Computer Science ›› 2026, Vol. 53 ›› Issue (3): 287-294.doi: 10.11896/jsjkx.260100073

• Computer Graphics & Multimedia • Previous Articles     Next Articles

Pedestrian Re-identification Methods Based on Limited Target Data and Deep Learning

FU Yukai1, LI Qingzhen2, DONG Zhixue3, SHI Dongli4, ZHAO Peng4   

  1. 1 School of Computer Science, University of St.Andrews, United Kingdom, St.Andrews KY169AJ, United Kingdom
    2 Institute of Data Rule of Law, China University of Political Science and Law, Beijing 102249, China
    3 School of Statistics and Mathematics, Central University of Finance and Economics, Beijing 100081, China
    4 College of Computer Science and Technology, Taiyuan Normal University, Jinzhong, Shanxi 030619, China
  • Received:2025-10-13 Revised:2026-01-22 Published:2026-03-12
  • About author:FU Yukai,born in 2001,postgraduate,is a member of CCF(No.A35354M).His main research interests include machine learning and visual analysis.
    ZHAO Peng,born in 1973,Ph.D,professor,is a member of CCF(No.18032S).His main research interest is blockchain.
  • Supported by:
    Key Project of Shanxi Provincial Special Fund for Science and Technology Strategic Research(202304031401011).

Abstract: Person re-identification(ReID) has significant application value in cross-camera retrieval scenarios,but deep models often face a significant domain shift problem in real-world deployments.This means that a model trained well on the source domain dataset experiences a sharp performance drop when transferred to a new target camera network.Existing unsupervised domain adaptation methods typically rely on large amounts of unlabeled target domain data for offline clustering and self-training.However,this prerequisite is often difficult to meet in situations involving temporary deployments,privacy constraints,or difficulty in collecting target data in advance.To address this issue,this paper proposes a deep person re-identification adaptation framework based on a small amount of target data.Starting with a pre-trained model in the source domain,it freezes the backbone parameters and introduces only a lightweight,efficient adaptation module for target domain calibration.Simultaneously,it employs a prototype-based stable few-sample decision-making approach,aggregating a small number of labeled target samples into class centers to reduce few-sample noise.Furthermore,it combines prototype classification loss,ranking constraints,and distillation regularization for optimization,balancing target domain adaptability and feature stability.In cross-dataset migration experiments on Market-1501 and DukeMTMC-reID,the proposed method achieves significant improvements in both migration directions:79.68% mAP and 93.10% Rank-1 on Market→Duke,and 76.07% mAP and 93.79% Rank-1 on Duke→Market,with a continuous improvement trend in incremental adaptation rounds.This method can achieve effective and iterative cross-domain adaptation without relying on large-scale target data.

Key words: Person re-identification, Deep learning, Unsupervised domain, Limited target data, Few-sample decision-making

CLC Number: 

