{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:45:42Z","timestamp":1772905542068,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,12]],"date-time":"2020-10-12T00:00:00Z","timestamp":1602460800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSFC","award":["61672521"],"award-info":[{"award-number":["61672521"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,12]]},"DOI":"10.1145\/3394171.3413815","type":"proceedings-article","created":{"date-parts":[[2020,10,12]],"date-time":"2020-10-12T12:26:18Z","timestamp":1602505578000},"page":"3422-3430","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":81,"title":["Surpassing Real-World Source Training Data: Random 3D Characters for Generalizable Person Re-Identification"],"prefix":"10.1145","author":[{"given":"Yanan","family":"Wang","sequence":"first","affiliation":[{"name":"Inception Institute of Artificial Intelligence (IIAI), Abu Dhabi, UAE"}]},{"given":"Shengcai","family":"Liao","sequence":"additional","affiliation":[{"name":"Inception Institute of Artificial Intelligence (IIAI), Abu Dhabi, UAE"}]},{"given":"Ling","family":"Shao","sequence":"additional","affiliation":[{"name":"Inception Institute of Artificial Intelligence (IIAI) &amp; Mohamed bin Zayed University of Artificial Intelligence, Abu Dhabi, UAE"}]}],"member":"320","published-online":{"date-parts":[[2020,10,12]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Proceedings of the European Conference on Computer Vision (ECCV). 189--205","author":"Bak Slawomir","year":"2018","unstructured":"Slawomir Bak , Peter Carr , and Jean-Francois Lalonde . 2018 . Domain adaptation through synthesis for unsupervised person re-identification . In Proceedings of the European Conference on Computer Vision (ECCV). 189--205 . Slawomir Bak, Peter Carr, and Jean-Francois Lalonde. 2018. Domain adaptation through synthesis for unsupervised person re-identification. In Proceedings of the European Conference on Computer Vision (ECCV). 189--205."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2017.12.002"},{"key":"e_1_3_2_2_3_1","volume-title":"Pattern recognition and machine learning","author":"Bishop Christopher M","unstructured":"Christopher M Bishop . 2006. Pattern recognition and machine learning . Springer . Christopher M Bishop. 2006. Pattern recognition and machine learning. Springer."},{"key":"e_1_3_2_2_4_1","volume-title":"UV Mapping, and Texturing 3D Game Weapons","author":"Chang Christian","unstructured":"Christian Chang . 2006. Modeling , UV Mapping, and Texturing 3D Game Weapons . Wordware Publishing, Inc. Christian Chang. 2006. Modeling, UV Mapping, and Texturing 3D Game Weapons. Wordware Publishing, Inc."},{"key":"e_1_3_2_2_5_1","unstructured":"MakeHuman Community. 2020 a. MakeHuman: Open Source Tool for Making 3D Characters. http:\/\/www.makehumancommunity.org.  MakeHuman Community. 2020 a. MakeHuman: Open Source Tool for Making 3D Characters. http:\/\/www.makehumancommunity.org."},{"key":"e_1_3_2_2_6_1","unstructured":"PyTorch Community. 2020 b. PyTorch: An open-source Python machine learning library. https:\/\/pytorch.org\/.  PyTorch Community. 2020 b. PyTorch: An open-source Python machine learning library. https:\/\/pytorch.org\/."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243316"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5539926"},{"key":"e_1_3_2_2_9_1","volume-title":"Chen Change Loy, and Timothy M Hospedales","author":"Gong Shaogang","year":"2014","unstructured":"Shaogang Gong , Marco Cristani , Chen Change Loy, and Timothy M Hospedales . 2014 . The re-identification challenge. In Person re-identification. Springer , 1--20. Shaogang Gong, Marco Cristani, Chen Change Loy, and Timothy M Hospedales. 2014. The re-identification challenge. In Person re-identification. Springer, 1--20."},{"key":"e_1_3_2_2_10_1","volume-title":"Deep learning","author":"Goodfellow Ian","unstructured":"Ian Goodfellow , Yoshua Bengio , and Aaron Courville . 2016. Deep learning . MIT press . Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep learning .MIT press."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"Mengran Gou Ziyan Wu Angels Rates-Borras Octavia Camps Richard J Radke etal 2018. A systematic evaluation and benchmark for person re-identification: Features metrics and datasets. IEEE transactions on pattern analysis and machine intelligence Vol. 41 3 (2018) 523--536.  Mengran Gou Ziyan Wu Angels Rates-Borras Octavia Camps Richard J Radke et al. 2018. A systematic evaluation and benchmark for person re-identification: Features metrics and datasets. IEEE transactions on pattern analysis and machine intelligence Vol. 41 3 (2018) 523--536.","DOI":"10.1109\/TPAMI.2018.2807450"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88682-2_21"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21227-7_9"},{"key":"e_1_3_2_2_15_1","volume-title":"Asian Conference on Computer Vision. Springer, 650--664","author":"Hu Yang","year":"2014","unstructured":"Yang Hu , Dong Yi , Shengcai Liao , Zhen Lei , and Stan Z Li . 2014 . Cross dataset person re-identification . In Asian Conference on Computer Vision. Springer, 650--664 . Yang Hu, Dong Yi, Shengcai Liao, Zhen Lei, and Stan Z Li. 2014. Cross dataset person re-identification. In Asian Conference on Computer Vision. Springer, 650--664."