Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2211.10933
Cited By
v1
v2 (latest)
Invisible Backdoor Attack with Dynamic Triggers against Person Re-identification
20 November 2022
Wenli Sun
Xinyang Jiang
Shuguang Dou
Dongsheng Li
Duoqian Miao
Cheng Deng
Cairong Zhao
AAML
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Invisible Backdoor Attack with Dynamic Triggers against Person Re-identification"
49 / 49 papers shown
Title
Logit Margin Matters: Improving Transferable Targeted Adversarial Attack by Logit Calibration
Juanjuan Weng
Zhiming Luo
Zhun Zhong
Shaozi Li
N. Sebe
AAML
79
19
0
07 Mar 2023
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label
Shengshan Hu
Ziqi Zhou
Yechao Zhang
L. Zhang
Yifeng Zheng
Yuanyuan HE
Hai Jin
AAML
95
45
0
01 Jul 2022
BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning
Zhenting Wang
Juan Zhai
Shiqing Ma
AAML
172
101
0
26 May 2022
A Survey of Neural Trojan Attacks and Defenses in Deep Learning
Jie Wang
Ghulam Mubashar Hassan
Naveed Akhtar
AAML
69
26
0
15 Feb 2022
Few-Shot Backdoor Attacks on Visual Object Tracking
Yiming Li
Haoxiang Zhong
Xingjun Ma
Yong Jiang
Shutao Xia
AAML
96
55
0
31 Jan 2022
FIBA: Frequency-Injection based Backdoor Attack in Medical Image Analysis
Yu Feng
Benteng Ma
Jing Zhang
Shanshan Zhao
Yong-quan Xia
Dacheng Tao
AAML
101
87
0
02 Dec 2021
Adversarial Neuron Pruning Purifies Backdoored Deep Models
Dongxian Wu
Yisen Wang
AAML
111
286
0
27 Oct 2021
Anti-Backdoor Learning: Training Clean Models on Poisoned Data
Yige Li
X. Lyu
Nodens Koren
Lingjuan Lyu
Yue Liu
Xingjun Ma
OnRL
91
336
0
22 Oct 2021
Adversarial Unlearning of Backdoors via Implicit Hypergradient
Yi Zeng
Si-An Chen
Won Park
Z. Morley Mao
Ming Jin
R. Jia
AAML
131
178
0
07 Oct 2021
Excess Capacity and Backdoor Poisoning
N. Manoj
Avrim Blum
SILM
AAML
61
24
0
02 Sep 2021
Poison Ink: Robust and Invisible Backdoor Attack
Jie Zhang
Dongdong Chen
Qidong Huang
Jing Liao
Weiming Zhang
Huamin Feng
G. Hua
Nenghai Yu
AAML
51
88
0
05 Aug 2021
A Backdoor Attack against 3D Point Cloud Classifiers
Zhen Xiang
David J. Miller
Siheng Chen
Xi Li
G. Kesidis
3DPC
AAML
73
77
0
12 Apr 2021
Rethinking the Backdoor Attacks' Triggers: A Frequency Perspective
Yi Zeng
Won Park
Z. Morley Mao
R. Jia
AAML
74
215
0
07 Apr 2021
Neural Attention Distillation: Erasing Backdoor Triggers from Deep Neural Networks
Yige Li
Lingjuan Lyu
Nodens Koren
X. Lyu
Yue Liu
Xingjun Ma
AAML
FedML
104
441
0
15 Jan 2021
Invisible Backdoor Attack with Sample-Specific Triggers
Yuezun Li
Yiming Li
Baoyuan Wu
Longkang Li
Ran He
Siwei Lyu
AAML
DiffM
106
492
0
07 Dec 2020
Backdoor Attacks on the DNN Interpretation System
Shihong Fang
A. Choromańska
FAtt
AAML
52
19
0
21 Nov 2020
Backdoor Attack against Speaker Verification
Tongqing Zhai
Yiming Li
Zi-Mou Zhang
Baoyuan Wu
Yong Jiang
Shutao Xia
AAML
88
102
0
22 Oct 2020
Input-Aware Dynamic Backdoor Attack
A. Nguyen
Anh Tran
AAML
80
433
0
16 Oct 2020
CLEANN: Accelerated Trojan Shield for Embedded Neural Networks
Mojan Javaheripi
Mohammad Samragh
Gregory Fields
T. Javidi
F. Koushanfar
AAML
FedML
58
44
0
04 Sep 2020
Backdoor Learning: A Survey
Yiming Li
Yong Jiang
Zhifeng Li
Shutao Xia
AAML
141
613
0
17 Jul 2020
Attack of the Tails: Yes, You Really Can Backdoor Federated Learning
Hongyi Wang
Kartik K. Sreenivasan
Shashank Rajput
Harit Vishwakarma
Saurabh Agarwal
Jy-yong Sohn
Kangwook Lee
Dimitris Papailiopoulos
FedML
89
611
0
09 Jul 2020
Reflection Backdoor: A Natural Backdoor Attack on Deep Neural Networks
Yunfei Liu
Xingjun Ma
James Bailey
Feng Lu
AAML
96
516
0
05 Jul 2020
Can We Mitigate Backdoor Attack Using Adversarial Detection Methods?
Kaidi Jin
Tianwei Zhang
Chao Shen
Yufei Chen
Ming Fan
Chenhao Lin
Ting Liu
AAML
43
14
0
26 Jun 2020
Backdoor Attacks Against Deep Learning Systems in the Physical World
Emily Wenger
Josephine Passananti
A. Bhagoji
Yuanshun Yao
Haitao Zheng
Ben Y. Zhao
AAML
97
203
0
25 Jun 2020
On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient Shaping
Sanghyun Hong
Varun Chandrasekaran
Yigitcan Kaya
Tudor Dumitras
Nicolas Papernot
AAML
85
136
0
26 Feb 2020
Deep Learning for Person Re-identification: A Survey and Outlook
Mang Ye
Jianbing Shen
Gaojie Lin
Tao Xiang
Ling Shao
Guosheng Lin
113
1,587
0
13 Jan 2020
Can You Really Backdoor Federated Learning?
Ziteng Sun
Peter Kairouz
A. Suresh
H. B. McMahan
FedML
85
580
0
18 Nov 2019
Robust Anomaly Detection and Backdoor Attack Detection Via Differential Privacy
Min Du
R. Jia
Basel Alomair
AAML
80
177
0
16 Nov 2019
Hidden Trigger Backdoor Attacks
Aniruddha Saha
Akshayvarun Subramanya
Hamed Pirsiavash
91
629
0
30 Sep 2019
advPattern: Physical-World Attacks on Deep Person Re-Identification via Adversarially Transformable Patterns
Peng Kuang
Siyan Zheng
Mengkai Song
Qian Wang
Alireza Rahimpour
Hairong Qi
AAML
OOD
61
59
0
25 Aug 2019
A Strong Baseline and Batch Normalization Neck for Deep Person Re-identification
Hao Luo
Wei Jiang
Youzhi Gu
Fuxu Liu
Xingyu Liao
Shenqi Lai
Jianyang Gu
3DPC
85
517
0
19 Jun 2019
StegaStamp: Invisible Hyperlinks in Physical Photographs
Matthew Tancik
B. Mildenhall
Ren Ng
WIGM
95
376
0
10 Apr 2019
Deep High-Resolution Representation Learning for Human Pose Estimation
Ke Sun
Bin Xiao
Dong Liu
Jingdong Wang
3DV
138
4,063
0
25 Feb 2019
A new Backdoor Attack in CNNs by training set corruption without label poisoning
Mauro Barni
Kassem Kallas
B. Tondi
AAML
122
360
0
12 Feb 2019
How To Backdoor Federated Learning
Eugene Bagdasaryan
Andreas Veit
Yiqing Hua
D. Estrin
Vitaly Shmatikov
SILM
FedML
104
1,931
0
02 Jul 2018
Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks
Kang Liu
Brendan Dolan-Gavitt
S. Garg
AAML
71
1,047
0
30 May 2018
Learning Discriminative Features with Multiple Granularities for Person Re-Identification
Guanshuo Wang
Yufeng Yuan
Xiong Chen
Jiwei Li
Xi Zhou
OOD
159
1,314
0
04 Apr 2018
Harmonious Attention Network for Person Re-Identification
Wei Li
Xiatian Zhu
S. Gong
55
1,352
0
22 Feb 2018
The Unreasonable Effectiveness of Deep Features as a Perceptual Metric
Richard Y. Zhang
Phillip Isola
Alexei A. Efros
Eli Shechtman
Oliver Wang
EGVM
384
11,938
0
11 Jan 2018
Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning
Xinyun Chen
Chang-rui Liu
Yue Liu
Kimberly Lu
Basel Alomair
AAML
SILM
146
1,854
0
15 Dec 2017
Beyond Part Models: Person Retrieval with Refined Part Pooling (and a Strong Convolutional Baseline)
Yifan Sun
Liang Zheng
Yi Yang
Q. Tian
Shengjin Wang
147
2,178
0
26 Nov 2017
BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain
Tianyu Gu
Brendan Dolan-Gavitt
S. Garg
SILM
130
1,782
0
22 Aug 2017
Revisiting Unreasonable Effectiveness of Data in Deep Learning Era
Chen Sun
Abhinav Shrivastava
Saurabh Singh
Abhinav Gupta
VLM
207
2,407
0
10 Jul 2017
HashNet: Deep Learning to Hash by Continuation
Zhangjie Cao
Mingsheng Long
Jianmin Wang
Philip S. Yu
94
620
0
02 Feb 2017
Unlabeled Samples Generated by GAN Improve the Person Re-identification Baseline in vitro
Zhedong Zheng
Liang Zheng
Yi Yang
GAN
102
1,888
0
26 Jan 2017
Person Re-identification: Past, Present and Future
Liang Zheng
Yi Yang
Alexander G. Hauptmann
151
1,101
0
10 Oct 2016
Grad-CAM: Visual Explanations from Deep Networks via Gradient-based Localization
Ramprasaath R. Selvaraju
Michael Cogswell
Abhishek Das
Ramakrishna Vedantam
Devi Parikh
Dhruv Batra
FAtt
341
20,110
0
07 Oct 2016
Deep Residual Learning for Image Recognition
Kaiming He
Xinming Zhang
Shaoqing Ren
Jian Sun
MedIm
2.3K
194,641
0
10 Dec 2015
U-Net: Convolutional Networks for Biomedical Image Segmentation
Olaf Ronneberger
Philipp Fischer
Thomas Brox
SSeg
3DV
1.9K
77,520
0
18 May 2015
1