{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:49:57Z","timestamp":1772642997308,"version":"3.50.1"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030352301","type":"print"},{"value":"9783030352318","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-35231-8_29","type":"book-chapter","created":{"date-parts":[[2019,11,16]],"date-time":"2019-11-16T00:30:38Z","timestamp":1573864238000},"page":"406-420","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Domain-Aware Unsupervised Cross-dataset Person Re-identification"],"prefix":"10.1007","author":[{"given":"Zhihui","family":"Li","sequence":"first","affiliation":[]},{"given":"Wenhe","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiaojun","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Lina","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Mahesh","family":"Prakash","sequence":"additional","affiliation":[]},{"given":"Huaxiang","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,15]]},"reference":[{"issue":"5\u20136","key":"29_CR1","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1007\/s00041-008-9045-x","volume":"14","author":"EJ Candes","year":"2008","unstructured":"Candes, E.J., Wakin, M.B., Boyd, S.P.: Enhancing sparsity by reweighted $$\\text{ ell }\\,\\, \\_1$$ minimization. J. Fourier Anal. Appl. 14(5\u20136), 877\u2013905 (2008)","journal-title":"J. Fourier Anal. Appl."},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"Chartrand, R., Yin, W.: Iteratively reweighted algorithms for compressive sensing. In: IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2008, pp. 3869\u20133872. IEEE (2008)","DOI":"10.1109\/ICASSP.2008.4518498"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Cheng, D.S., Cristani, M., Stoppa, M., Bazzani, L., Murino, V.: Custom pictorial structures for re-identification. In: BMVC (2011)","DOI":"10.5244\/C.25.68"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Farenzena, M., Bazzani, L., Perina, A., Murino, V., Cristani, M.: Person re-identification by symmetry-driven accumulation of local features. In: CVPR, pp. 2360\u20132367. IEEE (2010)","DOI":"10.1109\/CVPR.2010.5539926"},{"key":"29_CR5","unstructured":"Gray, D., Brennan, S., Tao, H.: Evaluating appearance models for recognition, reacquisition, and tracking. In: PETS, vol. 3 (2007)"},{"key":"29_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/978-3-642-37331-2_25","volume-title":"Computer Vision \u2013 ACCV 2012","author":"H Guo","year":"2013","unstructured":"Guo, H., Jiang, Z., Davis, L.S.: Discriminative dictionary learning with pairwise constraints. In: Lee, K.M., Matsushita, Y., Rehg, J.M., Hu, Z. (eds.) ACCV 2012. LNCS, vol. 7724, pp. 328\u2013342. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-37331-2_25"},{"key":"29_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-642-21227-7_9","volume-title":"Image Analysis","author":"M Hirzer","year":"2011","unstructured":"Hirzer, M., Beleznai, C., Roth, P.M., Bischof, H.: Person re-identification by descriptive and discriminative classification. In: Heyden, A., Kahl, F. (eds.) SCIA 2011. LNCS, vol. 6688, pp. 91\u2013102. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-21227-7_9"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Karanam, S., Li, Y., Radke, R.J.: Person re-identification with discriminatively trained viewpoint invariant dictionaries. In: ICCV, pp. 4516\u20134524 (2015)","DOI":"10.1109\/ICCV.2015.513"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Kodirov, E., Xiang, T., Fu, Z., Gong, S.: Person re-identification by unsupervised$$\\backslash $$$$\\text{ ell } \\_1$$ graph learning. In: ECCV. pp. 178\u2013195. Springer (2016)","DOI":"10.1007\/978-3-319-46448-0_11"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Kodirov, E., Xiang, T., Gong, S.: Dictionary learning with iterative laplacian regularisation for unsupervised person re-identification. In: BMVC, vol. 3, p. 8 (2015)","DOI":"10.5244\/C.29.44"},{"key":"29_CR11","unstructured":"Li, S., Shao, M., Fu, Y.: Cross-view projective dictionary learning for person re-identification. In: IJCAI, pp. 2155\u20132161 (2015)"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Li, W., Zhao, R., Xiao, T., Wang, X.: Deepreid: deep filter pairing neural network for person re-identification. In: CVPR (2014)","DOI":"10.1109\/CVPR.2014.27"},{"issue":"8","key":"29_CR13","doi-asserted-by":"publisher","first-page":"1629","DOI":"10.1109\/TPAMI.2014.2369055","volume":"37","author":"Giuseppe Lisanti","year":"2015","unstructured":"Lisanti, G., Masi, I., Bagdanov, A., Del Bimbo, A.: Person re-identification by iterative re-weighted sparse ranking. IEEE Trans. Pattern Anal. Mach. Intell. PP(99), 1 (2014). \nhttps:\/\/doi.org\/10.1109\/TPAMI.2014.2369055","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"8","key":"29_CR14","doi-asserted-by":"publisher","first-page":"1629","DOI":"10.1109\/TPAMI.2014.2369055","volume":"37","author":"G Lisanti","year":"2015","unstructured":"Lisanti, G., Masi, I., Bagdanov, A.D., Del Bimbo, A.: Person re-identification by iterative re-weighted sparse ranking. IEEE Trans. Pattern Anal. Mach. Intell. 