Alert button

Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-identification With Deep Mis-Ranking

Apr 08, 2020
Hongjun Wang, Guangrun Wang, Ya Li, Dongyu Zhang, Liang Lin

Figure 1 for Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-identification With Deep Mis-Ranking
Figure 2 for Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-identification With Deep Mis-Ranking
Figure 3 for Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-identification With Deep Mis-Ranking
Figure 4 for Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-identification With Deep Mis-Ranking

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: