2023
DOI: 10.1007/s13042-023-01945-z
|View full text |Cite
|
Sign up to set email alerts
|

Multiformer-based hybrid learning with outlier re-assignment for unsupervised person re-identification

Min Jiang,
Qian Zhang,
Jun Kong
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 64 publications
0
2
0
Order By: Relevance
“…Afterward, the camera-aware methods used for comparison include SSL, 23 JVTC, 40 IICS, 24 CAP, 26 IIDS, 25 LMCL, 7 and MHOR. 41 SSL 23 proposes a re-ID framework with re-assigned soft label distribution learned from similar images, and it also employs camera labels and partial details of each sample image to guide similarity estimation. JVTC 40 utilizes the combination of local one-hot classification and global multi-class classification to enforce visual and temporal consistency and ensure the quality of label prediction.…”
Section: Comparative Methodsmentioning
confidence: 99%
“…Afterward, the camera-aware methods used for comparison include SSL, 23 JVTC, 40 IICS, 24 CAP, 26 IIDS, 25 LMCL, 7 and MHOR. 41 SSL 23 proposes a re-ID framework with re-assigned soft label distribution learned from similar images, and it also employs camera labels and partial details of each sample image to guide similarity estimation. JVTC 40 utilizes the combination of local one-hot classification and global multi-class classification to enforce visual and temporal consistency and ensure the quality of label prediction.…”
Section: Comparative Methodsmentioning
confidence: 99%
“…This study examines the viability of network protection by consolidating artificial intelligence/ML into the spaces of mechanized reaction, danger forecast, and peculiarity discovery. Utilizing computer-based intelligence/ML calculations' capacities, associations might have the option to expect and defeat hurtful action, answer immediately to arising dangers, and invigorate their protections [15]. This article investigates the province of simulated intelligence/ML applications in online protection, displaying striking turns of events and their results.…”
Section: Introductionmentioning
confidence: 99%