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.461"},{"key":"e_1_3_2_2_17_1","volume-title":"Asian conference on computer vision. Springer, 31--44","author":"Li Wei","year":"2012","unstructured":"Wei Li , Rui Zhao , and Xiaogang Wang . 2012 . Human reidentification with transferred metric learning . In Asian conference on computer vision. Springer, 31--44 . Wei Li, Rui Zhao, and Xiaogang Wang. 2012. Human reidentification with transferred metric learning. In Asian conference on computer vision. Springer, 31--44."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.27"},{"key":"e_1_3_2_2_19_1","volume-title":"Interpretable and Generalizable Person Re-Identification with Query-Adaptive Convolution and Temporal Lifting. In European Conference on Computer Vision (ECCV) .","author":"Liao Shengcai","year":"2020","unstructured":"Shengcai Liao and Ling Shao . 2020 . Interpretable and Generalizable Person Re-Identification with Query-Adaptive Convolution and Temporal Lifting. In European Conference on Computer Vision (ECCV) . Shengcai Liao and Ling Shao. 2020. Interpretable and Generalizable Person Re-Identification with Query-Adaptive Convolution and Temporal Lifting. In European Conference on Computer Vision (ECCV) ."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2964284.2967209"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2013.6738736"},{"key":"e_1_3_2_2_22_1","unstructured":"Open-ReID. 2020. Open-Source Person Re-Identification Library. https:\/\/cysu.github.io\/open-reid.  Open-ReID. 2020. Open-Source Person Re-Identification Library. https:\/\/cysu.github.io\/open-reid."},{"key":"e_1_3_2_2_23_1","volume-title":"Handbook of Face Recognition","author":"Phillips P. Jonathon","unstructured":"P. Jonathon Phillips , Patrick Grother , and Ross Micheals . Sep. 2011. Evaluation Methods in Face Recognition . In Handbook of Face Recognition 2 nd ed.), S. Z. Li and A. K. Jain (Eds.). Springer , Chapter 21, 551--574. P. Jonathon Phillips, Patrick Grother, and Ross Micheals. Sep. 2011. Evaluation Methods in Face Recognition. In Handbook of Face Recognition 2nd ed.), S. Z. Li and A. K. Jain (Eds.). Springer, Chapter 21, 551--574.","edition":"2"},{"key":"e_1_3_2_2_24_1","unstructured":"T. Sobh and K. Elleithy. 2010. Innovations in Computing Sciences and Software Engineering .Springer Netherlands. 2010927601 https:\/\/books.google.ae\/books?id=IQ8h_d5rR0MC  T. Sobh and K. Elleithy. 2010. Innovations in Computing Sciences and Software Engineering .Springer Netherlands. 2010927601 https:\/\/books.google.ae\/books?id=IQ8h_d5rR0MC"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00070"},{"key":"e_1_3_2_2_26_1","unstructured":"Unity Technologies. 2020. Unity3D: Cross-platform game engine. https:\/\/unity.com.  Unity Technologies. 2020. Unity3D: Cross-platform game engine. https:\/\/unity.com."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3240508.3240552"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00016"},{"key":"e_1_3_2_2_29_1","volume-title":"Deep Learning for Person Re-identification: A Survey and Outlook. arXiv preprint arXiv:2001.04193","author":"Ye Mang","year":"2020","unstructured":"Mang Ye , Jianbing Shen , Gaojie Lin , Tao Xiang , Ling Shao , and Steven CH Hoi . 2020. Deep Learning for Person Re-identification: A Survey and Outlook. arXiv preprint arXiv:2001.04193 ( 2020 ). Mang Ye, Jianbing Shen, Gaojie Lin, Tao Xiang, Ling Shao, and Steven CH Hoi. 2020. Deep Learning for Person Re-identification: A Survey and Outlook. arXiv preprint arXiv:2001.04193 (2020)."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2014.16"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/2919332.2919877"},{"key":"e_1_3_2_2_32_1","volume-title":"Person re-identification: Past, present and future. arXiv preprint arXiv:1610.02984","author":"Zheng Liang","year":"2016","unstructured":"Liang Zheng , Yi Yang , and Alexander G Hauptmann . 2016. Person re-identification: Past, present and future. arXiv preprint arXiv:1610.02984 ( 2016 ). Liang Zheng, Yi Yang, and Alexander G Hauptmann. 2016. Person re-identification: Past, present and future. arXiv preprint arXiv:1610.02984 (2016)."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.5244\/C.23.23"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.405"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.389"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2874313"}],"event":{"name":"MM '20: The 28th ACM International Conference on Multimedia","location":"Seattle WA USA","acronym":"MM '20","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 28th ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3394171.3413815","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3394171.3413815","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:17Z","timestamp":1750197677000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3394171.3413815"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,12]]},"references-count":36,"alternative-id":["10.1145\/3394171.3413815","10.1145\/3394171"],"URL":"https:\/\/doi.org\/10.1145\/3394171.3413815","relation":{},"subject":[],"published":{"date-parts":[[2020,10,12]]},"assertion":[{"value":"2020-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}