Beyond Universal Person Re-Identification Attack
IEEE Transactions on Information Forensics and Security(2021)
Key words
Perturbation methods,Task analysis,Computational modeling,Electronic mail,Neural networks,Linear programming,Training,Universal adversarial perturbation,cross-model attack,list-wise attack,person Re-ID
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined