The following publications are possibly variants of this publication:
- Robust FSMs for cryptographic devices resilient to strong fault injection attacksZhen Wang, Mark G. Karpovsky. iolts 2010: 240-245 [doi]
- VRSTC: Occlusion-Free Video Person Re-IdentificationRuibing Hou, Bingpeng Ma, Hong Chang, Xinqian Gu, Shiguang Shan, Xilin Chen. cvpr 2018: 7183-7192 [doi]
- Smoothing Adversarial Domain Attack and P-Memory Reconsolidation for Cross-Domain Person Re-IdentificationGuangcong Wang, Jian-Huang Lai, Wenqi Liang, Guangrun Wang. cvpr 2020: 10565-10574 [doi]
- Multi-Expert Adversarial Attack Detection in Person Re-identification Using Context InconsistencyXueping Wang, Shasha Li, Min Liu 0008, Yaonan Wang, Amit K. Roy Chowdhury. iccv 2021: 15077-15087 [doi]
- An Effective Adversarial Attack on Person Re-Identification in Video Surveillance via Dispersion ReductionYu Zheng, Yantao Lu, Senem Velipasalar. access, 8:183891-183902, 2020. [doi]
- Query-UAP: Query-Efficient Universal Adversarial Perturbation for Large-Scale Person Re-Identification AttackHuiwang Liu, Ya Li. prcv 2022: 718-731 [doi]
- Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-identification With Deep Mis-RankingHongjun Wang 0005, Guangrun Wang, Ya Li, Dongyu Zhang, Liang Lin. cvpr 2020: 339-348 [doi]
- advPattern: Physical-World Attacks on Deep Person Re-Identification via Adversarially Transformable PatternsZhibo Wang, Siyan Zheng, Mengkai Song, Qian Wang, Alireza Rahimpour, Hairong Qi. iccv 2019: 8340-8349 [doi]