{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:47:14Z","timestamp":1750308434312,"version":"3.41.0"},"reference-count":64,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T00:00:00Z","timestamp":1623110400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Beijing Municipal Natural Science Foundation","award":["4212041"],"award-info":[{"award-number":["4212041"]}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61972027, 61872035"],"award-info":[{"award-number":["61972027, 61872035"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Intell. Syst. Technol."],"published-print":{"date-parts":[[2021,8,31]]},"abstract":"<jats:p>Unsupervised domain adaptation (UDA) for person re-identification (re-ID) is a challenging task due to large variations in human classes, illuminations, camera views, and so on. Currently, existing UDA methods focus on two-domain adaptation and are generally trained on one labeled source set and adapted on the other unlabeled target set. In this article, we put forward a new issue on person re-ID, namely, unsupervised multi-target domain adaptation (UMDA). It involves one labeled source set and multiple unlabeled target sets, which is more reasonable for practical real-world applications. Enabling UMDA has to learn the consistency for multiple domains, which is significantly different from the UDA problem. To ensure distribution consistency and learn the discriminative embedding, we further propose the Camera Identity-guided Distribution Consistency method that performs an alignment operation for multiple domains. The camera identities are encoded into the image semantic information to facilitate the adaptation of features. According to our knowledge, this is the first attempt on the unsupervised multi-target domain adaptation learning. Extensive experiments are executed on Market-1501, DukeMTMC-reID, MSMT17, PersonX, and CUHK03, and our method has achieved very competitive re-ID accuracy in multi-target domains against numerous state-of-the-art methods.<\/jats:p>","DOI":"10.1145\/3454130","type":"journal-article","created":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T18:22:54Z","timestamp":1623176574000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["A Camera Identity-guided Distribution Consistency Method for Unsupervised Multi-target Domain Person Re-identification"],"prefix":"10.1145","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4425-1293","authenticated-orcid":false,"given":"Jiajie","family":"Tian","sequence":"first","affiliation":[{"name":"Beijing Jiaotong University, Beijing, China"}]},{"given":"Qihao","family":"Tang","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University, Beijing, China"}]},{"given":"Rui","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1754-4878","authenticated-orcid":false,"given":"Zhu","family":"Teng","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University, Beijing, China"}]},{"given":"Baopeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University, Beijing, China"}]},{"given":"Jianping","family":"Fan","sequence":"additional","affiliation":[{"name":"Lenovo Research, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2021,6,8]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Hospedales","author":"Chang Xiaobin","year":"2018","unstructured":"Xiaobin Chang , Yongxin Yang , Tao Xiang , and Timothy M . Hospedales . 2018 . Disjoint label space transfer learning with common factorised space.arXiv:1812.02605. Retrieved from https:\/\/arxiv.org\/abs\/1812.02605. Xiaobin Chang, Yongxin Yang, Tao Xiang, and Timothy M. Hospedales. 2018. Disjoint label space transfer learning with common factorised space.arXiv:1812.02605. Retrieved from https:\/\/arxiv.org\/abs\/1812.02605."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.149"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00916"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00110"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2015.04.005"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243316"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2008.4587597"},{"key":"e_1_2_1_9_1","unstructured":"Mengyue Geng Yaowei Wang Tao Xiang and Yonghong Tian. 2016. Deep transfer learning for person re-identification. arXiv:1611.05244. Retrieved from https:\/\/arxiv.org\/abs\/1611.05244.  Mengyue Geng Yaowei Wang Tao Xiang and Yonghong Tian. 2016. Deep transfer learning for person re-identification. arXiv:1611.05244. Retrieved from https:\/\/arxiv.org\/abs\/1611.05244."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2963389"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243316"},{"key":"e_1_2_1_13_1","unstructured":"Alexander Hermans* Lucas Beyer* and Bastian Leibe. 2017. In defense of the triplet loss for person re-identification. arXiv:1703.07737. Retrieved from https:\/\/arxiv.org\/abs\/1703.07737.  Alexander Hermans* Lucas Beyer* and Bastian Leibe. 2017. In defense of the triplet loss for person re-identification. arXiv:1703.07737. Retrieved from https:\/\/arxiv.org\/abs\/1703.07737."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298629"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2011.5981771"},{"volume-title":"Proceedings of the International Conference on Learning Representations (ICLR\u201915)","author":"Diederik","key":"e_1_2_1_16_1","unstructured":"Diederik P. Kingma and Jimmy Ba. 2015. Adam: A method for stochastic optimization . In Proceedings of the International Conference on Learning Representations (ICLR\u201915) . Diederik P. Kingma and Jimmy Ba. 2015. Adam: A method for stochastic optimization. In Proceedings of the International Conference on Learning Representations (ICLR\u201915)."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2354409.2354748"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5244\/C.26.24"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2019.107016"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.08.001"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6804"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/3172077.3172193"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298832"},{"key":"e_1_2_1_24_1","unstructured":"Shan Lin Haoliang Li Chang-Tsun Li and Alex Chichung Kot. 2018. Multi-task mid-level feature alignment network for unsupervised cross-dataset person re-identification. arXiv:1807.01440. Retrieved from https:\/\/arxiv.org\/abs\/1807.01440.  