{"id":"https://openalex.org/W4387623677","doi":"https://doi.org/10.1109/tifs.2023.3322659","title":"Invisible Backdoor Attack With Dynamic Triggers Against Person Re-Identification","display_name":"Invisible Backdoor Attack With Dynamic Triggers Against Person Re-Identification","publication_year":2023,"publication_date":"2023-10-13","ids":{"openalex":"https://openalex.org/W4387623677","doi":"https://doi.org/10.1109/tifs.2023.3322659"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2023.3322659","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3322659","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023045741","display_name":"Wenli Sun","orcid":"https://orcid.org/0009-0009-2606-5666"},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wenli Sun","raw_affiliation_strings":["Department of Computer Science and Technology, Tongji University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tongji University, Shanghai, China","institution_ids":["https://openalex.org/I116953780"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011424573","display_name":"Xinyang Jiang","orcid":"https://orcid.org/0000-0002-4991-0596"},"institutions":[{"id":"https://openalex.org/I4210113369","display_name":"Microsoft Research Asia (China)","ror":"https://ror.org/0300m5276","country_code":"CN","type":"company","lineage":["https://openalex.org/I1290206253","https://openalex.org/I4210113369"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinyang Jiang","raw_affiliation_strings":["Microsoft Research Asia, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Microsoft Research Asia, Shanghai, China","institution_ids":["https://openalex.org/I4210113369"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039546706","display_name":"Shuguang Dou","orcid":"https://orcid.org/0000-0003-3231-8817"},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuguang Dou","raw_affiliation_strings":["Department of Computer Science and Technology, Tongji University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tongji University, Shanghai, China","institution_ids":["https://openalex.org/I116953780"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100440920","display_name":"Dongsheng Li","orcid":"https://orcid.org/0000-0003-3103-8442"},"institutions":[{"id":"https://openalex.org/I4210113369","display_name":"Microsoft Research Asia (China)","ror":"https://ror.org/0300m5276","country_code":"CN","type":"company","lineage":["https://openalex.org/I1290206253","https://openalex.org/I4210113369"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongsheng Li","raw_affiliation_strings":["Microsoft Research Asia, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Microsoft Research Asia, Shanghai, China","institution_ids":["https://openalex.org/I4210113369"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024791074","display_name":"Duoqian Miao","orcid":"https://orcid.org/0000-0001-6588-1468"},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Duoqian Miao","raw_affiliation_strings":["Department of Computer Science and Technology, Tongji University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tongji University, Shanghai, China","institution_ids":["https://openalex.org/I116953780"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015874725","display_name":"Cheng Deng","orcid":"https://orcid.org/0000-0003-2620-3247"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cheng Deng","raw_affiliation_strings":["School of Electronic Engineering, Xidian University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064237960","display_name":"Cairong Zhao","orcid":"https://orcid.org/0000-0001-6745-9674"},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cairong Zhao","raw_affiliation_strings":["Department of Computer Science and Technology, Tongji University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tongji University, Shanghai, China","institution_ids":["https://openalex.org/I116953780"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5023045741"],"corresponding_institution_ids":["https://openalex.org/I116953780"],"apc_list":null,"apc_paid":null,"fwci":2.5276,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.91445235,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"19","issue":null,"first_page":"307","last_page":"319"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9914026856422424},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7896425127983093},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5528278350830078},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5301436185836792},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5017523765563965},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.4933761656284332},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.45624345541000366},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4367653727531433},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.417207270860672},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3563891351222992}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9914026856422424},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7896425127983093},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5528278350830078},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5301436185836792},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5017523765563965},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.4933761656284332},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.45624345541000366},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4367653727531433},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.417207270860672},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3563891351222992},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2023.3322659","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3322659","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7599999904632568,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G23458378","display_name":null,"funder_award_id":"61976160","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3308686228","display_name":null,"funder_award_id":"22ZR1466700","funder_id":"https://openalex.org/F4320309612","funder_display_name":"Natural Science Foundation of