Cross Domain Person Re-Identification With Large Scale Attribute Annotated Datasets参考文献解读
文章目录
- Deep learning based person re-id
- Attribute-assisted person re-id
- Domain adaptation
- UDA
- UDA for person re-id
Deep learning based person re-id
First deep learning method in re-id
- [4] ‘‘DeepReID: Deep filter pairing neural network for person re-identification,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2014, pp. 152–159.
Cross neighborhood difference
- [5] ‘‘An improved deep learning architecture for person re-identification,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2015, pp. 3908–3916
- [6] L. Wu, C. Shen, and A. van den Hengel. (2016). ‘‘PersonNet: Person re- identification with deep convolutional neural networks.’’ [Online]. Available: https://arxiv.org/abs/1601.07255
Domain guided dropout
- [33] T.Xiao, H.Li,W.Ouyang,and X.Wang,‘‘Learning deep feature representations with domain guided dropout for person re-identification,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2016, pp. 1249–1258.
Spatial and temporal features-video
- [34] N.McLaughlin,J.M.delRincon,andP.Miller,‘‘Recurrent convolutional network for video-based person re-identification,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., 2016, pp. 1325–1334.
GAN produce unlabeled samples
- [35] Z.Zheng,L.Zheng,andY.Yang.(2017).‘‘Unlabeled samples generated by gan improve the person re-identification baseline in vitro.’’ [Online]. Available: https://arxiv.org/abs/1701.07717
Multi-scale to explore pedestrian clothes
- [36] X. Qian, Y. Fu, Y.-G. Jiang, T. Xiang, and X. Xue. (2017). ‘‘Multi- scale deep learning architectures for person re-identification.’’ [Online]. Available: https://arxiv.org/abs/1709.05165
human body region guided network
- [37] H. Zhao et al., ‘‘Spindle net: Person re-identification with human body region guided feature decomposition and fusion,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jul. 2017, pp. 1077–1085.
Pose-sensitive embedding
- [38] M. S. Sarfraz, A. Schumann, A. Eberle, and R. Stiefelhagen, ‘‘A pose- sensitive embedding for person re-identification with expanded cross neighborhood re-ranking,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Mar. 2018, pp. 420–429.
Attention-based mechanisms
[39] S. Li, S. Bak, P. Carr, and X. Wang, ‘‘Diversity regularized spatiotemporal attention for video-based person re-identification,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Mar. 2018, pp. 369–378.
[40] D. Chen, H. Li, T. Xiao, S. Yi, and X. Wang, ‘‘Video person re- identification with competitive snippet-similarity aggregation and co- attentive snippet embedding,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2018, pp. 1169–1178.
[41] J. Xu, R. Zhao, F. Zhu, H. Wang, and W. Ouyang, ‘‘Attention-aware compositional network for person re-identification,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2018, pp. 2119–2128.
[42] C. Song, Y. Huang, W. Ouyang, and L. Wang, ‘‘Mask-guided contrastive attention model for person re-identification,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2018, pp. 1179–1188.
Multi-level features to match person id
- [43] Y. Guo and N.-M. Cheung. (2018). ‘‘Efficient and deep person re-identification using multi-level similarity.’’ [Online]. Available: https://arxiv.org/abs/1803.11353
Kronecker-Product
*[44] Y. Shen, T. Xiao, H. Li, S. Yi, and X. Wang, ‘‘End-to-end deep kronecker- product matching for person re-identification,’’ in Proc. IEEE Conf. Com- put. Vis. Pattern Recognit., Jun. 2018, pp. 6886–6895.
Siamese network
[48] D. Yi, Z. Lei, and S. Z. Li. (2014). ‘‘Deep metric learning for practical per-son re-identification.’’ [Online]. Available: https://arxiv.org/abs/1407.4979
[49] R. R. Varior, M. Haloi, and G. Wang, ‘‘Gated siamese convolutional neural network architecture for human re-identification,’’ in Proc. Eur. Conf. Comput. Vis. Cham, Switzerland: Springer, 2016, pp. 791–808.
[50] D. Chung, K. Tahboub, and E. J. Delp, ‘‘A two stream siamese convolu-tional neural network for person re-identification,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Oct. 2017, pp. 1983–1991.
[51] Y. Wang, Z. Chen, F. Wu, and G. Wang, ‘‘Person re-identification with cascaded pairwise convolutions,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2018, pp. 1470–1478.
[52] M. Geng, Y. Wang, T. Xiang, and Y. Tian. (2016). ‘‘Deep transfer learning for person re-identification.’’ [Online]. Available: https://arxiv. org/abs/1611.05244
Triplet network
- [53] S.Ding,L.Lin,G.Wang,andH.Chao,‘‘Deep feature learning with relative distance comparison for person re-identification,’’ Pattern Recognit.,
vol. 48, no. 10, pp. 2993–3003, Oct. 2015. - [54] D. Cheng, Y. Gong, S. Zhou, J. Wang, and N. Zheng, ‘‘Person re-
identification by multi-channel parts-based CNN with improved triplet loss function,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2016, pp. 1335–1344.
Attribute-assisted person re-id
mid-level semantic attribute features替代low-level features
- [9] R. Layne, T. M. Hospedales, S. Gong, and Q. Mary, ‘‘Person re- identification by attributes,’’ in Proc. BMVC, 2012, vol. 2, no. 3, p. 8.
- [10] R. Layne, T. M. Hospedales, and S. Gong, ‘‘Attributes-based re- identification,’’ in Person Re-Identification. Cham, Switzerland: Springer, 2014, pp. 93–117.
learn the latent features as a complement to the semantic features
- [11] P. Peng, Y. Tian, T. Xiang, Y. Wang, and T. Huang, ‘‘Joint learning of semantic and latent attributes,’’ in Proc. Eur. Conf. Comput. Vis. Cham, Switzerland: Springer, 2016, pp. 336–353.
- [12] V. Sharmanska, N. Quadrianto, and C. H. Lampert, ‘‘Augmented attribute representations,’’ in Proc. Eur. Conf. Comput. Vis. Cham, Switzerland: Springer, 2012, pp. 242–255.
others
- [55] A. Li, L. Liu, K. Wang, S. Liu, and S. Yan, ‘‘Clothing attributes assisted person re-identification,’’ IEEE Trans. Circuits Syst. Video Technol., vol. 25, no. 5, pp. 869–878, May 2015.
- [56] C. Su, S. Zhang, J. Xing, W. Gao, and Q. Tian. (2016). ‘‘Deep attributes driven multi-camera person re-identification.’’ [Online]. Avail- able: https://arxiv.org/abs/1605.03259
- [57] Y.Lin,L.Zheng,Z.Zheng,Y.Wu,andY.Yang.(2017).‘‘Improving person re-identification by attribute and identity learning.’’ [Online]. Available: https://arxiv.org/abs/1703.07220
Domain adaptation
UDA
correlation alignment to match the mean and covariance of S and T distribution
- [58] B. Sun, J. Feng, and K. Saenko, ‘‘Return of frustratingly easy domain adaptation,’’ in Proc. AAAI, 2016, vol. 6, no. 7, p. 8.
domain adaptation ranking SVM
[59] A.J.Ma,J.Li,P.C.Yuen,andP.Li,‘‘Cross-domain person re-identification using domain adaptation ranking SVMs,’’ IEEE Trans. Image Process., vol. 24, no. 5, pp. 1599–1613, May 2015.
Maximum Mean Discrepancy (MMD)
- [60] A. Gretton, K. M. Borgwardt, M. J. Rasch, B. Schölkopf, and A. Smola, ‘‘A kernel two-sample test,’’ J. Mach. Learn. Res., vol. 13, pp. 723–773, Mar. 2012.
adversarial methods to transform pixels
- [61] K. Bousmalis, N. Silberman, D. Dohan, D. Erhan, and D. Krishnan, ‘‘Unsupervised pixel-level domain adaptation with generative adversarial networks,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR), Jul. 2017, vol. 1, no. 2, pp. 1–7.
- [62] J. Hoffman et al. (2017). ‘‘Cycada: Cycle-consistent adversarial domain adaptation.’’ [Online]. Available: https://arxiv.org/abs/1711.03213
UDA for person re-id
- [63] W.Deng,L.Zheng,Q.Ye,G.Kang,Y.Yang,andJ.Jiao,‘‘Image-image domain adaptation with preserved self-similarity and domain-dissimilarity for person reidentification,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR), Jul. 2018, vol. 1, no. 2, pp. 1–6.
- [64] L. Wei, S. Zhang, W. Gao, and Q. Tian, ‘‘Person transfer gan to bridge domain gap for person re-identification,’’ in Proc. CVPR, Jun. 2018, pp. 79–88.
- [65] Z.Zhong,L.Zheng,Z.Zheng,S.Li,andY.Yang,‘‘Camera style adaptation for person re-identification,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jan. 2018, pp. 5157–5166.
- [66] J. Lv, W. Chen, Q. Li, and C. Yang, ‘‘Unsupervised cross-dataset person re-identification by transfer learning of spatial-temporal patterns,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Mar. 2018, pp. 7948–7956.
Cross Domain Person Re-Identification With Large Scale Attribute Annotated Datasets参考文献解读相关推荐
- 【SFace】《SFace: An Efficient Network for Face Detection in Large Scale Variations》
arXiv-2018 文章目录 1 Background and Motivation 2 Advantages / Contributions 3 Method 3.1 Feature Pyrami ...
- Cross Domain Knowledge Transfer for Person Re-identification笔记
Cross Domain Knowledge Transfer for Person Re-identification笔记 1 介绍 2 相关工作 3 方法 3.1 特征提取的ResNet 3.2 特 ...
- 【多标签文本分类】Large Scale Multi-label Text Classification with Semantic Word Vectors
·阅读摘要: 本文提出了利用词向量+CNN/词向量+GRU来解决大规模数据下的多标签文本分类问题. [1] Large Scale Multi-label Text Classificatio ...
- 关于ajax跨域请求(cross Domain)
Cross Domain AJAX主要就是A.com网站的页面发出一个XMLHttpRequest,这个Request的url是B.com,这样的请求是被禁止的,浏览器处于安全考虑不允许进行跨域访问, ...
- 添加本地图层出现要求cross domain policy的错误
错误描述: A security exception occured while trying to connect to the REST endpoint. Make sure you have ...
- Machine Learning week 10 quiz: Large Scale Machine Learning
Large Scale Machine Learning 5 试题 1. Suppose you are training a logistic regression classifier using ...
- Paper之BigGAN:ICLR 2019最新论文《LARGE SCALE GAN TRAINING FOR HIGH FIDELITY NATURAL IMAGE SYNTHESIS》(未完待续)
Paper之BigGAN:ICLR 2019最新论文<LARGE SCALE GAN TRAINING FOR HIGH FIDELITY NATURAL IMAGE SYNTHESIS> ...
- 【原】Coursera—Andrew Ng机器学习—课程笔记 Lecture 17—Large Scale Machine Learning 大规模机器学习...
Lecture17 Large Scale Machine Learning大规模机器学习 17.1 大型数据集的学习 Learning With Large Datasets 如果有一个低方差的模型 ...
- Introducing DataFrames in Apache Spark for Large Scale Data Science(中英双语)
文章标题 Introducing DataFrames in Apache Spark for Large Scale Data Science 一个用于大规模数据科学的API--DataFrame ...
- Large scale GAN training for high fidelity natural image synthesis解读
<Large scale GANtraining for high fidelity natural image synthesis>这篇文章对训练大规模生成对抗网络进行了实验和理论分析, ...
最新文章
- Spring Boot零散知识总结
- python pandas csv读取_如何用 pandas 读取 csv 和 Excel 数据
- Ball Dropping
- wps for linux alpha 15 语言包,WPS Office for Linux Alpah 7发布
- 排序算法理解总结篇——冒泡排序、选择排序、插入排序、希尔排序、归并排序、堆排序、计数排序、基数排序、桶排序
- Python Base64模块的使用
- win10开移动热点让手机使用上网
- 难得清醒好文:年轻人你活着不是为了看K线——李小鹏
- css分辨率乱了,css布局:屏幕分辨率问题
- 解决QQ语音通话后耳机失效的问题
- Gambler's Ruin(赌徒破产问题 概率论)
- 菜鸟笔记-微信分享突然失效的解决
- C++实现基于区块链的物流信息存储系统
- 求推荐一款带日历的电脑桌面记事便签
- 如何设计复杂多变的java清分系统之一
- [内附完整源码和文档] 基于WEB的仓库管理系统的设计与实现
- 国标GB28181 SRS安装配置
- 奇异值分解——matlab中svd函数用法总结
- LSA算法——潜在语义分析概率潜在语义分析
- linux系统在云骑士上能下载吗,云骑士离线重装系统教程
热门文章
- 《工业控制系统信息安全防护指南》实施建议 (上)
- 视频编解码(一):ffmpeg编码H.264帧类型判断
- 民航产业发展趋势及对策建议(2021-10-21)
- No5.String类的常用方法
- 个人申请美国B1/B2商旅签证的完整流程
- Can't connect to MySQL server on 'xxx.xxx.xxx.xxx' (10061),错误代码2003
- 如何完整删除Windows.old(详细教程)
- 实现京东首页的轮播广告效果,包含三个以上产品广告
- linux权限管理的设计,Linux权限管理漫谈之用户切换
- 富贵竹叶子发黄怎么办?