2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) 2018
DOI: 10.1109/cvprw.2018.00054
|View full text |Cite
|
Sign up to set email alerts
|

Adaptation and Re-identification Network: An Unsupervised Deep Transfer Learning Approach to Person Re-identification

Abstract: Person re-identification (Re-ID) aims at recognizing the same person from images taken across different cameras. To address this task, one typically requires a large amount labeled data for training an effective Re-ID model, which might not be practical for real-world applications. To alleviate this limitation, we choose to exploit a sufficient amount of pre-existing labeled data from a different (auxiliary) dataset. By jointly considering such an auxiliary dataset and the dataset of interest (but without labe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
57
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 103 publications
(57 citation statements)
references
References 18 publications
0
57
0
Order By: Relevance
“…The idea of using a deep learning architecture for person re-identification stems from Siamese CNN with either two or three branches for pairwise verification loss [25] or triplet loss [26,27] respectively, by proposing new layers [1] or by fusing features from different body parts with a multi-scale CNN structure [2,3]. Another trend of using deep learning architecture is transfer learning [4,25,29], for when the distribution of the training data from the source domain is different from that of the target domain. The most common deep transfer learning strategy for re-identification [4] is to pre-train a base network on a large scale or combination of different datasets as source dataset, and transfer learned representation to the target dataset.…”
Section: Related Workmentioning
confidence: 99%
“…The idea of using a deep learning architecture for person re-identification stems from Siamese CNN with either two or three branches for pairwise verification loss [25] or triplet loss [26,27] respectively, by proposing new layers [1] or by fusing features from different body parts with a multi-scale CNN structure [2,3]. Another trend of using deep learning architecture is transfer learning [4,25,29], for when the distribution of the training data from the source domain is different from that of the target domain. The most common deep transfer learning strategy for re-identification [4] is to pre-train a base network on a large scale or combination of different datasets as source dataset, and transfer learned representation to the target dataset.…”
Section: Related Workmentioning
confidence: 99%
“…We compare our method with the state-of-the-art unsupervised Re-ID methods on Market-1501, DukeMTMC-reID and MSMT17 datasets. The compared methods include two handcrafted feature based methods: LOMO [10] and BoW [42], seven unsupervised domain adaptation methods without considering latent label information: TJ-AIDL [8], PTGAN [13], SPGAN [12], MMFA [48], HHL [33], ARN [49] and ECN [34] and five pseudo label estimation methods: CAMEL [14], PUL [15], UDAR [16], MAR [17] and SSG [18]. The results are shown in Table 1, Table 2 and Table 3, respectively.…”
Section: Comparison With State-of-the-art Methodsmentioning
confidence: 99%
“…Market-1501. In Table 1, we compare our proposed model with the use of Bag-of-Words (BoW) [58] for matching (i.e., no transfer), four unsupervised re-ID approaches, including UMDL [42], PUL [15], CAMEL [54] and TAUDL [29], and seven cross-dataset re-ID methods, including PTGAN [51], SPGAN [12], TJ-AIDL [49], MMFA [35], HHL [61], CFSM [3] and ARN [32]. From this table, we see that our model achieved very promising [12] and HHL [61], we note that our model is able to generate cross-domain images conditioned on various poses rather than few camera styles.…”
Section: Quantitative Comparisonsmentioning
confidence: 99%