1. Ye, M. et al., Deep learning for person re-identification: A survey and outlook, IEEE Trans. Pattern Anal. Mach. Intell., 2021, vol. 44, no. 6, pp. 2872–2893.
2. Arlazarov, V.V., Andreeva, E.I., Bulatov, K.B., Nikolaev, D.P., Petrova, O.O., Savelev B.I., and Slavin, O.A., Document image analysis and recognition: A survey, Komput. Optika, 2022, vol. 46, no. 4, pp. 567–589.
3. Yang, B. et al., Edge intelligence for autonomous driving in 6G wireless system: Design challenges and solutions, IEEE Wireless Commun., 2021, vol. 28, no. 2, pp. 40–47.
4. Gu, T., Dolan-Gavitt, B., and Garg, S., Badnets: Identifying vulnerabilities in the machine learning model supply chain, arXiv:1708.06733, 2017.
5. Fredrikson, M., Jha, S., and Ristenpart, T., Model inversion attacks that exploit confidence information and basic countermeasures, Proc. of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015, pp. 1322–1333.