{"id":"https://openalex.org/W4304091826","doi":"https://doi.org/10.1145/3503161.3547958","title":"Attack is the Best Defense: Towards Preemptive-Protection Person Re-Identification","display_name":"Attack is the Best Defense: Towards Preemptive-Protection Person Re-Identification","publication_year":2022,"publication_date":"2022-10-10","ids":{"openalex":"https://openalex.org/W4304091826","doi":"https://doi.org/10.1145/3503161.3547958"},"language":"en","primary_location":{"id":"doi:10.1145/3503161.3547958","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3503161.3547958","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3503161.3547958","source":{"id":"https://openalex.org/S4363608757","display_name":"Proceedings of the 30th ACM International Conference on Multimedia","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 30th ACM International Conference on Multimedia","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3503161.3547958","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054683430","display_name":"Lin Wang","orcid":"https://orcid.org/0000-0002-3557-1853"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lin Wang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences &amp; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences &amp; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017704875","display_name":"Wanqian Zhang","orcid":"https://orcid.org/0000-0001-5734-4072"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wanqian Zhang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002436544","display_name":"Dayan Wu","orcid":"https://orcid.org/0000-0002-8604-7226"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dayan Wu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029719997","display_name":"Fei Zhu","orcid":"https://orcid.org/0009-0002-0741-4831"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fei Zhu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences &amp; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences &amp; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100374360","display_name":"Bo Li","orcid":"https://orcid.org/0000-0001-6709-0942"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Li","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences &amp; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences &amp; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5054683430"],"corresponding_institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.5989,"has_fulltext":true,"cited_by_count":12,"citation_normalized_percentile":{"value":0.76891412,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"550","last_page":"559"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8023808002471924},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.792145848274231},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7055587768554688},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.6485663652420044},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.641819953918457},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.606396496295929},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.4738769233226776},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.45971181988716125},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4136800169944763},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38004058599472046}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8023808002471924},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.792145848274231},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7055587768554688},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.6485663652420044},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.641819953918457},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.606396496295929},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.4738769233226776},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.45971181988716125},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4136800169944763},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38004058599472046},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3503161.3547958","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3503161.3547958","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3503161.3547958","source":{"id":"https://openalex.org/S4363608757","display_name":"Proceedings of the 30th ACM International Conference on Multimedia","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 30th ACM International Conference on Multimedia","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3503161.3547958","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3503161.3547958","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3503161.3547958","source":{"id":"https://openalex.org/S4363608757","display_name":"Proceedings of the 30th ACM International Conference on Multimedia","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 30th ACM International Conference on