37(8), 1629\u20131642 (2015)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"Lisanti, G., Masi, I., Del Bimbo, A.: Matching people across camera views using kernel canonical correlation analysis. In: Proceedings of the International Conference on Distributed Smart Cameras, p. 10. ACM (2014)","DOI":"10.1145\/2659021.2659036"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Liu, Y., Chen, W., Chen, Q., Wassell, I.: Support discrimination dictionary learning for image classification. In: ECCV. pp. 375\u2013390. Springer (2016)","DOI":"10.1007\/978-3-319-46475-6_24"},{"key":"29_CR17","doi-asserted-by":"crossref","unstructured":"Lv, J., Chen, W., Li, Q., Yang, C.: Unsupervised cross-dataset person re-identification by transfer learning of spatial-temporal patterns. arXiv preprint \narXiv:1803.07293\n\n (2018)","DOI":"10.1109\/CVPR.2018.00829"},{"issue":"5","key":"29_CR18","doi-asserted-by":"publisher","first-page":"1599","DOI":"10.1109\/TIP.2015.2395715","volume":"24","author":"AJ Ma","year":"2015","unstructured":"Ma, A.J., Li, J., Yuen, P.C., Li, P.: Cross-domain person reidentification using domain adaptation ranking SVMs. IEEE Trans. Image Process. 24(5), 1599\u20131613 (2015)","journal-title":"IEEE Trans. Image Process."},{"key":"29_CR19","doi-asserted-by":"crossref","unstructured":"Peng, P., et al.: Unsupervised cross-dataset transfer learning for person re-identification. In: CVPR, pp. 1306\u20131315 (2016)","DOI":"10.1109\/CVPR.2016.146"},{"issue":"8","key":"29_CR20","first-page":"1","volume":"40","author":"R Rubinstein","year":"2008","unstructured":"Rubinstein, R., Zibulevsky, M., Elad, M.: Efficient implementation of the K-SVD algorithm using batch orthogonal matching pursuit. Cs Technion 40(8), 1\u201315 (2008)","journal-title":"Cs Technion"},{"key":"29_CR21","doi-asserted-by":"crossref","unstructured":"Wang, H., Gong, S., Xiang, T.: Unsupervised learning of generative topic saliency for person re-identification. In: Proceedings of the British Machine Vision Conference. BMVA Press (2014)","DOI":"10.5244\/C.28.48"},{"key":"29_CR22","doi-asserted-by":"crossref","unstructured":"Wang, J., Zhu, X., Gong, S., Li, W.: Transferable joint attribute-identity deep learning for unsupervised person re-identification. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2275\u20132284 (2018)","DOI":"10.1109\/CVPR.2018.00242"},{"issue":"2","key":"29_CR23","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1109\/JSTSP.2010.2042413","volume":"4","author":"D Wipf","year":"2010","unstructured":"Wipf, D., Nagarajan, S.: Iterative reweighted $$\\ell _1$$ and $$\\ell _2$$ methods for finding sparse solutions. IEEE J. Sel. Top. Signal Process. 4(2), 317\u2013329 (2010)","journal-title":"IEEE J. Sel. Top. Signal Process."},{"key":"29_CR24","doi-asserted-by":"crossref","unstructured":"Xiao, T., Li, H., Ouyang, W., Wang, X.: Learning deep feature representations with domain guided dropout for person re-identification. In: CVPR, pp. 1249\u20131258 (2016)","DOI":"10.1109\/CVPR.2016.140"},{"key":"29_CR25","doi-asserted-by":"crossref","unstructured":"Yu, H.X., Wu, A., Zheng, W.S.: Cross-view asymmetric metric learning for unsupervised person re-identification. In: ICCV (2017)","DOI":"10.1109\/ICCV.2017.113"},{"key":"29_CR26","unstructured":"Zhang, Y., Yeung, D.Y.: A convex formulation for learning task relationships in multi-task learning. arXiv preprint \narXiv:1203.3536\n\n (2012)"},{"key":"29_CR27","doi-asserted-by":"crossref","unstructured":"Zhao, R., Ouyang, W., Wang, X.: Unsupervised salience learning for person re-identification. In: CVPR, pp. 3586\u20133593 (2013)","DOI":"10.1109\/CVPR.2013.460"},{"issue":"5","key":"29_CR28","doi-asserted-by":"publisher","first-page":"1327","DOI":"10.1109\/TIP.2010.2090535","volume":"20","author":"M Zheng","year":"2011","unstructured":"Zheng, M., et al.: Graph regularized sparse coding for image representation. IEEE Trans. Image Process. 20(5), 1327\u20131336 (2011)","journal-title":"IEEE Trans. Image Process."}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-35231-8_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,16]],"date-time":"2019-11-16T00:41:09Z","timestamp":1573864869000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-35231-8_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030352301","9783030352318"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-35231-8_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"15 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADMA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Data Mining and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dalian","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adma2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/adma2019.neusoft.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"170","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}