{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T06:35:56Z","timestamp":1770532556276,"version":"3.49.0"},"reference-count":81,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62301346"],"award-info":[{"award-number":["62301346"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Sichuan Science and Technology Program","award":["2024NSFSC1424"],"award-info":[{"award-number":["2024NSFSC1424"]}]},{"name":"Chengdu Technology Innovation Research and Development Project","award":["2024-YF05-00652-SN"],"award-info":[{"award-number":["2024-YF05-00652-SN"]}]},{"name":"Talent Introduction and Scientific Research Start-Up Project of Sichuan University","award":["YJ202326"],"award-info":[{"award-number":["YJ202326"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["E3E41904X2"],"award-info":[{"award-number":["E3E41904X2"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011298","name":"Open Foundation of Yunnan Key Laboratory of Software Engineering","doi-asserted-by":"publisher","award":["2023SE206"],"award-info":[{"award-number":["2023SE206"]}],"id":[{"id":"10.13039\/501100011298","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tifs.2024.3520304","type":"journal-article","created":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T19:18:45Z","timestamp":1734635925000},"page":"980-995","source":"Crossref","is-referenced-by-count":3,"title":["DRFormer: A Discriminable and Reliable Feature Transformer for Person Re-Identification"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9769-8035","authenticated-orcid":false,"given":"Pingyu","family":"Wang","sequence":"first","affiliation":[{"name":"College of Electronics and Information Engineering, Sichuan University, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-0762-9067","authenticated-orcid":false,"given":"Xingjian","family":"Zheng","sequence":"additional","affiliation":[{"name":"Frost Drill Intellectual Software Pte. Ltd., Bras Basah, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3555-0005","authenticated-orcid":false,"given":"Linbo","family":"Qing","sequence":"additional","affiliation":[{"name":"College of Electronics and Information Engineering, Sichuan University, Chengdu, China"}]},{"given":"Bonan","family":"Li","sequence":"additional","affiliation":[{"name":"School of Electronic, Electrical, and Communication Engineering, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4245-4687","authenticated-orcid":false,"given":"Fei","family":"Su","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6506-7298","authenticated-orcid":false,"given":"Zhicheng","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0647-064X","authenticated-orcid":false,"given":"Honggang","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Electronics and Information Engineering, Sichuan University, Chengdu, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01225-0_30"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01264-9_25"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3240508.3240552"},{"key":"ref4","first-page":"1230","article-title":"FD-GAN: Pose-guided feature distilling GAN for robust person re-identification","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Ge"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00129"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00117"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00076"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00871"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33018295"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2014.2360373"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2914686"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2929036"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref14","first-page":"1","article-title":"An image is worth 16\u00d716 words: Transformers for image recognition at scale","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Dosovitskiy"},{"key":"ref15","first-page":"10347","article-title":"Training data-efficient image transformers & distillation through attention","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Touvron"},{"key":"ref16","first-page":"15908","article-title":"Transformer in transformer","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"34","author":"Han"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01170"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00208"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.133"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.27"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48881-3_2"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00016"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2938523"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00762"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3059515"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i3.20155"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/WACV56688.2023.00617"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01249-6_17"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01066"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3343031.3350982"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2021.3072287"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.41"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.325"},{"key":"ref35","first-page":"1","article-title":"Hadamard product for low-rank bilinear pooling","volume-title":"Proc. 5th Int. Conf. Learn. Represent.","author":"Kim"},{"key":"ref36","first-page":"4277","article-title":"Learning deep bilinear transformation for fine-grained image representation","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Zheng"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.170"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2017.8078460"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00046"},{"key":"ref40","first-page":"1177","article-title":"Random features for large-scale kernel machines","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Rahimi"},{"key":"ref41","first-page":"583","article-title":"Random feature maps for dot product kernels","volume-title":"Proc. Artif. Intell. Statist.","author":"Kar"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487591"},{"key":"ref43","first-page":"2258","article-title":"Subspace embeddings for the polynomial kernel","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Avron"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01474"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01358"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i2.25226"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511984068"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/WACV57701.2024.00525"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01225-0_29"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00380"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6775"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00325"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00666"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3082701"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3113183"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2021.3069562"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00465"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00470"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3218449"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3079910"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3199394"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2022.3229639"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i1.25180"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01886"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/WACV57701.2024.00594"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3385782"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00844"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00214"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.23915\/distill.00010"},{"key":"ref71","first-page":"1","article-title":"Categorical reparameterization with gumbel-softmax","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Jang"},{"key":"ref72","first-page":"1","article-title":"Differentiable sampling of categorical distributions using the catlog-derivative trick","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"36","author":"De Smet"},{"key":"ref73","first-page":"1513","article-title":"Learning latent partial matchings with gumbel-IPF networks","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Indelman"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.147"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.389"},{"key":"ref77","first-page":"1097","article-title":"ImageNet classification with deep convolutional neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Krizhevsky"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01225-0_23"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.7000"},{"key":"ref80","first-page":"8024","article-title":"PyTorch: An imperative style, high-performance deep learning library","volume-title":"Proc. NIPS","author":"Paszke"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.143"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10810755\/10807364.pdf?arnumber=10807364","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,14]],"date-time":"2025-01-14T19:44:57Z","timestamp":1736883897000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10807364\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":81,"URL":"https:\/\/doi.org\/10.1109\/tifs.2024.3520304","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}