Shanghai"},{"id":"https://openalex.org/G5036809106","display_name":null,"funder_award_id":"62076182","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5521624060","display_name":null,"funder_award_id":"62276190","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5686205310","display_name":null,"funder_award_id":"62076184","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8264781341","display_name":null,"funder_award_id":"61976158","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320309612","display_name":"Natural Science Foundation of Shanghai","ror":null},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":89,"referenced_works":["https://openalex.org/W1901129140","https://openalex.org/W1982925187","https://openalex.org/W2114770744","https://openalex.org/W2131255818","https://openalex.org/W2133665775","https://openalex.org/W2194775991","https://openalex.org/W2204750386","https://openalex.org/W2531440880","https://openalex.org/W2585635281","https://openalex.org/W2748789698","https://openalex.org/W2774423163","https://openalex.org/W2795758732","https://openalex.org/W2807363941","https://openalex.org/W2892948265","https://openalex.org/W2916086000","https://openalex.org/W2916798096","https://openalex.org/W2960139675","https://openalex.org/W2962785568","https://openalex.org/W2962843773","https://openalex.org/W2962858109","https://openalex.org/W2962926870","https://openalex.org/W2963842104","https://openalex.org/W2964280870","https://openalex.org/W2970335439","https://openalex.org/W2971661634","https://openalex.org/W2979931389","https://openalex.org/W2981446616","https://openalex.org/W2985913519","https://openalex.org/W2990595670","https://openalex.org/W2996695408","https://openalex.org/W2996800219","https://openalex.org/W2998522188","https://openalex.org/W2998792609","https://openalex.org/W2998904801","https://openalex.org/W3007358161","https://openalex.org/W3034414373","https://openalex.org/W3034856584","https://openalex.org/W3035569526","https://openalex.org/W3042368254","https://openalex.org/W3083185154","https://openalex.org/W3093070413","https://openalex.org/W3100506510","https://openalex.org/W3105077954","https://openalex.org/W3107337211","https://openalex.org/W3110285749","https://openalex.org/W3112001526","https://openalex.org/W3121478722","https://openalex.org/W3125736290","https://openalex.org/W3130788031","https://openalex.org/W3162549644","https://openalex.org/W3163083600","https://openalex.org/W3175215793","https://openalex.org/W3188772578","https://openalex.org/W3192036897","https://openalex.org/W3197756237","https://openalex.org/W4214537185","https://openalex.org/W4214563788","https://openalex.org/W4214680449","https://openalex.org/W4221141428","https://openalex.org/W4221148936","https://openalex.org/W4289435389","https://openalex.org/W4291653584","https://openalex.org/W4293057081","https://openalex.org/W4297738229","https://openalex.org/W4304099366","https://openalex.org/W4312280786","https://openalex.org/W4312329299","https://openalex.org/W4312700692","https://openalex.org/W4319068770","https://openalex.org/W4380032277","https://openalex.org/W6728374919","https://openalex.org/W6743581629","https://openalex.org/W6746897123","https://openalex.org/W6752600739","https://openalex.org/W6770046844","https://openalex.org/W6774177702","https://openalex.org/W6780640148","https://openalex.org/W6784558051","https://openalex.org/W6788876066","https://openalex.org/W6789325072","https://openalex.org/W6800893530","https://openalex.org/W6802862418","https://openalex.org/W6803053407","https://openalex.org/W6803329306","https://openalex.org/W6803329705","https://openalex.org/W6809173602","https://openalex.org/W6809905531","https://openalex.org/W6841272510","https://openalex.org/W6948312134"],"related_works":["https://openalex.org/W4320031223","https://openalex.org/W2348876715","https://openalex.org/W2889233174","https://openalex.org/W3012113073","https://openalex.org/W4391253793","https://openalex.org/W3143283098","https://openalex.org/W4328053081","https://openalex.org/W4283753393","https://openalex.org/W3204619801","https://openalex.org/W4214812658"],"abstract_inverted_index":{"In":[0,28],"recent":[1],"years,":[2],"person":[3],"Re-IDentification":[4],"(ReID)":[5],"has":[6],"rapidly":[7],"progressed":[8],"with":[9],"wide":[10],"real-world":[11],"applications":[12],"but":[13],"is":[14,71,159,172],"also":[15],"susceptible":[16],"to":[17,25,104,161],"various":[18],"forms":[19],"of":[20,132,189,200],"attack,":[21],"including":[22],"proven":[23],"vulnerability":[24],"adversarial":[26],"attacks.":[27],"this":[29,108],"paper,":[30],"we":[31,110],"focus":[32],"on":[33,37,116,193],"the":[34,54,58,66,81,84,91,137,141,176,185,190,198],"backdoor":[35,42,96,114],"attack":[36,43,50,97,115,192],"deep":[38,117],"ReID":[39,70,118],"models.":[40],"Existing":[41],"methods":[44,98,203],"follow":[45],"an":[46,155],"all-to-one":[47],"or":[48],"all-to-all":[49],"scenario,":[51,123],"where":[52,80],"all":[53],"target":[55,138,164],"classes":[56,139],"in":[57,65,83,90],"test":[59,85],"set":[60,86],"have":[61],"already":[62],"been":[63],"seen":[64],"training":[67,92,142],"set.":[68,93],"However,":[69],"a":[72,112,120,168],"much":[73],"more":[74],"complex":[75],"fine-grained":[76],"open-set":[77],"recognition":[78],"problem,":[79],"identities":[82],"are":[87,101],"not":[88,102],"contained":[89],"Thus,":[94],"previous":[95],"for":[99,136,150],"classification":[100],"applicable":[103],"ReID.":[105],"To":[106],"ameliorate":[107],"issue,":[109],"propose":[111],"novel":[113],"under":[119],"new":[121,148],"all-to-unknown":[122],"called":[124],"Dynamic":[125],"Triggers":[126],"Invisible":[127],"Backdoor":[128],"Attack":[129],"(DT-IBA).":[130],"Instead":[131],"learning":[133],"fixed":[134],"triggers":[135,149],"from":[140,167],"set,":[143],"DT-IBA":[144],"can":[145],"dynamically":[146],"generate":[147],"any":[151],"unknown":[152],"identities.":[153],"Specifically,":[154],"identity":[156,165],"hashing":[157],"network":[158],"proposed":[160,191],"first":[162],"extract":[163],"information":[166],"reference":[169],"image,":[170],"which":[171],"then":[173],"injected":[174],"into":[175],"benign":[177],"images":[178],"by":[179],"image":[180],"steganography.":[181],"We":[182],"extensively":[183],"validate":[184],"effectiveness":[186,199],"and":[187,196],"stealthiness":[188],"benchmark":[194],"datasets":[195],"evaluate":[197],"several":[201],"defense":[202],"against":[204],"our":[205],"attack.":[206]},"counts_by_year":[{"year":2026,"cited_by_count":6},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-29T08:15:47.926485","created_date":"2025-10-10T00:00:00"}
