269,923 Hits in 6.3 sec

Multi-Level Fusion Model for Person Re-Identification by Attribute Awareness

Shengyu Pei, Xiaoping Fan
2022 Algorithms  
We find that high-level attributes, semantic information, and part-based local information alignment are useful for person Re-ID networks.  ...  In this study, we propose a person re-recognition network with part-based attribute-enhanced features.  ...  The metrics in "2" are commonly used for person re-identification problems. The embedded features in "1" are used for output visualization.  ... 
doi:10.3390/a15040120 fatcat:b6cakzqi6fasth77suk4pvn634

Multi-label CNN based pedestrian attribute learning for soft biometrics

Jianqing Zhu, Shengcai Liao, Dong Yi, Zhen Lei, Stan Z. Li
2015 2015 International Conference on Biometrics (ICB)  
Moreover, we propose an attribute assisted person reidentification method, which fuses attribute distances and low-level feature distances between pairs of person images to improve person re-identification  ...  Recently, pedestrian attributes like gender, age and clothing etc., have been used as soft biometric traits for recognizing people.  ...  There are several person re-identification methods using attribute information.  ... 
doi:10.1109/icb.2015.7139070 dblp:conf/icb/ZhuLYLL15 fatcat:57bmi2gg2jeyrkgnuaseia4ip4

Multi-Task Learning with Low Rank Attribute Embedding for Person Re-Identification

Chi Su, Fan Yang, Shiliang Zhang, Qi Tian, Larry S. Davis, Wen Gao
2015 2015 IEEE International Conference on Computer Vision (ICCV)  
We propose a novel Multi-Task Learning with Low Rank Attribute Embedding (MTL-LORAE) framework for person re-identification.  ...  Re-identifications from multiple cameras are regarded as related tasks to exploit shared information to improve re-identification accuracy.  ...  Introduction The aim of person re-identification is to identify a person in a probe image/video by searching for the most similar instances from a gallery set.  ... 
doi:10.1109/iccv.2015.426 dblp:conf/iccv/SuYZTDG15 fatcat:swkuvv5ohjdpdmpg6rnbufta3e

AttKGCN: Attribute Knowledge Graph Convolutional Network for Person Re-identification [article]

Bo Jiang, Xixi Wang, Jin Tang
2019 arXiv   pre-print
Discriminative feature representation of person image is important for person re-identification (Re-ID) task.  ...  Recently, attributes have been demonstrated beneficially in guiding for learning more discriminative feature representations for Re-ID.  ...  Re-identification We propose to integrate both visual and re-weighted attribute representations for person Re-ID.  ... 
arXiv:1911.10544v1 fatcat:nrhackccljcvbiriaje4bajxvm

A Comprehensive Overview of Person Re-Identification Approaches

Hongbo Wang, Haomin Du, Yue Zhao, Jiming Yan
2020 IEEE Access  
Person re-identification, identifying and tracking pedestrians in cross-domain monitoring systems, is an important technology in the computer vision field and of real significance for the construction  ...  Moreover, this overview summarizes the difficulties and challenges of re-identification and discusses the possible research directions for reference.  ...  Earlier studies directly integrated attributes into the person re-identification framework for attribute consistency matching [272] , fine-tuned feature extraction using attribute datasets [279] , or  ... 
doi:10.1109/access.2020.2978344 fatcat:amocokxx25btbdeswuqxasox4u

Myths and fallacies of "personally identifiable information"

Arvind Narayanan, Vitaly Shmatikov
2010 Communications of the ACM  
Re-identification without Pii Any information that distinguishes one person from another can be used for re-identifying anonymous data.  ...  As actual experience has shown, any remaining attributes can be used for re-identification, as long as they differ from individual to individual.  ... 
doi:10.1145/1743546.1743558 fatcat:4vc5g5mrpzbrnhz3wr7n6vhwla

An Evaluation of the Current State of Genomic Data Privacy Protection Technology and a Roadmap for the Future

B. A. Malin
2004 JAMIA Journal of the American Medical Informatics Association  
For a comparative re-identification analysis, the systems are mapped to a common formalism. Although there is variation in susceptibility, each system is deficient in its protection capacity.  ...  This report evaluates the extent to which current protection systems are capable of withstanding a range of re-identification methods, including genotype-phenotype inferences, location-visit patterns,  ...  With respect to genomic data, the status as a lesser-protected data type allows for re-identification using the above methods.  ... 
doi:10.1197/jamia.m1603 pmid:15492030 pmcid:PMC543823 fatcat:mxdoimzpkvgnfgit3xr3qtxhem

Improved Hard Example Mining by Discovering Attribute-based Hard Person Identity [article]

Xiao Wang, Ziliang Chen, Rui Yang, Bin Luo, Jin Tang
2019 arXiv   pre-print
Extensive experiments on two person re-identification benchmarks validated the effectiveness of our proposed algorithm.  ...  In this paper, we propose Hard Person Identity Mining (HPIM) that attempts to refine the hard example mining to improve the exploration efficacy in person re-identification.  ...  Many features are designed for person re-identification.  ... 
arXiv:1905.02102v3 fatcat:by3kuqsxrjfnrgsuopcw7wa2dm

Biomedical Data Identifiability in Canada and the European Union: From Risk Qualification to Risk Quantification?

