{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T16:47:04Z","timestamp":1762015624954,"version":"3.37.3"},"reference-count":79,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61501327","61711530240","61501328"],"award-info":[{"award-number":["61501327","61711530240","61501328"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006606","name":"Natural Science Foundation of Tianjin City","doi-asserted-by":"publisher","award":["17JCZDJC30600"],"award-info":[{"award-number":["17JCZDJC30600"]}],"id":[{"id":"10.13039\/501100006606","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fund of Tianjin Normal University","award":["135202RC1703"],"award-info":[{"award-number":["135202RC1703"]}]},{"name":"Open Projects Program of National Laboratory of Pattern Recognition","award":["201700001","201800002"],"award-info":[{"award-number":["201700001","201800002"]}]},{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","award":["201708120039","201708120040"],"award-info":[{"award-number":["201708120039","201708120040"]}],"id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Tianjin Higher Education Creative Team Funds Program"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Top. Comput. Intell."],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1109\/tetci.2018.2876556","type":"journal-article","created":{"date-parts":[[2018,11,16]],"date-time":"2018-11-16T04:23:44Z","timestamp":1542342224000},"page":"23-31","source":"Crossref","is-referenced-by-count":1,"title":["Pedestrian Retrieval Using Generated Samples and Multistream Layer in Sensor Networks"],"prefix":"10.1109","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9027-0690","authenticated-orcid":false,"given":"Shuang","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5452-3016","authenticated-orcid":false,"given":"Xiaolong","family":"Hao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.427"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/305"},{"article-title":"Deep transfer learning for person re-identification","year":"0","author":"geng","key":"ref71"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2018.2873599"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/3243316"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2017.304"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00454"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.324"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298832"},{"key":"ref38","first-page":"1058","article-title":"Regularization of neural networks using dropconnect","author":"wan","year":"2013","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.360"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2019.06.006"},{"article-title":"Wasserstein GAN","year":"2017","author":"arjovsky","key":"ref33"},{"key":"ref32","first-page":"469","article-title":"Coupled generative adversarial networks","author":"liu","year":"2016","journal-title":"Proc Annu Conf Neural Inf Process Syst"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.265"},{"article-title":"BEGAN: Boundary equilibrium generative adversarial networks","year":"0","author":"berthelot","key":"ref37"},{"key":"ref36","first-page":"82","article-title":"Learning a probabilistic latent space of object shapes via 3D generative adversarial modeling","author":"wu","year":"2016","journal-title":"Proc Annu Conf Neural Inf Process Syst"},{"key":"ref35","first-page":"2242","article-title":"Unpaired imageto-image translation using cycle-consistent adversarial networks","author":"zhu","year":"2017","journal-title":"Proc Int Conf Comput Vis"},{"key":"ref34","first-page":"2172","article-title":"InfoGAN: Interpretable representation learning by information maximizing generative adversarial nets","author":"chen","year":"2016","journal-title":"Proc Annu Conf Neural Inf Process Syst"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46475-6_30"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2700762"},{"key":"ref61","first-page":"1","article-title":"Multi-region bilinear convolutional neural networks for person re-identification","author":"ustinova","year":"2017","journal-title":"Proc IEEE Int Conf Adv Video Signal Based Surveillance"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.142"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.405"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.139"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.18"},{"key":"ref65","first-page":"791","article-title":"Gated siamese convolutional neural network architecture for human re-identification","author":"varior","year":"2016","journal-title":"Proc Eur Conf Comput Vis"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2017.12.002"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00047"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2910414"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.349"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.410"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2258152"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206621"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.577"},{"key":"ref22","article-title":"Unsupervised representation learning with deep convolutional generative adversarial networks","author":"radford","year":"0","journal-title":"ArXiv Preprint"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2016.04.009"},{"article-title":"Semi-supervised learning with generative adversarial networks","year":"2016","author":"odena","key":"ref24"},{"key":"ref23","first-page":"2234","article-title":"Improved techniques for training GANs","author":"salimans","year":"2016","journal-title":"Proc Annu Conf Neural Inf Process Syst"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00679"},{"key":"ref25","first-page":"2672","article-title":"Generative adversarial networks","author":"goodfellow","year":"2014","journal-title":"Proc Annu Conf Neural Inf Process Syst"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46448-0_44"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.145"},{"key":"ref59","first-page":"1","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2015","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.389"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.167"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.133"},{"article-title":"In defense of the triplet loss for person re-identification","year":"0","author":"hermans","key":"ref55"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3159171"},{"article-title":"Person re-identification: Past, present and future","year":"0","author":"zheng","key":"ref52"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2784878"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2416272"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.514"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.149"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2016.7900000"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46478-7_9"},{"key":"ref15","first-page":"135","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2015","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref16","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Proc Annu Conf Neural Inf Process Syst"},{"article-title":"Random erasing data augmentation","year":"0","author":"zhong","key":"ref17"},{"key":"ref18","first-page":"3765","article-title":"Multiscale learning for low-resolution person re-identification","author":"li","year":"2015","journal-title":"Proc Int Conf Comput Vis"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2964284.2967209"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88690-7_9"},{"key":"ref3","first-page":"1","article-title":"Correspondence-free multi-camera activity analysis and scene modeling","author":"wang","year":"0","journal-title":"Proc IEEE Conf Comput Vis Pattern Recognit"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.347"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSC.2007.4357522"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2778716"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2012.2191615"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298794"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1210-0"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.27"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7299016"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00541"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00016"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2015.05.021"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2014-60"}],"container-title":["IEEE Transactions on Emerging Topics in Computational Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7433297\/8964514\/08515280.pdf?arnumber=8515280","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T12:49:27Z","timestamp":1651063767000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8515280\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2]]},"references-count":79,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tetci.2018.2876556","relation":{},"ISSN":["2471-285X"],"issn-type":[{"type":"electronic","value":"2471-285X"}],"subject":[],"published":{"date-parts":[[2020,2]]}}}