Login / Signup
Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-identification With Deep Mis-Ranking.
Hongjun Wang
Guangrun Wang
Ya Li
Dongyu Zhang
Liang Lin
Published in:
CoRR (2020)
Keyphrases
</>
person re identification
metric learning
sparse coding
video surveillance
feature representation
camera network
probabilistic model
image features
image classification
object tracking