{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:17:51Z","timestamp":1763191071089,"version":"3.45.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1109\/ijcnn64981.2025.11227861","type":"proceedings-article","created":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T18:46:15Z","timestamp":1763145975000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Person Re-Identification with TF-SS: A Transformer Model based on Shifted Windows Division and Skipping Sub-Layer Techniques"],"prefix":"10.1109","author":[{"given":"Kun","family":"Lu","sequence":"first","affiliation":[{"name":"School of Software Beihang University,Beijing,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yuqing","family":"Lan","sequence":"additional","affiliation":[{"name":"School of Software Beihang University,Beijing,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xinyan","family":"Lu","sequence":"additional","affiliation":[{"name":"School of Software Beihang University,Beijing,China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"article-title":"Person Re-identification: Past, Present and Future","year":"2016","author":"Zheng","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-024-02284-4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.5244\/c.30.87"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.89"},{"article-title":"Attention Is All You Need","year":"2023","author":"Vaswani","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i1.25225"},{"article-title":"Adversarial Training Methods for Semi-Supervised Text Classification","year":"2021","author":"Miyato","key":"ref7"},{"article-title":"An Image is Worth 16x16 Words: Transformers for Image Recognition at Scale","year":"2021","author":"Dosovitskiy","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"article-title":"Very Deep Convolutional Networks for Large-Scale Image Recognition","year":"2015","author":"Simonyan","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2015.7298594"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2016.90"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2015.7298682"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2019.00535"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr52729.2023.01886"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20053-3_35"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.108949"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr42600.2020.00643"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01474"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-022-07400-4"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i3.20155"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr52729.2023.01358"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr52733.2024.01642"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-2074"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00986"},{"article-title":"Highway and Residual Networks learn Unrolled Iterative Estimation","year":"2017","author":"Greff","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-77383-4_79"},{"article-title":"cosFormer: Rethinking Softmax in Attention","year":"2022","author":"Qin","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3301856"}],"event":{"name":"2025 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2025,6,30]]},"location":"Rome, Italy","end":{"date-parts":[[2025,7,5]]}},"container-title":["2025 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11227166\/11227148\/11227861.pdf?arnumber=11227861","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:13:13Z","timestamp":1763190793000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11227861\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/ijcnn64981.2025.11227861","relation":{},"subject":[],"published":{"date-parts":[[2025,6,30]]}}}