A spatial structural similarity triplet loss for auxiliary vehicle re-identification

来源 :Science China(Information Sciences) | 被引量 : 0次 | 上传用户:ruru0077
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Dear editor,Vehicle re-identification aiming to match vehicle images captured by different cameras plays an essential role in video surveillance systems for public security. However, vehicle re-identification is a challenging computer vision problem be
其他文献
Dear editor,rnFault-tolerant tracking control has recently become an area of research interest,in which fault detection,fault-tolerant control (FTC),and tracking-control techniques are inte-grated[1,2].It is noteworthy that disturbance is a criti-cal fact
期刊
Graph convolutional networks (GCNs) have been applied successfully in social networks and recommendation systems to analyze graph data.Unlike conventional neural networks,GCNs introduce an aggregation phase,which is both computation-and memory-intensive.T
Dear editor,rnMany complicated real-world systems can be considered as complex networks to analyze their macroscopic properties,e.g.,the Internet,power grids,and communication net-works[1].Recently,studies have found that many real-world networks are coup
期刊
Dear editor,rnThe fractional Fourier transform (FRFT) was proposed by Wiener in 1929.As an important and powerful analyzing tool for time-frequency analysis,the FRFT has been ap-plied in a lot of fields[1,2]such as signal processing,op-tics,radar,and quan
期刊
Dear editor,rnThe study of nonlinear time-delay systems made great progress in the past few decades[1]and some effective meth-ods were presented for special systems such as the approxi-mate linear method,sum of squares decomposition method,and nonlinear m
期刊
Dear editor,rnIn recent years,we have witnessed a rapid development of the side-channel attacks,which deviate from the tradi-tional block-box model and exploit the leakages of crypto-graphic devices.Among those attacks,the so-called differen-tial power an
期刊
Dear editor,rnOrthogonal frequency division multiplexing (OFDM) has been adopted in new radio (NR)[1],and multiple-port de-modulation reference signal (DMRS) has been designed to achieve channel estimation.In NR,two ports of DMRS share the same frequency
期刊
Dear editor,rnTo maintain the confidentiality of the sensitive data,users tend to encrypt their data under an associated access pol-icy (or attributes) beforeoutsourcing them to the cloud.In the traditional access control model via cryptographic approache
期刊
Privacy issues in control systems are getting more and more attention from both industry and research.In recent years,information technology and artificial intelligence technol-ogy are being increasingly employed in emerging applica-tions such as the Inte
期刊
The RRAM-based accelerators enable fast and energy-efficient inference for neural networks.However,there are some requirements to deploy neural networks on RRAM-based accelerators,which are not considered in existing neural networks.(1) Because the noise