{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T10:05:58Z","timestamp":1743501958181,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/avss.2019.8909855","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T20:30:31Z","timestamp":1574713831000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["Real-Time Video-Based Person Re-Identification Surveillance with Light-Weight Deep Convolutional Networks"],"prefix":"10.1109","author":[{"given":"Chien-Yao","family":"Wang","sequence":"first","affiliation":[]},{"given":"Ping-Yang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ming-Chiao","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jun-Wei","family":"Hsieh","sequence":"additional","affiliation":[]},{"given":"Hong-Yuan Mark","family":"Liao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00243"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2018.00054"},{"key":"ref12","first-page":"740","article-title":"Microsoft COCO: Common objects in context","author":"lin","year":"2014","journal-title":"European Conference on Computer Vision"},{"journal-title":"Mot 16 A benchmark for multi-object tracking","year":"2016","author":"milan","key":"ref13"},{"journal-title":"YOLOv3 An Incremental Improvement","year":"2018","author":"redmon","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00632"},{"journal-title":"CrowdHuman A benchmark for detecting human in a crowd","year":"2018","author":"shao","key":"ref16"},{"key":"ref17","first-page":"1929","article-title":"Dropout: a simple way to prevent neural networks from overfitting","volume":"15","author":"srivastava","year":"2014","journal-title":"The Journal of Machine Learning Research"},{"key":"ref18","article-title":"Person trasfer GAN to bridge domain gap for person re-identification","author":"wei","year":"2018","journal-title":"IEEE Conf Computer Vision and Pattern Recognition"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00919"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1177\/0278364913491297"},{"key":"ref3","first-page":"1230","article-title":"Fd-gan: Pose-guided feature distilling gan for robust person reidentification","author":"ge","year":"2018","journal-title":"Advances in neural information processing systems"},{"key":"ref6","first-page":"1062","article-title":"Human semantic parsing for person reidentification","author":"kalayeh","year":"2018","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"journal-title":"Defense of the Triplet Loss for Person Re-Identification","year":"2017","author":"hermans","key":"ref5"},{"key":"ref8","article-title":"Human reidentification with transferred metric learning","author":"li","year":"2012","journal-title":"ACCV"},{"key":"ref7","first-page":"1097","article-title":"ImageNet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"journal-title":"Batch feature erasing for person re-identification and beyond","year":"2018","author":"dai","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.27"},{"journal-title":"AlignedReID Surpassing human-level performance in person re-identification","year":"2017","author":"zhang","key":"ref20"},{"journal-title":"Random Erasing Data Augmentation","year":"2017","author":"zhong","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.133"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00541"}],"event":{"name":"2019 16th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)","start":{"date-parts":[[2019,9,18]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2019,9,21]]}},"container-title":["2019 16th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8894828\/8909819\/08909855.pdf?arnumber=8909855","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:53:02Z","timestamp":1658080382000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8909855\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/avss.2019.8909855","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}