Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Re-ID-leak: Membership Inference Attacks Against Person Re-identification
by
Dou, Shuguang
, Li, Dongsheng
, Zhao, Cairong
, Miao, Duoqian
, Jiang, Xinyang
, Gao, Junyao
in
Algorithms
/ Datasets
/ Empirical analysis
/ Identification
/ Inference
/ Memberships
/ Modules
/ Paradigms
/ Semantics
/ Similarity
2024
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Re-ID-leak: Membership Inference Attacks Against Person Re-identification
by
Dou, Shuguang
, Li, Dongsheng
, Zhao, Cairong
, Miao, Duoqian
, Jiang, Xinyang
, Gao, Junyao
in
Algorithms
/ Datasets
/ Empirical analysis
/ Identification
/ Inference
/ Memberships
/ Modules
/ Paradigms
/ Semantics
/ Similarity
2024
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Re-ID-leak: Membership Inference Attacks Against Person Re-identification
by
Dou, Shuguang
, Li, Dongsheng
, Zhao, Cairong
, Miao, Duoqian
, Jiang, Xinyang
, Gao, Junyao
in
Algorithms
/ Datasets
/ Empirical analysis
/ Identification
/ Inference
/ Memberships
/ Modules
/ Paradigms
/ Semantics
/ Similarity
2024
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Re-ID-leak: Membership Inference Attacks Against Person Re-identification
Journal Article
Re-ID-leak: Membership Inference Attacks Against Person Re-identification
2024
Request Book From Autostore
and Choose the Collection Method
Overview
Person re-identification (Re-ID) has rapidly advanced due to its widespread real-world applications. It poses a significant risk of exposing private data from its training dataset. This paper aims to quantify this risk by conducting a membership inference (MI) attack. Most existing MI attack methods focus on classification models, while Re-ID follows a distinct paradigm for training and inference. Re-ID is a fine-grained recognition task that involves complex feature embedding, and the model outputs commonly used by existing MI algorithms, such as logits and losses, are inaccessible during inference. Since Re-ID models the relative relationship between image pairs rather than individual semantics, we conduct a formal and empirical analysis that demonstrates that the distribution shift of the inter-sample similarity between the training and test sets is a crucial factor for membership inference and exists in most Re-ID datasets and models. Thus, we propose a novel MI attack method based on the distribution of inter-sample similarity, which involves sampling a set of anchor images to represent the similarity distribution that is conditioned on a target image. Next, we consider two attack scenarios based on information that the attacker has. In the “one-to-one” scenario, where the attacker has access to the target Re-ID model and dataset, we propose an anchor selector module to select anchors accurately representing the similarity distribution. Conversely, in the “one-to-any” scenario, which resembles real-world applications where the attacker has no access to the target Re-ID model and dataset, leading to the domain-shift problem, we propose two alignment strategies. Moreover, we introduce the patch-attention module as a replacement for the anchor selector. Experimental evaluations demonstrate the effectiveness of our proposed approaches in Re-ID tasks in both attack scenarios.
This website uses cookies to ensure you get the best experience on our website.