暂无分享,去创建一个
[1] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[2] Martha Larson,et al. Who's Afraid of Adversarial Queries?: The Impact of Image Modifications on Content-based Image Retrieval , 2019, ICMR.
[3] Yingwei Li,et al. Adversarial Metric Attack and Defense for Person Re-Identification , 2020, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[4] Dongdong Hou,et al. Detection Based Defense Against Adversarial Examples From the Steganalysis Point of View , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[5] Amit K. Roy-Chowdhury,et al. Learning Person Re-identification Models from Videos with Weak Supervision , 2020, ArXiv.
[6] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[7] Srikanth V. Krishnamurthy,et al. You do (not) belong here: detecting DPI evasion attacks with context learning , 2020, CoNEXT.
[8] Yi Yang,et al. Unlabeled Samples Generated by GAN Improve the Person Re-identification Baseline in Vitro , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[9] Francesco Solera,et al. Performance Measures and a Data Set for Multi-target, Multi-camera Tracking , 2016, ECCV Workshops.
[10] Ruigang Liang,et al. Seeing isn't Believing: Towards More Robust Adversarial Attack Against Real World Object Detectors , 2019, CCS.
[11] Duen Horng Chau,et al. ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector , 2018, ECML/PKDD.
[12] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[13] Yi Yang,et al. Open Set Adversarial Examples , 2018, ArXiv.
[14] Rongrong Ji,et al. Universal Adversarial Perturbations Against Person Re-Identification , 2019, ArXiv.
[15] Qi Tian,et al. Scalable Person Re-identification: A Benchmark , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[16] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[17] Ya Li,et al. Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-identification With Deep Mis-Ranking , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[18] Jiwen Lu,et al. Learning Discriminative Aggregation Network for Video-Based Face Recognition and Person Re-identification , 2017, International Journal of Computer Vision.
[19] Yi Yang,et al. Generalizing a Person Retrieval Model Hetero- and Homogeneously , 2018, ECCV.
[20] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[21] Ross B. Girshick,et al. Mask R-CNN , 2017, 1703.06870.
[22] Guillermo Sapiro,et al. Detecting Adversarial Samples Using Influence Functions and Nearest Neighbors , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[23] Yi Yang,et al. Camera Style Adaptation for Person Re-identification , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[24] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[25] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[26] Hoki Kim. Torchattacks : A Pytorch Repository for Adversarial Attacks , 2020, ArXiv.
[27] Sudipta Paul,et al. Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency , 2020, ECCV.
[28] Romaric Audigier,et al. Vulnerability of Person Re-Identification Models to Metric Adversarial Attacks , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[29] Shin Ishii,et al. Distributional Smoothing with Virtual Adversarial Training , 2015, ICLR 2016.
[30] Qian Wang,et al. advPattern: Physical-World Attacks on Deep Person Re-Identification via Adversarially Transformable Patterns , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[31] Rongrong Ji,et al. Pyramidal Person Re-IDentification via Multi-Loss Dynamic Training , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[32] Yaonan Wang,et al. Exploiting Global Camera Network Constraints for Unsupervised Video Person Re-Identification , 2020, IEEE Transactions on Circuits and Systems for Video Technology.
[33] Wei Liu,et al. Efficient Decision-Based Black-Box Adversarial Attacks on Face Recognition , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[34] Srikanth V. Krishnamurthy,et al. DeepTrack: Grouping RFID Tags Based on Spatio-temporal Proximity in Retail Spaces , 2020, IEEE INFOCOM 2020 - IEEE Conference on Computer Communications.
[35] Jun Zhu,et al. Boosting Adversarial Attacks with Momentum , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[36] Ananthram Swami,et al. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[37] Jian Sun,et al. AlignedReID: Surpassing Human-Level Performance in Person Re-Identification , 2017, ArXiv.
[38] Patrick D. McDaniel,et al. Deep k-Nearest Neighbors: Towards Confident, Interpretable and Robust Deep Learning , 2018, ArXiv.
[39] Ken-ichi Kawarabayashi,et al. Estimating Local Intrinsic Dimensionality , 2015, KDD.
[40] Amit K. Roy-Chowdhury,et al. Exploiting Temporal Coherence for Self-Supervised One-shot Video Re-identification , 2020, ECCV.
[41] Shaogang Gong,et al. Harmonious Attention Network for Person Re-identification , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[42] Qi Tian,et al. Beyond Part Models: Person Retrieval with Refined Part Pooling , 2017, ECCV.
[43] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[44] Lucas Beyer,et al. In Defense of the Triplet Loss for Person Re-Identification , 2017, ArXiv.
[45] Samy Bengio,et al. Adversarial Machine Learning at Scale , 2016, ICLR.
[46] Tao Xiang,et al. Multi-scale Deep Learning Architectures for Person Re-identification , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[47] David Wagner,et al. Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods , 2017, AISec@CCS.
[48] James Bailey,et al. Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality , 2018, ICLR.
[49] Yi Yang,et al. Image-Image Domain Adaptation with Preserved Self-Similarity and Domain-Dissimilarity for Person Re-identification , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[50] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[51] Dan Boneh,et al. Ensemble Adversarial Training: Attacks and Defenses , 2017, ICLR.
[52] Amit K. Roy-Chowdhury,et al. Measurement-driven Security Analysis of Imperceptible Impersonation Attacks , 2020, ArXiv.
[53] Giorgos Tolias,et al. Targeted Mismatch Adversarial Attack: Query With a Flower to Retrieve the Tower , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[54] Amit K. Roy-Chowdhury,et al. Exploiting Multi-Object Relationships for Detecting Adversarial Attacks in Complex Scenes , 2021, 2021 IEEE/CVF International Conference on Computer Vision (ICCV).
[55] Amit K. Roy-Chowdhury,et al. Adversarial Perturbations Against Real-Time Video Classification Systems , 2018, NDSS.
[56] Kaiming He,et al. Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[57] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[58] Hu Zhang,et al. Motion-Excited Sampler: Video Adversarial Attack with Sparked Prior , 2020, ECCV.