文章目录

  • Deep learning based person re-id
  • Attribute-assisted person re-id
  • Domain adaptation
    • UDA
    • UDA for person re-id

Deep learning based person re-id

First deep learning method in re-id

  • [4] ‘‘DeepReID: Deep filter pairing neural network for person re-identification,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2014, pp. 152–159.

Cross neighborhood difference

  • [5] ‘‘An improved deep learning architecture for person re-identification,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2015, pp. 3908–3916
  • [6] L. Wu, C. Shen, and A. van den Hengel. (2016). ‘‘PersonNet: Person re- identification with deep convolutional neural networks.’’ [Online]. Available: https://arxiv.org/abs/1601.07255

Domain guided dropout

  • [33] T.Xiao, H.Li,W.Ouyang,and X.Wang,‘‘Learning deep feature representations with domain guided dropout for person re-identification,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2016, pp. 1249–1258.

Spatial and temporal features-video

  • [34] N.McLaughlin,J.M.delRincon,andP.Miller,‘‘Recurrent convolutional network for video-based person re-identification,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., 2016, pp. 1325–1334.

GAN produce unlabeled samples

  • [35] Z.Zheng,L.Zheng,andY.Yang.(2017).‘‘Unlabeled samples generated by gan improve the person re-identification baseline in vitro.’’ [Online]. Available: https://arxiv.org/abs/1701.07717

Multi-scale to explore pedestrian clothes

  • [36] X. Qian, Y. Fu, Y.-G. Jiang, T. Xiang, and X. Xue. (2017). ‘‘Multi- scale deep learning architectures for person re-identification.’’ [Online]. Available: https://arxiv.org/abs/1709.05165

human body region guided network

  • [37] H. Zhao et al., ‘‘Spindle net: Person re-identification with human body region guided feature decomposition and fusion,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jul. 2017, pp. 1077–1085.

Pose-sensitive embedding

  • [38] M. S. Sarfraz, A. Schumann, A. Eberle, and R. Stiefelhagen, ‘‘A pose- sensitive embedding for person re-identification with expanded cross neighborhood re-ranking,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Mar. 2018, pp. 420–429.

Attention-based mechanisms

  • [39] S. Li, S. Bak, P. Carr, and X. Wang, ‘‘Diversity regularized spatiotemporal attention for video-based person re-identification,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Mar. 2018, pp. 369–378.

  • [40] D. Chen, H. Li, T. Xiao, S. Yi, and X. Wang, ‘‘Video person re- identification with competitive snippet-similarity aggregation and co- attentive snippet embedding,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2018, pp. 1169–1178.

  • [41] J. Xu, R. Zhao, F. Zhu, H. Wang, and W. Ouyang, ‘‘Attention-aware compositional network for person re-identification,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2018, pp. 2119–2128.

  • [42] C. Song, Y. Huang, W. Ouyang, and L. Wang, ‘‘Mask-guided contrastive attention model for person re-identification,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2018, pp. 1179–1188.

Multi-level features to match person id

  • [43] Y. Guo and N.-M. Cheung. (2018). ‘‘Efficient and deep person re-identification using multi-level similarity.’’ [Online]. Available: https://arxiv.org/abs/1803.11353

Kronecker-Product
*[44] Y. Shen, T. Xiao, H. Li, S. Yi, and X. Wang, ‘‘End-to-end deep kronecker- product matching for person re-identification,’’ in Proc. IEEE Conf. Com- put. Vis. Pattern Recognit., Jun. 2018, pp. 6886–6895.

Siamese network

  • [48] D. Yi, Z. Lei, and S. Z. Li. (2014). ‘‘Deep metric learning for practical per-son re-identification.’’ [Online]. Available: https://arxiv.org/abs/1407.4979

  • [49] R. R. Varior, M. Haloi, and G. Wang, ‘‘Gated siamese convolutional neural network architecture for human re-identification,’’ in Proc. Eur. Conf. Comput. Vis. Cham, Switzerland: Springer, 2016, pp. 791–808.

  • [50] D. Chung, K. Tahboub, and E. J. Delp, ‘‘A two stream siamese convolu-tional neural network for person re-identification,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Oct. 2017, pp. 1983–1991.

  • [51] Y. Wang, Z. Chen, F. Wu, and G. Wang, ‘‘Person re-identification with cascaded pairwise convolutions,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2018, pp. 1470–1478.

