Results 11 to 20 of about 780,767 (299)
Surveillance video has been widely used in business, security, search, and other fields. Identifying and locating specific pedestrians in surveillance video has an important application value in criminal investigation, search and rescue, etc.
Mingwei Lei +6 more
doaj +1 more source
Quantifying Privacy Risks for Continuous Trait Data
In the context of life sciences, the rapid biotechnical development leads to the creation of huge amounts of biological data. The use of such data naturally brings concerns on human genetic privacy breaches, which also discourage biological data sharing.
Muqing He +5 more
doaj +1 more source
Faster Person Re-identification [PDF]
Fast person re-identification (ReID) aims to search person images quickly and accurately. The main idea of recent fast ReID methods is the hashing algorithm, which learns compact binary codes and performs fast Hamming distance and counting sort. However, a very long code is needed for high accuracy (e.g. 2048), which compromises search speed.
Wang, G, Gong, S, Cheng, J, Hou, Z
openaire +3 more sources
Vehicle trajectory data play an important role in autonomous driving and intelligent traffic control. With the widespread deployment of roadside sensors, such as cameras and millimeter-wave radar, it is possible to obtain full-sample vehicle trajectories
Guimin Su +6 more
doaj +1 more source
Re-Identification in Differentially Private Incomplete Datasets
Efforts to counter COVID-19 reaffirmed the importance of rich medical, behavioral, and sociological data. To make data available to many researchers who can conduct statistical analyses and machine learning, personally identifiable information must be ...
Yuichi Sei +2 more
doaj +1 more source
Two new cyclopiane diterpenes and a new cladosporin precursor, together with four known related compounds, were isolated from the marine sediment-derived fungus Penicillium antarcticum KMM 4670, which was re-identified based on phylogenetic inference ...
Anton N. Yurchenko +14 more
doaj +1 more source
Illumination-Adaptive Person Re-Identification [PDF]
Accepted by ...
Zelong Zeng +5 more
openaire +2 more sources
Person Re-Identification via Attention Pyramid [PDF]
In this paper, we propose an attention pyramid method for person re-identification. Unlike conventional attention-based methods which only learn a global attention map, our attention pyramid exploits the attention regions in a multi-scale manner because human attention varies with different scales.
Guangyi Chen +4 more
openaire +3 more sources
Unsupervised Tracklet Person Re-Identification [PDF]
Accepted to appear in IEEE Transactions on Pattern Analysis and Machine Intelligence.
Minxian Li, Xiatian Zhu, Shaogang Gong
openaire +4 more sources
Speaker Re-identification with Speaker Dependent Speech Enhancement [PDF]
While the use of deep neural networks has significantly boosted speaker recognition performance, it is still challenging to separate speakers in poor acoustic environments.
Hain, Thomas, Huang, Qiang, Shi, Yanpei
core +2 more sources