  • TP391
[1]JIN L,LIU M K,ZHANG C H,ET AL.Pedestrian Re-identification Based on Spatial Transformation and Multi-scale Feature Fusion[J].Computer Science,,2025,52(S1):240800156-7.
[2]TIAN Q,WANG B,ZHOU Z X.Survey on Unsupervised Person Re-identification[J].Computer Engineering,2025,51(7):12-30.
[3]HAN K,WANG Y,CHEN H,et al.A survey on vision transformer[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2022,45(1):87-110.
[4]KIM S,KIM D,CHO M,et al.Proxy anchor loss for deep metric learning[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.IEEE,2020:3238-3247.
[5]WANG T,JI F F,CUI S J,et al.Adversarial Unsupervised Domain Adaptation Image Classification Method Based on Contrastive Learning[J].Journal of Computer-Aided Design & Computer Graphics,2025,37(5):844-855.
[6]FANG Y Q,PEW-THIAN Y,LIN W L,et al.Source-free unsupervised domain adaptation:A survey[J].Neural Networks,2024,174(3):106230-106240.
[7]LUO H,JIANG W,FAN X,et al.A Survey on Deep Learning Based Person Re-identification[J].Acta Automatica Sinica,2019,45(11):2032-2049.
[8]WANG S Y,XIAO S.Review of Person Re-identification[J].Journal of Beijing University of Technology,2022,48(10):1100-1112.
[9]GE Y,CHEN D,LI H.Mutual mean-teaching:Pseudo label refinery for unsupervised domain adaptation on person re-identification[J].arXiv:2001.01526,2020.
[10]ZHONG Z,ZHENG L,LUO Z,et al.Invariance matters:Exemplar memory for domain adaptive person re-identification[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.IEEE,2019:598-607.
[11]CHEN Q,WANG T,YANG Z,et al.SDPL:Shifting-dense partition learning for uav-view geo-localization[J].IEEE Transactions on Circuits and Systems for Video Technology,2024,34(11):11810-11824.
[12]LIAO Y,SU J,MA D,et al.UAV-satellite cross-view image matching based on adaptive threshold-guided ring partitioning framework[J].Remote Sensing,2025,17(14):2448-2457.
[13]WANG X,LI Y,LIU J,et al.Few-shot person re-identification with adaptive prototype refinement[J].IEEE Transactions on Image Processing,2023,32(12):4567-4580.
[14]CHEN S,ZHANG H,WANG Z,et al.Distillation-aware para-meter-efficient tuning for cross-domain re-identification[C]//Proceedings of the European Conference on Computer Vision.2024:389-406.
[15]JOULIN A,MOUSTAPHA C,DAVID G,et al.Efficient softmax approximation for GPUs[C]//International Conference on Machine Learning.IEEE,2017:1302-1310.
[16]LIU Y,SONG M.Few samples learning based on granular neural networks[J].Granular Computing,2022,7(3):577-589.
[17]FU M,WANG X,WANG J,et al.Prototype bayesian meta-learning for few-shot image classification[J].IEEE Transactions on Neural Networks and Learning Systems,2024,36(4):7010-7024.
[18]YANG H M,ZHANG X Y,YIN F,et al.Robust classification with convolutional prototype learning[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.IEEE,2018:3474-3482.
[19]ZHANG X,SU Z,HU X,et al.Semisupervised momentum prototype network for gearbox fault diagnosis under limited labeled samples[J].IEEE Transactions on Industrial Informatics,2022,18(9):6203-6213.
[20]LIANG Z,SHEN L Y,TIAN L,et al.Scalable person re-identification:A benchmark[C]//Proceedings of the IEEE International Conference on Computer Vision.IEEE,2015:1116-1124.
[21]ZHANG Z,WU J,ZHANG X,et al.Multi-target,multi-camera tracking by hierarchical clustering:Recent progress on dukemtmc project[J].arXiv:1712.09531,2017.
[22]JOHNSON A Y,SUN J,BOBICK A F.Predicting large population data cumulative match characteristic performance from small population data[C]//International Conference on Audio-and Video-Based Biometric Person Authentication.IEEE,2003:821-829.
[1] YU Ding, LI Zhangwei. Prediction Method of RNA Secondary Structure Based on Transformer Architecture [J]. Computer Science, 2026, 53(3): 375-382.
[2] DU Jiantong, GUAN Zeli, XUE Zhe. Multi-task Learning-based Ophthalmic Video Feature Fusion and Multi-dimensional Profiling [J]. Computer Science, 2026, 53(3): 383-391.
[3] SU Ruitao, REN Jiongjiong, CHEN Shaozhen. Deep Learning-based Neural Differential Distinguishers for GIFT-128 and ASCON [J]. Computer Science, 2026, 53(3): 453-458.
[4] LI Zequn, DING Fei. Fatigue Driving Detection Based on Dual-branch Fusion and Segmented Domain AdaptationTransfer Learning [J]. Computer Science, 2026, 53(3): 78-87.
[5] XI Penghui, WU Xiazhen, JIANG Wencong, FANG Liangda, HE Chaobo, GUAN Quanlong. Review of Personalized Educational Resource Recommendations [J]. Computer Science, 2026, 53(2): 1-15.
[6] HUANG Jing, WANG Teng, LIU Jian, HU Kai, PENG Xin, HUANG Yamin, WEN Yuanqiao. Multimodal Visual Detection for Underwater Sonar Target Images [J]. Computer Science, 2026, 53(2): 227-235.
[7] LIU Chenhong, LI Fenglian, YANG Jia, WANG Suzhe, CHEN Guijun. Boundary-focused Multi-scale Feature Fusion Network for Stroke Lesion Segmentation [J]. Computer Science, 2026, 53(2): 264-272.
[8] HUANG Miaomiao, WANG Huiying, WANG Meixia, WANG Yejiang , ZHAO Yuhai. Review of Graph Embedding Learning Research:From Simple Graph to Complex Graph [J]. Computer Science, 2026, 53(1): 58-76.
[9] WANG Cheng, JIN Cheng. KAN-based Unsupervised Multivariate Time Series Anomaly Detection Network [J]. Computer Science, 2026, 53(1): 89-96.
[10] XUE Jingyan, XIA Jianan, HUO Ruili, LIU Jie, ZHOU Xuezhong. Review of Retinal Image Analysis Methods for OCT/OCTA Based on Deep Learning [J]. Computer Science, 2026, 53(1): 128-140.
[11] ZHOU Bingquan, JIANG Jie, CHEN Jiangmin, ZHAN Lixin. EvR-DETR:Event-RGB Fusion for Lightweight End-to-End Object Detection [J]. Computer Science, 2026, 53(1): 153-162.
[12] LIU Wei, XU Yong, FANG Juan, LI Cheng, ZHU Yujun, FANG Qun, HE Xin. Multimodal Air-writing Gesture Recognition Based on Radar-Vision Fusion [J]. Computer Science, 2025, 52(9): 259-268.
[13] YIN Shi, SHI Zhenyang, WU Menglin, CAI Jinyan, YU De. Deep Learning-based Kidney Segmentation in Ultrasound Imaging:Current Trends and Challenges [J]. Computer Science, 2025, 52(9): 16-24.
[14] ZENG Lili, XIA Jianan, LI Shaowen, JING Maike, ZHAO Huihui, ZHOU Xuezhong. M2T-Net:Cross-task Transfer Learning Tongue Diagnosis Method Based on Multi-source Data [J]. Computer Science, 2025, 52(9): 47-53.
[15] LI Yaru, WANG Qianqian, CHE Chao, ZHU Deheng. Graph-based Compound-Protein Interaction Prediction with Drug Substructures and Protein 3D Information [J]. Computer Science, 2025, 52(9): 71-79.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!