Multimedia","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.8100000023841858,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G7830010439","display_name":null,"funder_award_id":"2022M713348","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4304091826.pdf","grobid_xml":"https://content.openalex.org/works/W4304091826.grobid-xml"},"referenced_works_count":42,"referenced_works":["https://openalex.org/W1982925187","https://openalex.org/W2123820077","https://openalex.org/W2204750386","https://openalex.org/W2535873859","https://openalex.org/W2543927648","https://openalex.org/W2769823506","https://openalex.org/W2797132229","https://openalex.org/W2883182249","https://openalex.org/W2885039223","https://openalex.org/W2914620083","https://openalex.org/W2959364614","https://openalex.org/W2962859295","https://openalex.org/W2977362526","https://openalex.org/W2984942115","https://openalex.org/W2998904801","https://openalex.org/W2999929549","https://openalex.org/W3016193692","https://openalex.org/W3034643863","https://openalex.org/W3035070480","https://openalex.org/W3035237306","https://openalex.org/W3036280328","https://openalex.org/W3093265782","https://openalex.org/W3098881644","https://openalex.org/W3109275961","https://openalex.org/W3162549644","https://openalex.org/W3166601111","https://openalex.org/W3173777106","https://openalex.org/W3175328093","https://openalex.org/W3175557349","https://openalex.org/W3180614977","https://openalex.org/W3184225461","https://openalex.org/W3185321995","https://openalex.org/W3185951101","https://openalex.org/W3189128863","https://openalex.org/W3193394794","https://openalex.org/W3201839864","https://openalex.org/W3206285027","https://openalex.org/W3208993340","https://openalex.org/W4214645465","https://openalex.org/W4236965008","https://openalex.org/W4297738229","https://openalex.org/W4298051855"],"related_works":["https://openalex.org/W4362599004","https://openalex.org/W2522301850","https://openalex.org/W2883863854","https://openalex.org/W4248052496","https://openalex.org/W4251088474","https://openalex.org/W43121067","https://openalex.org/W2098318948","https://openalex.org/W286553814","https://openalex.org/W2186955778","https://openalex.org/W4365211426"],"abstract_inverted_index":{"Person":[0],"Re-IDentification":[1,144],"(ReID)":[2],"aims":[3],"at":[4,30],"retrieving":[5],"images":[6,63],"of":[7,25,54,117,126,211],"the":[8,23,36,47,52,87,94,101,115,123,133,150,157,165,204],"same":[9],"person":[10,143,159],"across":[11,217],"multiple":[12],"camera":[13],"views.":[14],"Despite":[15],"its":[16,106],"popularity":[17],"in":[18,75],"surveillance":[19],"and":[20,191,194,222],"public":[21],"safety,":[22],"leakage":[24],"identity":[26,167],"information":[27],"is":[28,90,160],"still":[29],"risk.":[31],"For":[32],"example,":[33],"once":[34],"obtaining":[35],"illegal":[37,179],"access":[38],"to":[39,51,71,85,93,122,153,202],"ReID":[40,88,219],"systems,":[41],"malicious":[42],"user":[43],"can":[44],"accurately":[45],"retrieve":[46],"target":[48,72,158],"person,":[49],"leading":[50],"exposure":[53],"private":[55,62],"information.":[56],"Recently,":[57],"some":[58],"pioneering":[59],"works":[60],"protect":[61,86],"with":[64,131],"adversarial":[65,102,151],"examples":[66],"by":[67,178],"adding":[68],"imperceptible":[69],"perturbations":[70],"images.":[73],"However,":[74],"this":[76],"paper,":[77],"we":[78,182],"argue":[79],"that":[80],"directly":[81],"applying":[82],"adversary-based":[83],"methods":[84],"system":[89],"sub-optimal":[91],"due":[92],"'overlap":[95],"identity'":[96],"issue.":[97],"Specifically,":[98],"merely":[99],"pushing":[100],"image":[103,152],"away":[104,162],"from":[105,163,175],"original":[107,166],"label":[108],"would":[109],"probably":[110],"make":[111],"it":[112],"move":[113],"into":[114],"vicinity":[116],"other":[118,134,170,215],"identities.":[119],"This":[120],"leads":[121],"potential":[124],"risk":[125],"being":[127,176],"retrieved":[128,177],"when":[129],"querying":[130],"all":[132],"identities":[135],"exhaustively.":[136],"We":[137],"thus":[138],"propose":[139,184],"a":[140,195],"novel":[141,196],"preemptive-Protection":[142],"(PRIDE)":[145],"method.":[146],"By":[147],"explicitly":[148],"constraining":[149],"an":[154],"isolated":[155],"location,":[156],"far":[161],"neither":[164],"nor":[168],"any":[169],"identities,":[171],"which":[172],"protects":[173],"him":[174],"queries.":[180],"Moreover,":[181],"further":[183],"two":[185],"crucial":[186],"attack":[187,223],"scenarios":[188],"(Random":[189],"Attack":[190],"Order":[192],"Attack)":[193],"Success":[197],"Protection":[198],"Rate":[199],"(SPR)":[200],"metric":[201],"quantify":[203],"protection":[205],"ability.":[206],"Experiments":[207],"show":[208],"consistent":[209],"outperformance":[210],"our":[212],"method":[213],"over":[214],"baselines":[216],"different":[218],"models,":[220],"datasets":[221],"scenarios.":[224]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":3}],"updated_date":"2026-03-12T08:34:05.389933","created_date":"2025-10-10T00:00:00"}
