{"id":"https://openalex.org/W7138246764","doi":"https://doi.org/10.1609/aaai.v40i16.38392","title":"Debiased Dual-Invariant Defense for Adversarially Robust Person Re-Identification","display_name":"Debiased Dual-Invariant Defense for Adversarially Robust Person Re-Identification","publication_year":2026,"publication_date":"2026-03-14","ids":{"openalex":"https://openalex.org/W7138246764","doi":"https://doi.org/10.1609/aaai.v40i16.38392"},"language":null,"primary_location":{"id":"doi:10.1609/aaai.v40i16.38392","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i16.38392","pdf_url":"https://ojs.aaai.org/index.php/AAAI/article/download/38392/42354","source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://ojs.aaai.org/index.php/AAAI/article/download/38392/42354","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5129664557","display_name":"Yuhang Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuhang Zhou","raw_affiliation_strings":["Harbin Institute of Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology, Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129641562","display_name":"Yanxiang Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanxiang Zhao","raw_affiliation_strings":["Harbin Institute of Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology, Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129667453","display_name":"Zhongyun Hua","orcid":null},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhongyun Hua","raw_affiliation_strings":["Harbin Institute of Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology, Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012752139","display_name":"Zhipu Liu","orcid":"https://orcid.org/0000-0002-4014-1233"},"institutions":[{"id":"https://openalex.org/I50632499","display_name":"Chongqing University of Technology","ror":"https://ror.org/04vgbd477","country_code":"CN","type":"education","lineage":["https://openalex.org/I50632499"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhipu Liu","raw_affiliation_strings":["Chongqing University of Technology, China"],"affiliations":[{"raw_affiliation_string":"Chongqing University of Technology, China","institution_ids":["https://openalex.org/I50632499"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040547391","display_name":"Zhaoquan Gu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhaoquan Gu","raw_affiliation_strings":["Harbin Institute of Technology, Shenzhen, China\nPeng Cheng Laboratory, China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology, Shenzhen, China\nPeng Cheng Laboratory, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129687500","display_name":"Qing Liao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qing Liao","raw_affiliation_strings":["Harbin Institute of Technology, Shenzhen, China\nPeng Cheng Laboratory, China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology, Shenzhen, China\nPeng Cheng Laboratory, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5129648929","display_name":"Leo Yu Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I11701301","display_name":"Griffith University","ror":"https://ror.org/02sc3r913","country_code":"AU","type":"education","lineage":["https://openalex.org/I11701301"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Leo Yu Zhang","raw_affiliation_strings":["Griffith University, Australia"],"affiliations":[{"raw_affiliation_string":"Griffith University, Australia","institution_ids":["https://openalex.org/I11701301"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5129664557"],"corresponding_institution_ids":["https://openalex.org/I204983213"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.45824411,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"40","issue":"16","first_page":"13835","last_page":"13843"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.5217999815940857,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.5217999815940857,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.12389999628067017,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.11309999972581863,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8812000155448914},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5983999967575073},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.45739999413490295},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.42309999465942383},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.41449999809265137},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.41269999742507935},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.3903000056743622}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8812000155448914},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7361999750137329},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6359999775886536},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5983999967575073},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5364999771118164},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.45739999413490295},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.42309999465942383},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.41449999809265137},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.41269999742507935},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.3903000056743622},{"id":"https://openalex.org/C2778029271","wikidata":"https://www.wikidata.org/wiki/Q5421931","display_name":"Extension (predicate logic)","level":2,"score":0.367000013589859},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.36079999804496765},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.319599986076355},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.31310001015663147},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3003000020980835},{"id":"https://openalex.org/C150921843","wikidata":"https://www.wikidata.org/wiki/Q1170431","display_name":"Resampling","level":2,"score":0.2953000068664551},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2565000057220459},{"id":"https://openalex.org/C2777113093","wikidata":"https://www.wikidata.org/wiki/Q221488","display_name":"Pedestrian","level":2,"score":0.25519999861717224}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1609/aaai.v40i16.38392","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i16.38392","pdf_url":"https://ojs.aaai.org/index.php/AAAI/article/download/38392/42354","source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1609/aaai.v40i16.38392","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i16.38392","pdf_url":"https://ojs.aaai.org/index.php/AAAI/article/download/38392/42354","source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5911647081375122,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7138246764.pdf","grobid_xml":"https://content.openalex.org/works/W7138246764.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Person":[0],"re-identification":[1],"(ReID)":[2],"is":[3],"a":[4,115,135,156],"fundamental":[5],"task":[6],"in":[7,97,145],"many":[8],"real-world":[9],"applications":[10],"such":[11,60],"as":[12,61],"pedestrian":[13,32],"trajectory":[14],"tracking.":[15],"However,":[16],"advanced":[17],"deep":[18],"learning-based":[19],"ReID":[20,63,74,99],"models":[21],"are":[22],"highly":[23],"susceptible":[24],"to":[25,31,56,76,167,185],"adversarial":[26,45,95,159],"attacks,":[27],"where":[28],"imperceptible":[29],"perturbations":[30],"images":[33],"can":[34],"cause":[35],"entirely":[36],"incorrect":[37],"predictions,":[38],"posing":[39],"significant":[40],"security":[41],"threats.":[42],"Although":[43],"numerous":[44],"defense":[46,96,118,152],"strategies":[47],"have":[48],"been":[49],"proposed":[50],"for":[51,72,188],"classification":[52],"tasks,":[53],"their":[54],"extension":[55,165],"metric":[57,158],"learning":[58],"tasks":[59],"person":[62,73,98],"remains":[64],"relatively":[65],"unexplored.":[66],"Moreover,":[67],"the":[68,78,92,126,149,169,174],"several":[69],"existing":[70,203],"defenses":[71],"fail":[75],"address":[77,111],"inherent":[79],"unique":[80],"challenges":[81,93],"of":[82,94,121,176],"adversarially":[83],"robust":[84],"ReID.":[85],"In":[86,125,148],"this":[87],"paper,":[88],"we":[89,113,130,154,179],"systematically":[90],"identify":[91],"into":[100],"two":[101,122],"key":[102],"issues:":[103],"model":[104,132],"bias":[105,133],"and":[106,143,192],"composite":[107],"generalization":[108],"requirements.":[109],"To":[110],"them,":[112],"propose":[114],"debiased":[116],"dual-invariant":[117],"framework":[119],"composed":[120],"main":[123],"phases.":[124],"data":[127,137],"balancing":[128],"phase,":[129,153],"mitigate":[131],"using":[134],"diffusion-model-based":[136],"resampling":[138],"strategy":[139],"that":[140,198],"promotes":[141],"fairness":[142],"diversity":[144],"training":[146,160],"data.":[147],"bi-adversarial":[150],"self-meta":[151,183],"introduce":[155,180],"novel":[157],"approach":[161],"incorporating":[162],"farthest":[163],"negative":[164],"softening":[166],"overcome":[168],"robustness":[170],"degradation":[171],"caused":[172],"by":[173],"absence":[175],"classifier.":[177],"Additionally,":[178],"an":[181],"adversarially-enhanced":[182],"mechanism":[184],"achieve":[186],"dual-generalization":[187],"both":[189],"unseen":[190,193],"identities":[191],"attack":[194],"types.":[195],"Experiments":[196],"demonstrate":[197],"our":[199],"method":[200],"significantly":[201],"outperforms":[202],"state-of-the-art":[204],"defenses.":[205]},"counts_by_year":[],"updated_date":"2026-03-20T20:47:17.329874","created_date":"2026-03-18T00:00:00"}
