{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:23:48Z","timestamp":1772907828030,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,28]]},"DOI":"10.1145\/3664647.3680823","type":"proceedings-article","created":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T06:59:27Z","timestamp":1729925967000},"page":"2252-2261","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Disentangling Identity Features from Interference Factors for Cloth-Changing Person Re-identification"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-7512-8662","authenticated-orcid":false,"given":"Yubo","family":"Li","sequence":"first","affiliation":[{"name":"Xidian University, Xi'an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1932-4390","authenticated-orcid":false,"given":"De","family":"Cheng","sequence":"additional","affiliation":[{"name":"Xidian University, Xi'an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8805-9792","authenticated-orcid":false,"given":"Chaowei","family":"Fang","sequence":"additional","affiliation":[{"name":"Xidian University, Xi'an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1392-8348","authenticated-orcid":false,"given":"Changzhe","family":"Jiao","sequence":"additional","affiliation":[{"name":"Xidian University, Xi'an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4695-6134","authenticated-orcid":false,"given":"Nannan","family":"Wang","sequence":"additional","affiliation":[{"name":"Xidian University, Xi'an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7985-0037","authenticated-orcid":false,"given":"Xinbo","family":"Gao","sequence":"additional","affiliation":[{"name":"Chongqing University of Post and Telecommunications, Chongqing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Began: Boundary equilibrium generative adversarial networks. arXiv preprint arXiv:1703.10717","author":"Berthelot David","year":"2017","unstructured":"David Berthelot, Thomas Schumm, and Luke Metz. Began: Boundary equilibrium generative adversarial networks. arXiv preprint arXiv:1703.10717, 2017."},{"key":"e_1_3_2_1_2_1","first-page":"8146","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Chen Jiaxing","year":"2021","unstructured":"Jiaxing Chen, Xinyang Jiang, Fudong Wang, Jun Zhang, Feng Zheng, Xing Sun, and Wei-Shi Zheng. Learning 3d shape feature for texture-insensitive person re-identification. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pages 8146--8155, 2021."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.145"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i1.25116"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02179"},{"key":"e_1_3_2_1_7_1","article-title":"Identity-guided collaborative learning for cloth-changing person reidentification","author":"Gao Zan","year":"2023","unstructured":"Zan Gao, Shengxun Wei, Weili Guan, Lei Zhu, Meng Wang, and Shengyong Chen. Identity-guided collaborative learning for cloth-changing person reidentification. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2023.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"e_1_3_2_1_8_1","volume-title":"Generative adversarial nets. Advances in neural information processing systems, 27","author":"Goodfellow Ian","year":"2014","unstructured":"Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. Generative adversarial nets. Advances in neural information processing systems, 27, 2014."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00113"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612416"},{"key":"e_1_3_2_1_11_1","first-page":"1735","volume-title":"Dimensionality reduction by learning an invariant mapping. In 2006 IEEE computer society conference on computer vision and pattern recognition (CVPR'06)","author":"Hadsell Raia","year":"2006","unstructured":"Raia Hadsell, Sumit Chopra, and Yann LeCun. Dimensionality reduction by learning an invariant mapping. In 2006 IEEE computer society conference on computer vision and pattern recognition (CVPR'06), volume 2, pages 1735--1742. IEEE, 2006."},{"key":"e_1_3_2_1_12_1","first-page":"22066","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Han Ke","year":"2023","unstructured":"Ke Han, Shaogang Gong, Yan Huang, Liang Wang, and Tieniu Tan. Clothingchange feature augmentation for person re-identification. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pages 22066--22075, 2023."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33018385"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_15_1","volume-title":"defense of the triplet loss for person re-identification. arXiv preprint arXiv:1703.07737","author":"Hermans Alexander","year":"2017","unstructured":"Alexander Hermans, Lucas Beyer, and Bastian Leibe. In defense of the triplet loss for person re-identification. arXiv preprint arXiv:1703.07737, 2017."},{"key":"e_1_3_2_1_16_1","first-page":"10513","volume-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","author":"Hong Peixian","year":"2021","unstructured":"Peixian Hong, Tao Wu, Ancong Wu, Xintong Han, and Wei-Shi Zheng. Fine-grained shape-appearance mutual learning for cloth-changing person reidentification. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pages 10513--10522, 2021."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00954"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01168"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2024.3374634"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2022.3183469"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01388"},{"key":"e_1_3_2_1_23_1","volume-title":"Kingma and Jimmy Ba. Adam: A method for stochastic optimization. CoRR, abs\/1412.6980","author":"Diederik","year":"2014","unstructured":"Diederik P. Kingma and Jimmy Ba. Adam: A method for stochastic optimization. CoRR, abs\/1412.6980, 2014."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5891"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.3048039"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00243"},{"key":"e_1_3_2_1_27_1","article-title":"Dual level adaptive weighting for cloth-changing person re-identification","author":"Liu Fangyi","year":"2023","unstructured":"Fangyi Liu, Mang Ye, and Bo Du. Dual level adaptive weighting for cloth-changing person re-identification. IEEE Transactions on Image Processing, 2023.","journal-title":"IEEE Transactions on Image Processing"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.01797"},{"key":"e_1_3_2_1_29_1","article-title":"Clothes changing person re-identification via universal framework with association and forgetting learning","author":"Liu Yuxuan","year":"2023","unstructured":"Yuxuan Liu, Hongwei Ge, Zhen Wang, Yaqing Hou, and Mingde Zhao. Clothes changing person re-identification via universal framework with association and forgetting learning. IEEE Transactions on Multimedia, 2023.","journal-title":"IEEE Transactions on Multimedia"},{"key":"e_1_3_2_1_30_1","volume-title":"Conditional generative adversarial nets. arXiv preprint arXiv:1411.1784","author":"Mirza Mehdi","year":"2014","unstructured":"Mehdi Mirza and Simon Osindero. Conditional generative adversarial nets. arXiv preprint arXiv:1411.1784, 2014."},{"key":"e_1_3_2_1_31_1","first-page":"1041","volume-title":"Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision","author":"Nguyen Vuong D","year":"2024","unstructured":"Vuong D Nguyen, Khadija Khaldi, Dung Nguyen, Pranav Mantini, and Shishir Shah. Contrastive viewpoint-aware shape learning for long-term person reidentification. In Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pages 1041--1049, 2024."},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the Asian Conference on Computer Vision","author":"Qian Xuelin","year":"2020","unstructured":"Xuelin Qian, Wenxuan Wang, Li Zhang, Fangrui Zhu, Yanwei Fu, Tao Xiang, Yu-Gang Jiang, and Xiangyang Xue. Long-term cloth-changing person reidentification. In Proceedings of the Asian Conference on Computer Vision, 2020."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2021.3091924"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01225-0_30"},{"key":"e_1_3_2_1_35_1","first-page":"2579","article-title":"Visualizing data using t-sne","volume":"9","author":"van der Maaten Laurens","year":"2008","unstructured":"Laurens van der Maaten and Geoffrey E. Hinton. Visualizing data using t-sne. Journal of Machine Learning Research, 9:2579--2605, 2008.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00423"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2018.2822810"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3240508.3240552"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3611715"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00029"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/166"},{"key":"e_1_3_2_1_42_1","volume-title":"Person re-identification by contour sketch under moderate clothing change","author":"Yang Qize","year":"2029","unstructured":"Qize Yang, Ancong Wu, and Wei-Shi Zheng. Person re-identification by contour sketch under moderate clothing change. IEEE transactions on pattern analysis and machine intelligence, 43(6):2029--2046, 2019."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00148"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2020.2998275"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.103"},{"key":"e_1_3_2_1_46_1","volume-title":"Random erasing data augmentation. ArXiv, abs\/1708.04896","author":"Zhong Zhun","year":"2017","unstructured":"Zhun Zhong, Liang Zheng, Guoliang Kang, Shaozi Li, and Yi Yang. Random erasing data augmentation. ArXiv, abs\/1708.04896, 2017."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58580-8_21"}],"event":{"name":"MM '24: The 32nd ACM International Conference on Multimedia","location":"Melbourne VIC Australia","acronym":"MM '24","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 32nd ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664647.3680823","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664647.3680823","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:07Z","timestamp":1750295887000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664647.3680823"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":48,"alternative-id":["10.1145\/3664647.3680823","10.1145\/3664647"],"URL":"https:\/\/doi.org\/10.1145\/3664647.3680823","relation":{},"subject":[],"published":{"date-parts":[[2024,10,28]]},"assertion":[{"value":"2024-10-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}