5 CONCLUSION
In this work, we proposed the combination of two ad-
versarial attacks against Re-ID systems. As far as we
know, one of the attacks, the P-FGSM, was never im-
plemented before for this kind of system. More than
that, we used Dropout during the inference as a coun-
termeasure for the considered attacks.
We used three datasets and two models with the
best results and among the most used ones for the ex-
periments. Our tests aimed to increase the obstacles
even further for Re-ID with the combination of the
attack methods. These tests strengthen the decrease
in the classification results in some cases. However,
the proposed countermeasure did not perform well
against the attacks.
There were limitations related to the accessible
data and unexpected results considering the already
available attack implementations. However, we pre-
tend to continue exploring this problem concerning
adversarial attacks and Re-ID systems. We also hope
that combining different attack and defense methods
can be an approach for our future work and other
works.
ACKNOWLEDGEMENT
The Coordenac¸
˜
ao de Aperfeic¸oamento de Pessoal de
N
´
ıvel Superior (CAPES), Conselho Nacional de De-
senvolvimento Cient
´
ıfico e Tecnol
´
ogico (CNPq), and
PrimeUp Soluc¸
˜
oes de TI LTDA financed part of this
work.
REFERENCES
Bouniot, Q., Audigier, R., and Loesch, A. (2020). Vul-
nerability of person re-identification models to metric
adversarial attacks. In Proceedings of the IEEE/CVF
Conference on Computer Vision and Pattern Recogni-
tion Workshops, pages 794–795.
Chen, K., Zhu, H., Yan, L., and Wang, J. (2020). A survey
on adversarial examples in deep learning. Journal on
Big Data, 2(2):71.
Ding, S., Lin, L., Wang, G., and Chao, H. (2015). Deep
feature learning with relative distance comparison
for person re-identification. Pattern Recognition,
48(10):2993–3003.
Galanakis, G., Zabulis, X., and Argyros, A. A. (2019). Nov-
elty detection for person re-identification in an open
world. In VISIGRAPP (5: VISAPP), pages 401–411.
Goodfellow, I. J., Shlens, J., and Szegedy, C. (2014). Ex-
plaining and harnessing adversarial examples. arXiv
preprint arXiv:1412.6572.
He, K., Zhang, X., Ren, S., and Sun, J. (2016). Deep resid-
ual learning for image recognition. In Proceedings of
the IEEE conference on computer vision and pattern
recognition, pages 770–778.
Hermans, A., Beyer, L., and Leibe, B. (2017). In defense
of the triplet loss for person re-identification. arXiv
preprint arXiv:1703.07737.
Islam, K. (2020). Person search: New paradigm of per-
son re-identification: A survey and outlook of recent
works. Image and Vision Computing, 101:103970.
Jang, E., Gu, S., and Poole, B. (2016). Categorical repa-
rameterization with gumbel-softmax. arXiv preprint
arXiv:1611.01144.
Khan, P. W., Byun, Y.-C., and Park, N. (2020). A data ver-
ification system for cctv surveillance cameras using
blockchain technology in smart cities. Electronics,
9(3):484.
Kitchin, R. and Dodge, M. (2019). The (in) security of
smart cities: Vulnerabilities, risks, mitigation, and
prevention. Journal of Urban Technology, 26(2):47–
65.
Konidaris, F., Tagaris, T., Sdraka, M., and Stafylopatis, A.
(2019). Generative adversarial networks as an ad-
vanced data augmentation technique for mri data. In
VISIGRAPP (5: VISAPP), pages 48–59.
Krizhevsky, A., Hinton, G., et al. (2009). Learning mul-
tiple layers of features from tiny images. Master’s
thesis, Department of Computer Science, University
of Toronto.
Kurnianggoro, L. and Jo, K.-H. (2017). Identification of
pedestrian attributes using deep network. In IECON
2017-43rd Annual Conference of the IEEE Industrial
Electronics Society, pages 8503–8507. IEEE.
Li, C. Y., Shamsabadi, A. S., Sanchez-Matilla, R., Mazzon,
R., and Cavallaro, A. (2019). Scene privacy protec-
tion. In ICASSP 2019-2019 IEEE International Con-
ference on Acoustics, Speech and Signal Processing
(ICASSP), pages 2502–2506. IEEE.
Li, W., Zhao, R., Xiao, T., and Wang, X. (2014). Deep-
reid: Deep filter pairing neural network for person
re-identification. In Proceedings of the IEEE con-
ference on computer vision and pattern recognition,
pages 152–159.
Luo, H., Gu, Y., Liao, X., Lai, S., and Jiang, W. (2019).
Bag of tricks and a strong baseline for deep person re-
identification. In Proceedings of the IEEE/CVF Con-
ference on Computer Vision and Pattern Recognition
Workshops, pages 0–0.
Ristani, E., Solera, F., Zou, R., Cucchiara, R., and Tomasi,
C. (2016). Performance measures and a data set for
multi-target, multi-camera tracking. In European con-
ference on computer vision, pages 17–35. Springer.
Schroff, F., Kalenichenko, D., and Philbin, J. (2015).
Facenet: A unified embedding for face recognition
and clustering. In Proceedings of the IEEE conference
on computer vision and pattern recognition, pages
815–823.
Shah, J. H., Lin, M., and Chen, Z. (2016). Multi-camera
handoff for person re-identification. Neurocomputing,
191:238–248.
Combining Two Adversarial Attacks Against Person Re-Identification Systems
443