{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:41:15Z","timestamp":1771468875370,"version":"3.50.1"},"publisher-location":"Cham","reference-count":63,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030585679","type":"print"},{"value":"9783030585686","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58568-6_14","type":"book-chapter","created":{"date-parts":[[2020,11,12]],"date-time":"2020-11-12T14:04:57Z","timestamp":1605189897000},"page":"230-247","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Symbiotic Adversarial Learning for Attribute-Based Person Search"],"prefix":"10.1007","author":[{"given":"Yu-Tong","family":"Cao","sequence":"first","affiliation":[]},{"given":"Jingya","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Dacheng","family":"Tao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,13]]},"reference":[{"key":"14_CR1","unstructured":"Andrew, G., Arora, R., Bilmes, J., Livescu, K.: Deep canonical correlation analysis. In: ICML (2013)"},{"key":"14_CR2","unstructured":"Barshan, E., Fieguth, P.: Stage-wise training: an improved feature learning strategy for deep models. In: Feature Extraction: Modern Questions and Challenges, pp. 49\u201359 (2015)"},{"issue":"2","key":"14_CR3","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1109\/TPAMI.2017.2666805","volume":"40","author":"YC Chen","year":"2018","unstructured":"Chen, Y.C., Zhu, X., Zheng, W.S., Lai, J.H.: Person re-identification by camera correlation aware feature augmentation. IEEE TPAMI 40(2), 392\u2013408 (2018)","journal-title":"IEEE TPAMI"},{"key":"14_CR4","unstructured":"Chongxuan, L., Xu, T., Zhu, J., Zhang, B.: Triple generative adversarial nets. In: NIPS (2017)"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Deng, Y., Luo, P., Loy, C.C., Tang, X.: Pedestrian attribute recognition at far distance. In: ACM MM. ACM (2014)","DOI":"10.1145\/2647868.2654966"},{"key":"14_CR6","unstructured":"Deng, Y., Luo, P., Loy, C.C., Tang, X.: Learning to recognize pedestrian attribute. arXiv:1501.00901 (2015)"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Dong, Q., Gong, S., Zhu, X.: Person search by text attribute query as zero-shot learning. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 3652\u20133661 (2019)","DOI":"10.1109\/ICCV.2019.00375"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Eisenschtat, A., Wolf, L.: Linking image and text with 2-way nets. In: CVPR (2017)","DOI":"10.1109\/CVPR.2017.201"},{"key":"14_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-030-01231-1_2","volume-title":"Computer Vision \u2013 ECCV 2018","author":"R Felix","year":"2018","unstructured":"Felix, R., Kumar, V.B., Reid, I., Carneiro, G.: Multi-modal cycle-consistent generalized zero-shot learning. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) Computer Vision \u2013 ECCV 2018. Lecture Notes in Computer Science, vol. 11210, pp. 21\u201337. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01231-1_2"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Feng, F., Wang, X., Li, R.: Cross-modal retrieval with correspondence autoencoder. In: ACM MM. ACM (2014)","DOI":"10.1145\/2647868.2654902"},{"key":"14_CR11","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial nets. In: NIPS (2014)"},{"issue":"12","key":"14_CR12","doi-asserted-by":"publisher","first-page":", 2639","DOI":"10.1162\/0899766042321814","volume":"16","author":"DR Hardoon","year":"2004","unstructured":"Hardoon, D.R., Szedmak, S., Shawe-Taylor, J.: Canonical correlation analysis an overview with application to learning methods. Neural Comput. 16(12), 2639\u20132664 (2004)","journal-title":"Neural Comput."},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: CVPR (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"14_CR14","unstructured":"Hermans, A., Beyer, L., Leibe, B.: In defense of the triplet loss for person re-identification. arXiv:1703.07737 (2017)"},{"key":"14_CR15","unstructured":"Hoffman, J., et al.: CyCADA: cycle-consistent adversarial domain adaptation. arXiv:1711.03213 (2017)"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Jaha, E.S., Nixon, M.S.: Soft biometrics for subject identification using clothing attributes. In: IJCB. IEEE (2014)","DOI":"10.1109\/BTAS.2014.6996278"},{"key":"14_CR17","unstructured":"Kim, T., Cha, M., Kim, H., Lee, J.K., Kim, J.: Learning to discover cross-domain relations with generative adversarial networks. In: Proceedings of the 34th International Conference on Machine Learning, vol. 70, pp. 1857\u20131865. JMLR. org (2017)"},{"key":"14_CR18","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv:1412.6980 (2014)"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Kumar Verma, V., Arora, G., Mishra, A., Rai, P.: Generalized zero-shot learning via synthesized examples. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4281\u20134289 (2018)","DOI":"10.1109\/CVPR.2018.00450"},{"key":"14_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1007\/978-3-642-33863-2_40","volume-title":"Computer Vision \u2013 ECCV 2012, Workshops and Demonstrations","author":"R Layne","year":"2012","unstructured":"Layne, R., Hospedales, T.M., Gong, S.: Towards person identification and re-identification with attributes. In: Fusiello, A., Murino, V., Cucchiara, R. (eds.) Computer Vision \u2013 ECCV 2012, Workshops and Demonstrations. Lecture Notes in Computer Science, vol. 7583, pp. 402\u2013412. Springer, Berlin, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33863-2_40"},{"key":"14_CR21","series-title":"Advances in Computer Vision and Pattern Recognition","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-1-4471-6296-4_5","volume-title":"Person Re-Identification","author":"R Layne","year":"2014","unstructured":"Layne, R., Hospedales, T.M., Gong, S.: Attributes-based re-identification. In: Gong, S., Cristani, M., Yan, S., Loy, C. (eds.) Person Re-Identification. Advances in Computer Vision and Pattern Recognition, pp. 93\u2013117. Springer, London (2014). https:\/\/doi.org\/10.1007\/978-1-4471-6296-4_5"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Layne, R., Hospedales, T.M., Gong, S., Mary, Q.: Person re-identification by attributes. In: BMVC (2012)","DOI":"10.5244\/C.26.24"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Li, D., Chen, X., Huang, K.: Multi-attribute learning for pedestrian attribute recognition in surveillance scenarios. In: IAPR ACPR. IEEE (2015)","DOI":"10.1109\/ACPR.2015.7486476"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Li, S., Xiao, T., Li, H., Yang, W., Wang, X.: Identity-aware textual-visual matching with latent co-attention. In: ICCV (2017)","DOI":"10.1109\/ICCV.2017.209"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Li, W., Zhao, R., Xiao, T., Wang, X.: DeepREFId: deep filter pairing neural network for person re-identification. In: CVPR (2014)","DOI":"10.1109\/CVPR.2014.27"},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Li, W., Zhu, X., Gong, S.: Person re-identification by deep joint learning of multi-loss classification. arXiv:1705.04724 (2017)","DOI":"10.24963\/ijcai.2017\/305"},{"key":"14_CR27","unstructured":"Lin, Y., Zheng, L., Zheng, Z., Wu, Y., Yang, Y.: Improving person re-identification by attribute and identity learning. arXiv:1703.07220 (2017)"},{"key":"14_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/978-3-642-33863-2_39","volume-title":"Computer Vision \u2013 ECCV 2012, Workshops and Demonstrations.","author":"C Liu","year":"2012","unstructured":"Liu, C., Gong, S., Loy, C.C., Lin, X.: Person re-identification: what features are important? In: Fusiello, A., Murino, V., Cucchiara, R. (eds.) Computer Vision \u2013 ECCV 2012, Workshops and Demonstrations. Lecture Notes in Computer Science, vol. 7583, pp. 391\u2013401. Springer, Berlin, Heidelberg. (2012). https:\/\/doi.org\/10.1007\/978-3-642-33863-2_39"},{"key":"14_CR29","doi-asserted-by":"crossref","unstructured":"Liu, X., et al.: HydraPlus-Net: attentive deep features for pedestrian analysis. In: ICCV (2017)","DOI":"10.1109\/ICCV.2017.46"},{"key":"14_CR30","doi-asserted-by":"crossref","unstructured":"Long, Y., Liu, L., Shao, L., Shen, F., Ding, G., Han, J.: From zero-shot learning to conventional supervised classification: unseen visual data synthesis. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1627\u20131636 (2017)","DOI":"10.1109\/CVPR.2017.653"},{"key":"14_CR31","doi-asserted-by":"crossref","unstructured":"Paisitkriangkrai, S., Shen, C., Van Den Hengel, A.: Learning to rank in person re-identification with metric ensembles. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1846\u20131855 (2015)","DOI":"10.1109\/CVPR.2015.7298794"},{"key":"14_CR32","unstructured":"Paszke, A., et al.: Automatic differentiation in PyTorch. In: NIPS-W (2017)"},{"issue":"6","key":"14_CR33","doi-asserted-by":"publisher","first-page":"1216","DOI":"10.1109\/TPAMI.2013.219","volume":"36","author":"DA Reid","year":"2014","unstructured":"Reid, D.A., Nixon, M.S., Stevenage, S.V.: Soft biometrics; human identification using comparative descriptions. IEEE TPAMI 36(6), 1216\u20131228 (2014)","journal-title":"IEEE TPAMI"},{"key":"14_CR34","doi-asserted-by":"crossref","unstructured":"Saquib Sarfraz, M., Schumann, A., Eberle, A., Stiefelhagen, R.: A pose-sensitive embedding for person re-identification with expanded cross neighborhood re-ranking. In: CVPR (2018)","DOI":"10.1109\/CVPR.2018.00051"},{"key":"14_CR35","doi-asserted-by":"crossref","unstructured":"Scheirer, W.J., Kumar, N., Belhumeur, P.N., Boult, T.E.: Multi-attribute spaces: calibration for attribute fusion and similarity search. In: CVPR. IEEE (2012)","DOI":"10.1109\/CVPR.2012.6248021"},{"key":"14_CR36","doi-asserted-by":"crossref","unstructured":"Shi, Z., Hospedales, T.M., Xiang, T.: Transferring a semantic representation for person re-identification and search. In: CVPR (2015)","DOI":"10.1109\/CVPR.2015.7299046"},{"key":"14_CR37","doi-asserted-by":"crossref","unstructured":"Siddiquie, B., Feris, R.S., Davis, L.S.: Image ranking and retrieval based on multi-attribute queries. In: CVPR. IEEE (2011)","DOI":"10.1109\/CVPR.2011.5995329"},{"key":"14_CR38","doi-asserted-by":"crossref","unstructured":"Su, C., Yang, F., Zhang, S., Tian, Q., Davis, L.S., Gao, W.: Multi-task learning with low rank attribute embedding for person re-identification. In: ICCV (2015)","DOI":"10.1109\/ICCV.2015.426"},{"key":"14_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/978-3-319-46475-6_30","volume-title":"Computer Vision \u2013 ECCV 2016","author":"C Su","year":"2016","unstructured":"Su, C., Zhang, S., Xing, J., Gao, W., Tian, Q.: Deep attributes driven multi-camera person re-identification. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) Computer Vision \u2013 ECCV 2016. Lecture Notes in Computer Science, vol. 9906, pp. 475\u2013491. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46475-6_30"},{"key":"14_CR40","doi-asserted-by":"crossref","unstructured":"Sun, Y., Zheng, L., Deng, W., Wang, S.: SvdNet for pedestrian retrieval. In: ICCV (2017)","DOI":"10.1109\/ICCV.2017.410"},{"key":"14_CR41","doi-asserted-by":"crossref","unstructured":"Tsai, Y.H.H., Huang, L.K., Salakhutdinov, R.: Learning robust visual-semantic embeddings. In: ICCV. IEEE (2017)","DOI":"10.1109\/ICCV.2017.386"},{"key":"14_CR42","doi-asserted-by":"crossref","unstructured":"Tzeng, E., Hoffman, J., Saenko, K., Darrell, T.: Adversarial discriminative domain adaptation. In: CVPR (2017)","DOI":"10.1109\/CVPR.2017.316"},{"key":"14_CR43","doi-asserted-by":"crossref","unstructured":"Vaquero, D.A., Feris, R.S., Tran, D., Brown, L., Hampapur, A., Turk, M.: Attribute-based people search in surveillance environments. In: WACV. IEEE (2009)","DOI":"10.1201\/9781439813300-c14"},{"key":"14_CR44","doi-asserted-by":"crossref","unstructured":"Wang, B., Yang, Y., Xu, X., Hanjalic, A., Shen, H.T.: Adversarial cross-modal retrieval. In: ACM MM. ACM (2017)","DOI":"10.1145\/3123266.3123326"},{"key":"14_CR45","doi-asserted-by":"crossref","unstructured":"Wang, F., Zuo, W., Lin, L., Zhang, D., Zhang, L.: Joint learning of single-image and cross-image representations for person re-identification. In: CVPR (2016)","DOI":"10.1109\/CVPR.2016.144"},{"key":"14_CR46","doi-asserted-by":"crossref","unstructured":"Wang, J., Zhu, X., Gong, S., Li, W.: Attribute recognition by joint recurrent learning of context and correlation. In: ICCV (2017)","DOI":"10.1109\/ICCV.2017.65"},{"key":"14_CR47","doi-asserted-by":"crossref","unstructured":"Wang, J., Zhu, X., Gong, S., Li, W.: Transferable joint attribute-identity deep learning for unsupervised person re-identification. In: CVPR (2018)","DOI":"10.1109\/CVPR.2018.00242"},{"key":"14_CR48","doi-asserted-by":"crossref","unstructured":"Wang, K., He, R., Wang, W., Wang, L., Tan, T.: Learning coupled feature spaces for cross-modal matching. In: ICCV (2013)","DOI":"10.1109\/ICCV.2013.261"},{"key":"14_CR49","doi-asserted-by":"crossref","unstructured":"Wang, L., Li, Y., Lazebnik, S.: Learning deep structure-preserving image-text embeddings. In: CVPR (2016)","DOI":"10.1109\/CVPR.2016.541"},{"key":"14_CR50","unstructured":"Wang, W., Arora, R., Livescu, K., Bilmes, J.: On deep multi-view representation learning. In: ICML (2015)"},{"issue":"9","key":"14_CR51","doi-asserted-by":"publisher","first-page":"2251","DOI":"10.1109\/TPAMI.2018.2857768","volume":"41","author":"Y Xian","year":"2018","unstructured":"Xian, Y., Lampert, C.H., Schiele, B., Akata, Z.: Zero-shot learning-a comprehensive evaluation of the good, the bad and the ugly. IEEE Trans. Pattern Anal. Mach. Intell. 