Alexander Bernier, Bartha Knoppers
2021 SCRIPTed: A Journal of Law, Technology & Society  
We propose the use of maximum re-identification risk thresholds and quantitative methodologies to assess data identifiability and data anonymisation relative to measurable standards.  ...  These difficulties arise from the law's assessment of re-identification risk in reliance on qualitative tests of 'serious risk' or 'reasonable likelihood' as subjectively appreciated by adjudicators.  ...  justifications for re-identification risk quantification Expressing data identifiability standards as maximum re-identification risk thresholds, calculated using specified methodologies will ensure the  ... 
doi:10.2966/scrip.180121.4 fatcat:c37dwwecebgepcqlkvblpxg6ri

De-anonymizing Social Networks

Arvind Narayanan, Vitaly Shmatikov
2009 2009 30th IEEE Symposium on Security and Privacy  
We present a framework for analyzing privacy and anonymity in social networks and develop a new re-identification algorithm targeting anonymized social-network graphs.  ...  Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers, application developers, and data-mining researchers.  ...  The first author is grateful to Cynthia Dwork for introducing him to the problem of anonymity in social networks.  ... 
doi:10.1109/sp.2009.22 dblp:conf/sp/NarayananS09 fatcat:t5kvwlkcaffjznerid6n55xlia

The Re-identification Challenge [chapter]

Shaogang Gong, Marco Cristani, Chen Change Loy, Timothy M. Hospedales
2014 Person Re-Identification  
For making sense of the vast quantity of visual data generated by the rapid expansion of large scale distributed multi-camera systems, automated person re-identification is essential.  ...  Whilst solving the person re-identification problem is inherently challenging, it also promises enormous potential for a wide range of practical applications, ranging from security and surveillance to  ...  Chapter 5 embeds middle-level cloth attributes via a latent SVM framework for more robust person re-identification.  ... 
doi:10.1007/978-1-4471-6296-4_1 dblp:series/acvpr/GongCLH14 fatcat:l7jbhs4g2jgcxdjceywbszb374

Pedestrian re‐identification based on attribute mining and reasoning

Chao Li, Xiaoyu Yang, Kangning Yin, Yifan Chang, Zhiguo Wang, Guangqiang Yin
2021 IET Image Processing  
This paper tries finding a practical method to improve the performance of the pedestrian re-identification by combining pedestrian attributes and identities.  ...  Finally, using the semantic reasoning and information transmission function of graph convolutional network, the relationship between attribute features and pedestrian features can be mined.  ...  ACKNOWLEDGEMENTS The authors also would like to thank Center for Public Security Information and Equipment Integration Technology, UESTC for providing computation platform.  ... 
doi:10.1049/ipr2.12225 fatcat:diph7pyu4zenfprgivhpgg63qa

Active image pair selection for continuous person re-identification

Abir Das, Rameswar Panda, Amit Roy-Chowdhury
2015 2015 IEEE International Conference on Image Processing (ICIP)  
In brief, we term this 'continuous person re-identification'.  ...  These attribute based explanations are used to learn attribute predictors along the way.  ...  In short, we term this as 'continuous person re-identification'.  ... 
doi:10.1109/icip.2015.7351610 dblp:conf/icip/DasPR15 fatcat:llvmcl6ifnfr7c4d262jkmpwr4

Deep and low-level feature based attribute learning for person re-identification

Yiqiang Chen, Stefan Duffner, Andrei Stoian, Jean-Yves Dufour, Atilla Baskurt
2018 Image and Vision Computing  
Both CNNs are pre-trained in a supervised way on attributes and person identities respectively, and then continue the training with a combined architecture for re-identification.  ...  In this paper, we propose a CNN-based pedestrian attribute-assisted person re-identification framework.  ...  The features used for re-identification Some other related methods also use attributes to perform person re-identification with CNNs, but the ways of integrating these attributes are different, for example  ... 
doi:10.1016/j.imavis.2018.09.001 fatcat:twy6k3dfebeuhpz3iwjc5qy6dm

AL-DDCNN: a distributed crossing semantic gap learning for person re-identification

Keyang Cheng, Yongzhao Zhan, Man Qi
2016 Concurrency and Computation  
Person re-identification across nonoverlapping camera views is a challenging computer vision task.  ...  It shows how midlevel "semantic attributes" can be generated for person description and further shows how this attributebased description can be used in synergy with low-level feature descriptions to improve  ...  For the person re-identification task, the attributes should be visually separable in the surveillance video scenario.  ... 
doi:10.1002/cpe.3766 fatcat:zku34sdpunccbevnszt6wzb3z4
« Previous Showing results 1 — 15 out of 269,923 results