The following publications are possibly variants of this publication:
- Towards Robust Person Re-Identification by Defending Against Universal AttackersFengxiang Yang, Juanjuan Weng, Zhun Zhong, Hong Liu, Zheng Wang 0007, Zhiming Luo, Donglin Cao, Shaozi Li, Shin'ichi Satoh 0001, Nicu Sebe. pami, 45(4):5218-5235, April 2023. [doi]
- Occluded Person Re-IdentificationJiaxuan Zhuo, Zeyu Chen, Jianhuang Lai, Guangcong Wang. icmcs 2018: 1-6 [doi]
- k-symmetry model for identity anonymization in social networksWentao Wu, Yanghua Xiao, Wei Wang, Zhenying He, Zhihui Wang. edbt 2010: 111-122 [doi]
- Occluded Person Re-identification via Saliency-Guided Patch TransferLei Tan, Jiaer Xia, Wenfeng Liu, Pingyang Dai, Yongjian Wu 0001, Liujuan Cao. AAAI 2024: 5070-5078 [doi]
- Identifying Visible Parts via Pose Estimation for Occluded Person Re-IdentificationJiaxu Miao, Yu Wu 0011, Yi Yang 0001. tnn, 33(9):4624-4634, 2022. [doi]