Shan Lin Haoliang Li Chang-Tsun Li and Alex Chichung Kot. 2018. Multi-task mid-level feature alignment network for unsupervised cross-dataset person re-identification. arXiv:1807.01440. Retrieved from https:\/\/arxiv.org\/abs\/1807.01440."},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR\u201920)","author":"Lin Yutian","year":"2020","unstructured":"Yutian Lin , Lingxi Xie , Yu Wu , Chenggang Yan , and Qi Tian . 2020 . Unsupervised person re-identification via softened similarity learning . In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR\u201920) . Yutian Lin, Lingxi Xie, Yu Wu, Chenggang Yan, and Qi Tian. 2020. Unsupervised person re-identification via softened similarity learning. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR\u201920)."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2019.06.006"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5540147"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.2347059"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.146"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.146"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.460"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.06.037"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48881-3_2"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.106455"},{"key":"e_1_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Liangchen Song Cheng Wang Lefei Zhang Bo Du Qian Zhang Chang Huang and Xinggang Wang. 2020. Unsupervised domain adaptive re-identification: Theory and practice. Pattern Recogn. (2020) 107173.  Liangchen Song Cheng Wang Lefei Zhang Bo Du Qian Zhang Chang Huang and Xinggang Wang. 2020. Unsupervised domain adaptive re-identification: Theory and practice. Pattern Recogn. (2020) 107173.","DOI":"10.1016\/j.patcog.2019.107173"},{"volume-title":"Proceedings of the 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR\u201919)","author":"Sun X.","key":"e_1_2_1_36_1","unstructured":"X. Sun and L. Zheng . 2019. Dissecting person re-identification from the viewpoint of viewpoint . In Proceedings of the 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR\u201919) . 608\u2013617. X. Sun and L. Zheng. 2019. Dissecting person re-identification from the viewpoint of viewpoint. In Proceedings of the 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR\u201919). 608\u2013617."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2733373.2807412"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2016.7532461"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00242"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.27"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00016"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2018.2870522"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/1577069.1577078"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.12.022"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.08.029"},{"key":"e_1_2_1_46_1","unstructured":"Xun Yang Meng Wang and Dacheng Tao. [n.d.]. Person re-identification with metric learning using privileged information. (unpublished).  Xun Yang Meng Wang and Dacheng Tao. [n.d.]. Person re-identification with metric learning using privileged information. (unpublished)."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.113"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.113"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00225"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1515\/9783110524116"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/2919332.2919877"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/2919332.2919877"},{"key":"e_1_2_1_53_1","volume-title":"Hauptmann","author":"Zheng Liang","year":"2016","unstructured":"Liang Zheng , Yi Yang , and Alexander G . Hauptmann . 2016 . Person re-identification: Past, present and future. arXiv:1610.02984. Retrieved from https:\/\/arxiv.org\/abs\/1610.02984. Liang Zheng, Yi Yang, and Alexander G. Hauptmann. 2016. Person re-identification: Past, present and future. arXiv:1610.02984. Retrieved from https:\/\/arxiv.org\/abs\/1610.02984."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159171"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.405"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.389"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01261-8_11"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00069"},{"key":"e_1_2_1_59_1","unstructured":"Zhun Zhong Liang Zheng Zhedong Zheng Shaozi Li and Yi Yang. 2017. Camera style adaptation for person re-identification. arXiv:1711.10295. Retrieved from https:\/\/arxiv.org\/abs\/1711.10295.  Zhun Zhong Liang Zheng Zhedong Zheng Shaozi Li and Yi Yang. 2017. Camera style adaptation for person re-identification. arXiv:1711.10295. Retrieved from https:\/\/arxiv.org\/abs\/1711.10295."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00541"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.06.026"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.10.005"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2019.06.007"}],"container-title":["ACM Transactions on Intelligent Systems and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3454130","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3454130","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:52Z","timestamp":1750268992000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3454130"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,8]]},"references-count":64,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,8,31]]}},"alternative-id":["10.1145\/3454130"],"URL":"https:\/\/doi.org\/10.1145\/3454130","relation":{},"ISSN":["2157-6904","2157-6912"],"issn-type":[{"type":"print","value":"2157-6904"},{"type":"electronic","value":"2157-6912"}],"subject":[],"published":{"date-parts":[[2021,6,8]]},"assertion":[{"value":"2020-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-03-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}