  • [52] M. Geng, Y. Wang, T. Xiang, and Y. Tian. (2016). ‘‘Deep transfer learning for person re-identification.’’ [Online]. Available: https://arxiv. org/abs/1611.05244

Triplet network

  • [53] S.Ding,L.Lin,G.Wang,andH.Chao,‘‘Deep feature learning with relative distance comparison for person re-identification,’’ Pattern Recognit.,
    vol. 48, no. 10, pp. 2993–3003, Oct. 2015.
  • [54] D. Cheng, Y. Gong, S. Zhou, J. Wang, and N. Zheng, ‘‘Person re-
    identification by multi-channel parts-based CNN with improved triplet loss function,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2016, pp. 1335–1344.

Attribute-assisted person re-id

mid-level semantic attribute features替代low-level features

  • [9] R. Layne, T. M. Hospedales, S. Gong, and Q. Mary, ‘‘Person re- identification by attributes,’’ in Proc. BMVC, 2012, vol. 2, no. 3, p. 8.
  • [10] R. Layne, T. M. Hospedales, and S. Gong, ‘‘Attributes-based re- identification,’’ in Person Re-Identification. Cham, Switzerland: Springer, 2014, pp. 93–117.

learn the latent features as a complement to the semantic features

  • [11] P. Peng, Y. Tian, T. Xiang, Y. Wang, and T. Huang, ‘‘Joint learning of semantic and latent attributes,’’ in Proc. Eur. Conf. Comput. Vis. Cham, Switzerland: Springer, 2016, pp. 336–353.
  • [12] V. Sharmanska, N. Quadrianto, and C. H. Lampert, ‘‘Augmented attribute representations,’’ in Proc. Eur. Conf. Comput. Vis. Cham, Switzerland: Springer, 2012, pp. 242–255.

others

  • [55] A. Li, L. Liu, K. Wang, S. Liu, and S. Yan, ‘‘Clothing attributes assisted person re-identification,’’ IEEE Trans. Circuits Syst. Video Technol., vol. 25, no. 5, pp. 869–878, May 2015.
  • [56] C. Su, S. Zhang, J. Xing, W. Gao, and Q. Tian. (2016). ‘‘Deep attributes driven multi-camera person re-identification.’’ [Online]. Avail- able: https://arxiv.org/abs/1605.03259
  • [57] Y.Lin,L.Zheng,Z.Zheng,Y.Wu,andY.Yang.(2017).‘‘Improving person re-identification by attribute and identity learning.’’ [Online]. Available: https://arxiv.org/abs/1703.07220

Domain adaptation

UDA

correlation alignment to match the mean and covariance of S and T distribution

  • [58] B. Sun, J. Feng, and K. Saenko, ‘‘Return of frustratingly easy domain adaptation,’’ in Proc. AAAI, 2016, vol. 6, no. 7, p. 8.

domain adaptation ranking SVM
[59] A.J.Ma,J.Li,P.C.Yuen,andP.Li,‘‘Cross-domain person re-identification using domain adaptation ranking SVMs,’’ IEEE Trans. Image Process., vol. 24, no. 5, pp. 1599–1613, May 2015.

Maximum Mean Discrepancy (MMD)

  • [60] A. Gretton, K. M. Borgwardt, M. J. Rasch, B. Schölkopf, and A. Smola, ‘‘A kernel two-sample test,’’ J. Mach. Learn. Res., vol. 13, pp. 723–773, Mar. 2012.

adversarial methods to transform pixels

  • [61] K. Bousmalis, N. Silberman, D. Dohan, D. Erhan, and D. Krishnan, ‘‘Unsupervised pixel-level domain adaptation with generative adversarial networks,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR), Jul. 2017, vol. 1, no. 2, pp. 1–7.
  • [62] J. Hoffman et al. (2017). ‘‘Cycada: Cycle-consistent adversarial domain adaptation.’’ [Online]. Available: https://arxiv.org/abs/1711.03213

UDA for person re-id

  • [63] W.Deng,L.Zheng,Q.Ye,G.Kang,Y.Yang,andJ.Jiao,‘‘Image-image domain adaptation with preserved self-similarity and domain-dissimilarity for person reidentification,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR), Jul. 2018, vol. 1, no. 2, pp. 1–6.
  • [64] L. Wei, S. Zhang, W. Gao, and Q. Tian, ‘‘Person transfer gan to bridge domain gap for person re-identification,’’ in Proc. CVPR, Jun. 2018, pp. 79–88.
  • [65] Z.Zhong,L.Zheng,Z.Zheng,S.Li,andY.Yang,‘‘Camera style adaptation for person re-identification,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jan. 2018, pp. 5157–5166.
  • [66] J. Lv, W. Chen, Q. Li, and C. Yang, ‘‘Unsupervised cross-dataset person re-identification by transfer learning of spatial-temporal patterns,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Mar. 2018, pp. 7948–7956.

