Chrome Extension
WeChat Mini Program
Use on ChatGLM

Beyond Universal Person Re-Identification Attack

IEEE Transactions on Information Forensics and Security(2021)

Cited 19|Views42
Key words
Perturbation methods,Task analysis,Computational modeling,Electronic mail,Neural networks,Linear programming,Training,Universal adversarial perturbation,cross-model attack,list-wise attack,person Re-ID
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined