models
Dongxian Wu
Yisen Wang
AAML
111
286
0
27 Oct 2021
Anti-Backdoor Learning: Training Clean Models on Poisoned Data
Anti-Backdoor Learning: Training Clean Models on Poisoned Data
Yige Li
X. Lyu
Nodens Koren
Lingjuan Lyu
Yue Liu
Xingjun Ma
OnRL
91
336
0
22 Oct 2021
Adversarial Unlearning of Backdoors via Implicit Hypergradient
Adversarial Unlearning of Backdoors via Implicit Hypergradient
Yi Zeng
Si-An Chen
Won Park
Z. Morley Mao
Ming Jin
R. Jia
AAML
131
178
0
07 Oct 2021
Excess Capacity and Backdoor Poisoning
Excess Capacity and Backdoor Poisoning
N. Manoj
Avrim Blum
SILMAAML
61
24
0
02 Sep 2021
Poison Ink: Robust and Invisible Backdoor Attack
Poison Ink: Robust and Invisible Backdoor Attack
Jie Zhang
Dongdong Chen
Qidong Huang
Jing Liao
Weiming Zhang
Huamin Feng
G. Hua
Nenghai Yu
AAML
51
88
0
05 Aug 2021
A Backdoor Attack against 3D Point Cloud Classifiers
A Backdoor Attack against 3D Point Cloud Classifiers
Zhen Xiang
David J. Miller
Siheng Chen
Xi Li
G. Kesidis
3DPCAAML
73
77
0
12 Apr 2021
Rethinking the Backdoor Attacks' Triggers: A Frequency Perspective
Rethinking the Backdoor Attacks' Triggers: A Frequency Perspective
Yi Zeng
Won Park
Z. Morley Mao
R. Jia
AAML
74
215
0
07 Apr 2021
Neural Attention Distillation: Erasing Backdoor Triggers from Deep
  Neural Networks
Neural Attention Distillation: Erasing Backdoor Triggers from Deep Neural Networks
Yige Li
Lingjuan Lyu
Nodens Koren
X. Lyu
Yue Liu
Xingjun Ma
AAMLFedML
104
441
0
15 Jan 2021
Invisible Backdoor Attack with Sample-Specific Triggers
Invisible Backdoor Attack with Sample-Specific Triggers
Yuezun Li
Yiming Li
Baoyuan Wu
Longkang Li
Ran He
Siwei Lyu
AAMLDiffM
106
492
0
07 Dec 2020
Backdoor Attacks on the DNN Interpretation System
Backdoor Attacks on the DNN Interpretation System
Shihong Fang
A. Choromańska
FAttAAML
52
19
0
21 Nov 2020
Backdoor Attack against Speaker Verification
Backdoor Attack against Speaker Verification
Tongqing Zhai
Yiming Li
Zi-Mou Zhang
Baoyuan Wu
Yong Jiang
Shutao Xia
AAML
88
102
0
22 Oct 2020
Input-Aware Dynamic Backdoor Attack
Input-Aware Dynamic Backdoor Attack
A. Nguyen
Anh Tran
AAML
80
433
0
16 Oct 2020
CLEANN: Accelerated Trojan Shield for Embedded Neural Networks
CLEANN: Accelerated Trojan Shield for Embedded Neural Networks
Mojan Javaheripi
Mohammad Samragh
Gregory Fields
T. Javidi
F. Koushanfar
AAMLFedML
58
44
0
04 Sep 2020
Backdoor Learning: A Survey
Backdoor Learning: A Survey
Yiming Li
Yong Jiang
Zhifeng Li
Shutao Xia
AAML
141
613
0
17 Jul 2020
Attack of the Tails: Yes, You Really Can Backdoor Federated Learning
Attack of the Tails: Yes, You Really Can Backdoor Federated Learning
Hongyi Wang
Kartik K. Sreenivasan
Shashank Rajput
Harit Vishwakarma
Saurabh Agarwal
Jy-yong Sohn
Kangwook Lee
Dimitris Papailiopoulos
FedML
89
611
0
09 Jul 2020
Reflection Backdoor: A Natural Backdoor Attack on Deep Neural Networks
Reflection Backdoor: A Natural Backdoor Attack on Deep Neural Networks
Yunfei Liu
Xingjun Ma
James Bailey
Feng Lu
AAML
96
516
0
05 Jul 2020
Can We Mitigate Backdoor Attack Using Adversarial Detection Methods?
Can We Mitigate Backdoor Attack Using Adversarial Detection Methods?
Kaidi Jin
Tianwei Zhang
Chao Shen
Yufei Chen
Ming Fan
Chenhao Lin
Ting Liu
AAML
43
14
0
26 Jun 2020
Backdoor Attacks Against Deep Learning Systems in the Physical World
Backdoor Attacks Against Deep Learning Systems in the Physical World
Emily Wenger
Josephine Passananti
A. Bhagoji
Yuanshun Yao
Haitao Zheng
Ben Y. Zhao
AAML
97
203
0
25 Jun 2020
On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient
  Shaping
On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient Shaping
Sanghyun Hong
Varun Chandrasekaran
Yigitcan Kaya
Tudor Dumitras
Nicolas Papernot
AAML
85
136
0
26 Feb 2020
Deep Learning for Person Re-identification: A Survey and Outlook
Deep Learning for Person Re-identification: A Survey and Outlook
Mang Ye
Jianbing Shen
Gaojie Lin
Tao Xiang
Ling Shao
Guosheng Lin
113
1,587
0
13 Jan 2020
Can You Really Backdoor Federated Learning?
Can You Really Backdoor Federated Learning?
Ziteng Sun
Peter Kairouz
A. Suresh
H. B. McMahan
FedML
85
580
0
18 Nov 2019
Robust Anomaly Detection and Backdoor Attack Detection Via Differential
  Privacy
Robust Anomaly Detection and Backdoor Attack Detection Via Differential Privacy
Min Du
R. Jia
Basel Alomair
AAML
80
177
0
16 Nov 2019
Hidden Trigger Backdoor Attacks
Hidden Trigger Backdoor Attacks
Aniruddha Saha
Akshayvarun Subramanya
Hamed Pirsiavash
91
629
0
30 Sep 2019
advPattern: Physical-World Attacks on Deep Person Re-Identification via
  Adversarially Transformable Patterns
advPattern: Physical-World Attacks on Deep Person Re-Identification via Adversarially Transformable Patterns
Peng Kuang
Siyan Zheng
Mengkai Song
Qian Wang
Alireza Rahimpour
Hairong Qi
AAMLOOD
61
59
0
25 Aug 2019
A Strong Baseline and Batch Normalization Neck for Deep Person
  Re-identification
A Strong Baseline and Batch Normalization Neck for Deep Person Re-identification
Hao Luo
Wei Jiang
Youzhi Gu
Fuxu Liu
Xingyu Liao
Shenqi Lai
Jianyang Gu
3DPC
85
517
0
19 Jun 2019
StegaStamp: Invisible Hyperlinks in Physical Photographs
StegaStamp: Invisible Hyperlinks in Physical Photographs
Matthew Tancik
B. Mildenhall
Ren Ng
WIGM
95
376
0
10 Apr 2019
Deep High-Resolution Representation Learning for Human Pose Estimation
Deep High-Resolution Representation Learning for Human Pose Estimation
Ke Sun
Bin Xiao
Dong Liu
Jingdong Wang
3DV
138
4,063
0
25 Feb 2019
A new Backdoor Attack in CNNs by training set corruption without label
  poisoning
A new Backdoor Attack in CNNs by training set corruption without label poisoning
Mauro Barni
Kassem Kallas
B. Tondi
AAML
122
360
0
12 Feb 2019
How To Backdoor Federated Learning
How To Backdoor Federated Learning
Eugene Bagdasaryan
Andreas Veit
Yiqing Hua
D. Estrin
Vitaly Shmatikov
SILMFedML
104
1,931
0
02 Jul 2018
Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural
  Networks
Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks
Kang Liu
Brendan Dolan-Gavitt
S. Garg
AAML
71
1,047
0
30 May 2018
Learning Discriminative Features with Multiple Granularities for Person
  Re-Identification
Learning Discriminative Features with Multiple Granularities for Person Re-Identification
Guanshuo Wang
Yufeng Yuan
Xiong Chen
Jiwei Li
Xi Zhou
OOD
159
1,314
0
04 Apr 2018
Harmonious Attention Network for Person Re-Identification
Harmonious Attention Network for Person Re-Identification
Wei Li
Xiatian Zhu
S. Gong
55
1,352
0
22 Feb 2018
The Unreasonable Effectiveness of Deep Features as a Perceptual Metric
The Unreasonable Effectiveness of Deep Features as a Perceptual Metric
Richard Y. Zhang
Phillip Isola
Alexei A. Efros
Eli Shechtman
Oliver Wang
EGVM
384
11,938
0
11 Jan 2018
Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning
Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning
Xinyun Chen
Chang-rui Liu
Yue Liu
Kimberly Lu
Basel Alomair
AAMLSILM
146
1,854
0
15 Dec 2017
Beyond Part Models: Person Retrieval with Refined Part Pooling (and a
  Strong Convolutional Baseline)
Beyond Part Models: Person Retrieval with Refined Part Pooling (and a Strong Convolutional Baseline)
Yifan Sun
Liang Zheng
Yi Yang
Q. Tian
Shengjin Wang
147
2,178
0
26 Nov 2017
BadNets: Identifying Vulnerabilities in the Machine Learning Model
  Supply Chain
BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain
Tianyu Gu
Brendan Dolan-Gavitt
S. Garg
SILM
130
1,782
0
22 Aug 2017
Revisiting Unreasonable Effectiveness of Data in Deep Learning Era
Revisiting Unreasonable Effectiveness of Data in Deep Learning Era
Chen Sun
Abhinav Shrivastava
Saurabh Singh
Abhinav Gupta
VLM
207
2,407
0
10 Jul 2017
HashNet: Deep Learning to Hash by Continuation
HashNet: Deep Learning to Hash by Continuation
Zhangjie Cao
Mingsheng Long
Jianmin Wang
Philip S. Yu
94
620
0
02 Feb 2017
Unlabeled Samples Generated by GAN Improve the Person Re-identification
  Baseline in vitro
Unlabeled Samples Generated by GAN Improve the Person Re-identification Baseline in vitro
Zhedong Zheng
Liang Zheng
Yi Yang
GAN
102
1,888
0
26 Jan 2017
Person Re-identification: Past, Present and Future
Person Re-identification: Past, Present and Future
Liang Zheng
Yi Yang
Alexander G. Hauptmann
151
1,101
0
10 Oct 2016
Grad-CAM: Visual Explanations from Deep Networks via Gradient-based
  Localization
Grad-CAM: Visual Explanations from Deep Networks via Gradient-based Localization
Ramprasaath R. Selvaraju
Michael Cogswell
Abhishek Das
Ramakrishna Vedantam
Devi Parikh
Dhruv Batra
FAtt
341
20,110
0
07 Oct 2016
Deep Residual Learning for Image Recognition
Deep Residual Learning for Image Recognition
Kaiming He
Xinming Zhang
Shaoqing Ren
Jian Sun
MedIm
2.3K
194,641
0
10 Dec 2015
U-Net: Convolutional Networks for Biomedical Image Segmentation
U-Net: Convolutional Networks for Biomedical Image Segmentation
Olaf Ronneberger
Philipp Fischer
Thomas Brox
SSeg3DV
1.9K
77,520
0
18 May 2015
1