41(9), 2251\u20132265 (2018)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"14_CR52","doi-asserted-by":"crossref","unstructured":"Yan, F., Mikolajczyk, K.: Deep correlation for matching images and text. In: CVPR (2015)","DOI":"10.1109\/CVPR.2015.7298966"},{"key":"14_CR53","doi-asserted-by":"crossref","unstructured":"Yin, Z., et al.: Adversarial attribute-image person re-identification. In: IJCAI (7 2018)","DOI":"10.24963\/ijcai.2018\/153"},{"key":"14_CR54","doi-asserted-by":"crossref","unstructured":"Zhang, L., Xiang, T., Gong, S.: Learning a discriminative null space for person re-identification. In: CVPR (2016)","DOI":"10.1109\/CVPR.2016.139"},{"key":"14_CR55","doi-asserted-by":"crossref","unstructured":"Zhao, X., Sang, L., Ding, G., Guo, Y., Jin, X.: Grouping attribute recognition for pedestrian with joint recurrent learning. In: IJCAI (2018)","DOI":"10.24963\/ijcai.2018\/441"},{"key":"14_CR56","doi-asserted-by":"crossref","unstructured":"Zheng, L., Shen, L., Tian, L., Wang, S., Wang, J., Tian, Q.: Scalable person re-identification: a benchmark. In: ICCV (2015)","DOI":"10.1109\/ICCV.2015.133"},{"key":"14_CR57","unstructured":"Zheng, Z., Zheng, L., Garrett, M., Yang, Y., Shen, Y.D.: Dual-path convolutional image-text embedding with instance loss. arXiv:1711.05535 (2017)"},{"key":"14_CR58","doi-asserted-by":"crossref","unstructured":"Zhong, Z., Zheng, L., Cao, D., Li, S.: Re-ranking person re-identification with k-reciprocal encoding. In: CVPR (2017)","DOI":"10.1109\/CVPR.2017.389"},{"key":"14_CR59","unstructured":"Zhou, K., Xiang, T.: Torchreid: A library for deep learning person re-identification in PyTorch. arXiv preprint arXiv:1910.10093 (2019)"},{"key":"14_CR60","doi-asserted-by":"crossref","unstructured":"Zhou, K., Yang, Y., Cavallaro, A., Xiang, T.: Learning generalisable omni-scale representations for person re-identification. arXiv preprint arXiv:1910.06827 (2019)","DOI":"10.1109\/ICCV.2019.00380"},{"key":"14_CR61","doi-asserted-by":"crossref","unstructured":"Zhou, K., Yang, Y., Cavallaro, A., Xiang, T.: Omni-scale feature learning for person re-identification. In: ICCV (2019)","DOI":"10.1109\/ICCV.2019.00380"},{"key":"14_CR62","doi-asserted-by":"crossref","unstructured":"Zhu, J.Y., Park, T., Isola, P., Efros, A.A.: Unpaired image-to-image translation using cycle-consistent adversarial networks. In: ICCV (2017)","DOI":"10.1109\/ICCV.2017.244"},{"key":"14_CR63","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Elhoseiny, M., Liu, B., Peng, X., Elgammal, A.: A generative adversarial approach for zero-shot learning from noisy texts. In: CVPR (2018)","DOI":"10.1109\/CVPR.2018.00111"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2020"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58568-6_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T00:18:56Z","timestamp":1731370736000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58568-6_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030585679","9783030585686"],"references-count":63,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58568-6_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"13 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Glasgow","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2020.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OpenReview","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5025","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1360","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic. From the ECCV Workshops 249 full papers, 18 short papers, and 21 further contributions were published out of a total of 467 submissions.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}