Login / Signup
Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-identification With Deep Mis-Ranking.
Hongjun Wang
Guangrun Wang
Ya Li
Dongyu Zhang
Liang Lin
Published in:
CVPR (2020)
Keyphrases
</>
person re identification
sparse coding
metric learning
video surveillance
feature representation
distance metric
riemannian manifolds
learning algorithm
feature space
camera network