Cross Domain Person Re-Identification With Large Scale Attribute Annotated Datasets参考文献解读相关推荐

  1. 【SFace】《SFace: An Efficient Network for Face Detection in Large Scale Variations》

    arXiv-2018 文章目录 1 Background and Motivation 2 Advantages / Contributions 3 Method 3.1 Feature Pyrami ...

  2. Cross Domain Knowledge Transfer for Person Re-identification笔记

    Cross Domain Knowledge Transfer for Person Re-identification笔记 1 介绍 2 相关工作 3 方法 3.1 特征提取的ResNet 3.2 特 ...

  3. 【多标签文本分类】Large Scale Multi-label Text Classification with Semantic Word Vectors

    ·阅读摘要:   本文提出了利用词向量+CNN/词向量+GRU来解决大规模数据下的多标签文本分类问题.   [1] Large Scale Multi-label Text Classificatio ...

  4. 关于ajax跨域请求(cross Domain)

    Cross Domain AJAX主要就是A.com网站的页面发出一个XMLHttpRequest,这个Request的url是B.com,这样的请求是被禁止的,浏览器处于安全考虑不允许进行跨域访问, ...

  5. 添加本地图层出现要求cross domain policy的错误

    错误描述: A security exception occured while trying to connect to the REST endpoint. Make sure you have ...

  6. Machine Learning week 10 quiz: Large Scale Machine Learning

    Large Scale Machine Learning 5 试题 1. Suppose you are training a logistic regression classifier using ...

  7. Paper之BigGAN:ICLR 2019最新论文《LARGE SCALE GAN TRAINING FOR HIGH FIDELITY NATURAL IMAGE SYNTHESIS》(未完待续)

    Paper之BigGAN:ICLR 2019最新论文<LARGE SCALE GAN TRAINING FOR HIGH FIDELITY NATURAL IMAGE SYNTHESIS> ...

  8. 【原】Coursera—Andrew Ng机器学习—课程笔记 Lecture 17—Large Scale Machine Learning 大规模机器学习...

    Lecture17 Large Scale Machine Learning大规模机器学习 17.1 大型数据集的学习 Learning With Large Datasets 如果有一个低方差的模型 ...

  9. Introducing DataFrames in Apache Spark for Large Scale Data Science(中英双语)

    文章标题 Introducing DataFrames in Apache Spark for Large Scale Data Science 一个用于大规模数据科学的API--DataFrame ...

  10. Large scale GAN training for high fidelity natural image synthesis解读

    <Large scale GANtraining for high fidelity natural image synthesis>这篇文章对训练大规模生成对抗网络进行了实验和理论分析, ...

最新文章

  1. Spring Boot零散知识总结
  2. python pandas csv读取_如何用 pandas 读取 csv 和 Excel 数据
  3. Ball Dropping
  4. wps for linux alpha 15 语言包,WPS Office for Linux Alpah 7发布
  5. 排序算法理解总结篇——冒泡排序、选择排序、插入排序、希尔排序、归并排序、堆排序、计数排序、基数排序、桶排序
  6. Python Base64模块的使用
  7. win10开移动热点让手机使用上网
  8. 难得清醒好文:年轻人你活着不是为了看K线——李小鹏
  9. css分辨率乱了,css布局:屏幕分辨率问题
  10. 解决QQ语音通话后耳机失效的问题
  11. Gambler's Ruin(赌徒破产问题 概率论)
  12. 菜鸟笔记-微信分享突然失效的解决
  13. C++实现基于区块链的物流信息存储系统
  14. 求推荐一款带日历的电脑桌面记事便签
  15. 如何设计复杂多变的java清分系统之一
  16. [内附完整源码和文档] 基于WEB的仓库管理系统的设计与实现
  17. 国标GB28181 SRS安装配置
  18. 奇异值分解——matlab中svd函数用法总结
  19. LSA算法——潜在语义分析概率潜在语义分析
  20. linux系统在云骑士上能下载吗,云骑士离线重装系统教程

热门文章

  1. 《工业控制系统信息安全防护指南》实施建议 (上)
  2. 视频编解码(一):ffmpeg编码H.264帧类型判断
  3. 民航产业发展趋势及对策建议(2021-10-21)
  4. No5.String类的常用方法
  5. 个人申请美国B1/B2商旅签证的完整流程
  6. Can't connect to MySQL server on 'xxx.xxx.xxx.xxx' (10061),错误代码2003
  7. 如何完整删除Windows.old(详细教程)
  8. 实现京东首页的轮播广告效果,包含三个以上产品广告
  9. linux权限管理的设计,Linux权限管理漫谈之用户切换
  10. 富贵竹叶子发黄怎么办?