{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T12:40:08Z","timestamp":1755780008939,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,22]],"date-time":"2023-12-22T00:00:00Z","timestamp":1703203200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,22]]},"DOI":"10.1145\/3660043.3660112","type":"proceedings-article","created":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T10:18:07Z","timestamp":1717064287000},"page":"383-388","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Cross-domain Pedestrian Re-recognition Research by Fusing Pedestrian Detection Algorithms"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-6045-8324","authenticated-orcid":false,"given":"Haifeng","family":"Wang","sequence":"first","affiliation":[{"name":"Inner Mongolia University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-6064-2662","authenticated-orcid":false,"given":"Liang","family":"Zhao","sequence":"additional","affiliation":[{"name":"Inner Mongolia University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-6846-1801","authenticated-orcid":false,"given":"Xiaodong","family":"Cheng","sequence":"additional","affiliation":[{"name":"Inner Mongolia University, China"}]}],"member":"320","published-online":{"date-parts":[[2024,5,30]]},"reference":[{"volume-title":"IEEE International Conference on Computer Vision. 2017:  5409-5418","author":"Qian X. L.","key":"e_1_3_2_1_1_1","unstructured":"X. L. Qian, Y. W. Fu, Y. G. Jiang, Multi-scale Deep Learning Architectures for Person Re-identification[C]. IEEE International Conference on Computer Vision. 2017: 5409-5418."},{"key":"e_1_3_2_1_2_1","series-title":"Lecture Notes in Computer Science. 2018:  501-518","volume-title":"Beyond Part Models: Person Retrieval with Refined Part Pooling (and A Strong Convolutional Baseline)[C]","author":"Sun Y. F.","unstructured":"Y. F. Sun, L. Zheng, Y. Yang, Beyond Part Models: Person Retrieval with Refined Part Pooling (and A Strong Convolutional Baseline)[C]. Lecture Notes in Computer Science. 2018: 501-518."},{"key":"e_1_3_2_1_3_1","series-title":"Lecture Notes in Computer Science. 2018:  661-678","volume-title":"Pose-Normalized Image Generation for Person Re-identification[C]","author":"Qian X. L.","unstructured":"X. L. Qian, Y. W. Fu, T. Xiang, Pose-Normalized Image Generation for Person Re-identification[C]. Lecture Notes in Computer Science. 2018: 661-678."},{"volume-title":"IEEE Conference on Computer Vision and Pattern Recognition. 2020:  6886-6895","author":"Liu C.","key":"e_1_3_2_1_4_1","unstructured":"C. Liu, X. J. Chang, Y. D. Shen, Unity Style Transfer for Person Re-Identification[C]. IEEE Conference on Computer Vision and Pattern Recognition. 2020: 6886-6895."},{"volume-title":"IEEE Conference on Computer Vision and Pattern Recognition. 2014:  580-587","author":"Girshick R.","key":"e_1_3_2_1_5_1","unstructured":"R. Girshick, J. Donahue, T. Darrell, Rich feature hierarchies for accurate object detection and semantic segmentation[C]. IEEE Conference on Computer Vision and Pattern Recognition. 2014: 580-587."},{"volume-title":"IEEE Conference on Computer Vision and Pattern Recognition. 2016:  779-788","author":"Redmon J.","key":"e_1_3_2_1_6_1","unstructured":"J. Redmon, S. Divvala, R. Girshick, You Only Look Once: Unified, Real-Time Object Detection[C]. IEEE Conference on Computer Vision and Pattern Recognition. 2016: 779-788."},{"key":"e_1_3_2_1_7_1","volume-title":"Arxiv","author":"Wang Chien-Yao","year":"2022","unstructured":"Chien-Yao Wang, Alexey Bochkovskiy, Hong-Yuan Mark Liao. YOLOv7: Trainable bag-of-freebies sets new state-of-the-art for real-time object detectors[J]. Arxiv, 2022,"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2913372"},{"key":"e_1_3_2_1_9_1","volume-title":"Joon-Young Lee","author":"Park Jongchan","year":"2018","unstructured":"Jongchan Park, Sanghyun Woo, Joon-Young Lee, BAM: Bottleneck Attention Module[J]. Arxiv, 2018,"},{"volume-title":"IEEE Conference on Computer Vision and Pattern Recognition. 2021:  13708-13717","author":"Hou Q. B.","key":"e_1_3_2_1_10_1","unstructured":"Q. B. Hou, D. Q. Zhou, J. S. Feng, Coordinate Attention for Efficient Mobile Network Design[C]. IEEE Conference on Computer Vision and Pattern Recognition. 2021: 13708-13717."},{"volume-title":"IEEE Conference on Computer Vision and Pattern Recognition. 2016:  770-778","author":"He K. M.","key":"e_1_3_2_1_11_1","unstructured":"K. M. He, X. Y. Zhang, S. Q. Ren, Deep Residual Learning for Image Recognition[C]. IEEE Conference on Computer Vision and Pattern Recognition. 2016: 770-778."},{"volume-title":"AAAI Conference on Artificial Intelligence. 2020:  13001-13008","author":"Zhong Z.","key":"e_1_3_2_1_12_1","unstructured":"Z. Zhong, L. Zheng, G. L. Kang, Random Erasing Data Augmentation[C]. AAAI Conference on Artificial Intelligence. 2020: 13001-13008."},{"key":"e_1_3_2_1_13_1","series-title":"Lecture Notes in Computer Science. 2018:  484-500","volume-title":"Two at Once: Enhancing Learning and Generalization Capacities via IBN-Net[C]","author":"Pan X. G.","unstructured":"X. G. Pan, P. Luo, J. P. Shi, Two at Once: Enhancing Learning and Generalization Capacities via IBN-Net[C]. Lecture Notes in Computer Science. 2018: 484-500."},{"volume-title":"IEEE Conference on Computer Vision and Pattern Recognition. 2016:  2818-2826","author":"Szegedy C.","key":"e_1_3_2_1_14_1","unstructured":"C. Szegedy, V. Vanhoucke, S. Ioffe, Rethinking the Inception Architecture for Computer Vision[C]. IEEE Conference on Computer Vision and Pattern Recognition. 2016: 2818-2826."}],"event":{"name":"ICIEAI 2023: 2023 International Conference on Information Education and Artificial Intelligence","acronym":"ICIEAI 2023","location":"Xiamen China"},"container-title":["Proceedings of the 2023 International Conference on Information Education and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3660043.3660112","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3660043.3660112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T12:23:30Z","timestamp":1755779010000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3660043.3660112"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,22]]},"references-count":14,"alternative-id":["10.1145\/3660043.3660112","10.1145\/3660043"],"URL":"https:\/\/doi.org\/10.1145\/3660043.3660112","relation":{},"subject":[],"published":{"date-parts":[[2023,12,22]]},"assertion":[{"value":"2024-05-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}