{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:59Z","timestamp":1750219859014,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T00:00:00Z","timestamp":1685059200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Swinburne Sarawak HDR Fund","award":["1.7(2020)c 02?05"],"award-info":[{"award-number":["1.7(2020)c 02?05"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,5,26]]},"DOI":"10.1145\/3604383.3604385","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T04:10:38Z","timestamp":1689912638000},"page":"7-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Occluded Person Re-Identification using Region-based Convolutional Neural Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9144-3744","authenticated-orcid":false,"given":"Atiqul","family":"Islam","sequence":"first","affiliation":[{"name":"Faculty of Engineering, Computing and Science, Swinburne University of Technology, Malaysia and \rSwinburne University of Technology, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4413-2000","authenticated-orcid":false,"given":"Mark Tee Kit","family":"Tsun","sequence":"additional","affiliation":[{"name":"Faculty of Engineering, Computing and Science, Swinburne University of Technology, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6071-6399","authenticated-orcid":false,"given":"Lau","family":"Bee Theng","sequence":"additional","affiliation":[{"name":"Faculty of Engineering, Computing and Science, Swinburne University of Technology, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3126-3156","authenticated-orcid":false,"given":"Caslon","family":"Chua","sequence":"additional","affiliation":[{"name":"Faculty of Engineering, Computing and Science, Swinburne University of Technology, Australia"}]}],"member":"320","published-online":{"date-parts":[[2023,7,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Retrieved","author":"What","year":"2022","unstructured":"What is assistive technology? | DO-IT . Retrieved December 15, 2022 from https:\/\/www.washington.edu\/doit\/what-assistive-technology What is assistive technology? | DO-IT. Retrieved December 15, 2022 from https:\/\/www.washington.edu\/doit\/what-assistive-technology"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1108\/IR-07-2013-372"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3390\/robotics7010004"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SII.2016.7844084"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1061\/9780784412329.087"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/S00138-013-0516-Y"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1541\/IEEJIAS.131.151"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.982903"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-8512-5_15"},{"key":"e_1_3_2_1_10_1","unstructured":"HUMAN FOLLOWING ROBOT Technology and Communication 2022.  HUMAN FOLLOWING ROBOT Technology and Communication 2022."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.ROBOT.2021.103837"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3054775"},{"volume-title":"Mah\u0101witthay\u0101lai Ch\u012bang Mai","author":"Thailand Section IEEE","key":"e_1_3_2_1_13_1","unstructured":"IEEE Thailand Section , Mah\u0101witthay\u0101lai Ch\u012bang Mai . Center of Excellence in Community Health Informatics, and Institute of Electrical and Electronics Engineers . Occlusion detector using convolutional. IEEE Thailand Section, Mah\u0101witthay\u0101lai Ch\u012bang Mai. Center of Excellence in Community Health Informatics, and Institute of Electrical and Electronics Engineers. Occlusion detector using convolutional."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3138336"},{"key":"e_1_3_2_1_15_1","volume-title":"Person Re-identification: A Retrospective on Domain Specific Open Challenges and Future Trends. (February","author":"Zahra Asmat","year":"2022","unstructured":"Asmat Zahra , Nazia Perwaiz , Muhammad Shahzad , and Muhammad Moazam Fraz . 2022 . Person Re-identification: A Retrospective on Domain Specific Open Challenges and Future Trends. (February 2022). Retrieved from http:\/\/arxiv.org\/abs\/2202.13121 Asmat Zahra, Nazia Perwaiz, Muhammad Shahzad, and Muhammad Moazam Fraz. 2022. Person Re-identification: A Retrospective on Domain Specific Open Challenges and Future Trends. (February 2022). Retrieved from http:\/\/arxiv.org\/abs\/2202.13121"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00899"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00292"},{"volume-title":"ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE.","key":"e_1_3_2_1_18_1","unstructured":"2020. ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE. 2020. ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9415086"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19092080"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.349"},{"key":"e_1_3_2_1_22_1","first-page":"79","article-title":"Person Transfer GAN to Bridge Domain Gap for Person Re-Identification_CVPR_2018_paper.pdf","volume":"2018","author":"Wei Longhui","year":"2018","unstructured":"Longhui Wei , Shiliang Zhang , Wen Gao , and Qi Tian . 2018 . Person Transfer GAN to Bridge Domain Gap for Person Re-Identification_CVPR_2018_paper.pdf . Cvpr 2018 (2018), 79 \u2013 88 . Longhui Wei, Shiliang Zhang, Wen Gao, and Qi Tian. 2018. Person Transfer GAN to Bridge Domain Gap for Person Re-Identification_CVPR_2018_paper.pdf. Cvpr 2018 (2018), 79\u201388.","journal-title":"Cvpr"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.12.094"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3560442.3560449"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00063"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.48550\/arxiv.1904.00537"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.531"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3059515"},{"key":"e_1_3_2_1_29_1","volume-title":"Beyond Part Models: Person Retrieval with Refined Part Pooling (and a Strong Convolutional Baseline). (November","author":"Sun Yifan","year":"2017","unstructured":"Yifan Sun , Liang Zheng , Yi Yang , Qi Tian , and Shengjin Wang . 2017. Beyond Part Models: Person Retrieval with Refined Part Pooling (and a Strong Convolutional Baseline). (November 2017 ). Yifan Sun, Liang Zheng, Yi Yang, Qi Tian, and Shengjin Wang. 2017. Beyond Part Models: Person Retrieval with Refined Part Pooling (and a Strong Convolutional Baseline). (November 2017)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.48550\/arxiv.1801.00881"},{"key":"e_1_3_2_1_31_1","volume-title":"STNReID: Deep Convolutional Networks with Pairwise Spatial Transformer Networks for Partial Person Re-identification. (March","author":"Luo Hao","year":"2019","unstructured":"Hao Luo , Xing Fan , Chi Zhang , and Wei Jiang . 2019. STNReID: Deep Convolutional Networks with Pairwise Spatial Transformer Networks for Partial Person Re-identification. (March 2019 ). Hao Luo, Xing Fan, Chi Zhang, and Wei Jiang. 2019. STNReID: Deep Convolutional Networks with Pairwise Spatial Transformer Networks for Partial Person Re-identification. (March 2019)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3033165"},{"key":"e_1_3_2_1_33_1","volume-title":"ABD-Net: Attentive but diverse person re-identification. ArXiv","author":"Chen Tianlong","year":"2019","unstructured":"Tianlong Chen , Shaojin Ding , Jingyi Xie , Ye Yuan , Wuyang Chen , Yang Yang , Zhou Ren , and Zhangyang Wang . 2019. ABD-Net: Attentive but diverse person re-identification. ArXiv ( 2019 ), 8351\u20138361. Tianlong Chen, Shaojin Ding, Jingyi Xie, Ye Yuan, Wuyang Chen, Yang Yang, Zhou Ren, and Zhangyang Wang. 2019. ABD-Net: Attentive but diverse person re-identification. ArXiv (2019), 8351\u20138361."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.389"},{"key":"e_1_3_2_1_35_1","volume-title":"Retrieved","author":"Narayanan Arvind","year":"2021","unstructured":"Arvind Narayanan . 2021 . AI datasets are prone to mismanagement, study finds | VentureBeat. venturebeat.com\/ai . Retrieved March 17, 2023 from https:\/\/venturebeat.com\/ai\/ai-datasets-are-prone-to-mismanagement-study-finds\/ Arvind Narayanan. 2021. AI datasets are prone to mismanagement, study finds | VentureBeat. venturebeat.com\/ai. Retrieved March 17, 2023 from https:\/\/venturebeat.com\/ai\/ai-datasets-are-prone-to-mismanagement-study-finds\/"}],"event":{"name":"ICHMI 2023: 2023 3rd International Conference on Human Machine Interaction","acronym":"ICHMI 2023","location":"Taiyuan China"},"container-title":["Proceedings of the 2023 3rd International Conference on Human Machine Interaction"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3604383.3604385","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3604383.3604385","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:18Z","timestamp":1750178838000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3604383.3604385"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,26]]},"references-count":35,"alternative-id":["10.1145\/3604383.3604385","10.1145\/3604383"],"URL":"https:\/\/doi.org\/10.1145\/3604383.3604385","relation":{},"subject":[],"published":{"date-parts":[[2023,5,26]]},"assertion":[{"value":"2023-07-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}