Recognition: unknown
Reinforcement-Guided Synthetic Data Generation for Privacy-Sensitive Identity Recognition
Pith reviewed 2026-05-10 16:48 UTC · model grok-4.3
The pith
A reinforcement-guided framework adapts pretrained generators to produce synthetic data that improves identity recognition in privacy-sensitive, data-scarce settings.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
The reinforcement-guided synthetic data generation framework, using cold-start adaptation followed by multi-objective reward optimization and dynamic sample selection, significantly improves generation fidelity and downstream classification accuracy while generalizing well to novel categories in small-data regimes.
What carries the argument
A multi-objective reward function in a reinforcement learning setup that jointly optimizes semantic consistency, coverage diversity, and expression richness to guide the generator.
Load-bearing premise
That optimizing the multi-objective reward for semantic consistency, diversity, and richness will yield samples that are realistic and effective for the recognition task without introducing biases or trade-offs.
What would settle it
Experiments on benchmark datasets where the framework-generated data fails to improve classification accuracy or fidelity compared to standard fine-tuning of the generator.
Figures
read the original abstract
High-fidelity generative models are increasingly needed in privacy-sensitive scenarios, where access to data is severely restricted due to regulatory and copyright constraints. This scarcity hampers model development--ironically, in settings where generative models are most needed to compensate for the lack of data. This creates a self-reinforcing challenge: limited data leads to poor generative models, which in turn fail to mitigate data scarcity. To break this cycle, we propose a reinforcement-guided synthetic data generation framework that adapts general-domain generative priors to privacy-sensitive identity recognition tasks. We first perform a cold-start adaptation to align a pretrained generator with the target domain, establishing semantic relevance and initial fidelity. Building on this foundation, we introduce a multi-objective reward that jointly optimizes semantic consistency, coverage diversity, and expression richness, guiding the generator to produce both realistic and task-effective samples. During downstream training, a dynamic sample selection mechanism further prioritizes high-utility synthetic samples, enabling adaptive data scaling and improved domain alignment. Extensive experiments on benchmark datasets demonstrate that our framework significantly improves both generation fidelity and classification accuracy, while also exhibiting strong generalization to novel categories in small-data regimes.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper proposes a reinforcement-guided synthetic data generation framework to address data scarcity in privacy-sensitive identity recognition tasks. It starts with cold-start adaptation of a pretrained generator to align with the target domain, followed by a multi-objective reward optimizing semantic consistency, coverage diversity, and expression richness to guide sample generation. A dynamic sample selection mechanism prioritizes high-utility samples during downstream training. Experiments on benchmark datasets are reported to show gains in generation fidelity, classification accuracy, and generalization to novel categories under small-data regimes.
Significance. If the empirical claims hold under rigorous validation, the work could meaningfully advance privacy-preserving ML by providing a task-aligned way to scale synthetic data without real data access. The integration of RL guidance with generative priors and the emphasis on multi-objective optimization plus adaptive selection offer a coherent mechanism to break the limited-data/poor-model cycle, with potential applicability to biometrics, medical imaging, or other regulated domains. The reported generalization to novel categories in low-data settings would be a notable strength if substantiated.
major comments (2)
- [§3.2] §3.2 (multi-objective reward definition): the central claim that jointly optimizing semantic consistency, coverage diversity, and expression richness produces samples without harmful trade-offs lacks supporting ablation or sensitivity analysis; the experiments should quantify whether optimizing one objective degrades another (e.g., via per-objective metrics on held-out sets) as this directly underpins the framework's effectiveness over simpler adaptation baselines.
- [§5] §5 (experimental results): the reported improvements in fidelity and accuracy are load-bearing for the contribution, yet the manuscript must include explicit baseline comparisons (e.g., vanilla fine-tuning, other RL-guided generators), quantitative deltas with statistical significance, and error analysis across runs; without these, the generalization claims to novel categories cannot be assessed as robust.
minor comments (2)
- [§3] Notation for the reward function components should be defined consistently in the main text rather than relying on supplementary material for full equations.
- [§5] Figure captions for generation examples should explicitly state the dataset, model variant, and any post-processing applied to aid reproducibility.
Simulated Author's Rebuttal
We thank the referee for the constructive and positive review, which highlights both the potential impact of our reinforcement-guided framework and areas where empirical validation can be strengthened. We address each major comment below and commit to revisions that will improve the rigor of the manuscript without altering its core contributions.
read point-by-point responses
-
Referee: [§3.2] §3.2 (multi-objective reward definition): the central claim that jointly optimizing semantic consistency, coverage diversity, and expression richness produces samples without harmful trade-offs lacks supporting ablation or sensitivity analysis; the experiments should quantify whether optimizing one objective degrades another (e.g., via per-objective metrics on held-out sets) as this directly underpins the framework's effectiveness over simpler adaptation baselines.
Authors: We agree that explicit ablation and sensitivity analysis would strengthen the justification for the multi-objective reward. The manuscript motivates the joint optimization by design to avoid single-aspect dominance, yet does not report quantitative trade-off measurements. In the revised version we will add a dedicated analysis subsection that evaluates per-objective metrics on held-out sets across different reward weightings and compares the full multi-objective setting against single-objective ablations. This will directly quantify any degradation between objectives and demonstrate advantages relative to simpler adaptation baselines. revision: yes
-
Referee: [§5] §5 (experimental results): the reported improvements in fidelity and accuracy are load-bearing for the contribution, yet the manuscript must include explicit baseline comparisons (e.g., vanilla fine-tuning, other RL-guided generators), quantitative deltas with statistical significance, and error analysis across runs; without these, the generalization claims to novel categories cannot be assessed as robust.
Authors: We concur that additional baseline comparisons and statistical reporting are required to make the empirical claims fully robust. While the current experiments demonstrate gains on benchmark datasets, they do not yet contain the full set of requested controls. The revised manuscript will expand Section 5 with explicit comparisons to vanilla fine-tuning and other RL-guided generators, report quantitative deltas, include statistical significance tests across runs, and provide error analysis (standard deviations and confidence intervals) to support the generalization results for novel categories under small-data regimes. revision: yes
Circularity Check
No significant circularity; framework uses external priors and task-defined rewards
full rationale
The paper's chain begins with a pretrained generator (external input) subjected to cold-start adaptation, followed by a multi-objective reward explicitly defined from independent criteria (semantic consistency, coverage diversity, expression richness) and a dynamic selection rule. None of these reduce to the target results by construction, self-definition, or fitted-parameter renaming. No equations are presented that equate predictions to inputs, and no load-bearing uniqueness theorems or ansatzes are imported via self-citation. Empirical claims rest on benchmark experiments rather than internal tautology, confirming the derivation is self-contained against external benchmarks.
Axiom & Free-Parameter Ledger
free parameters (1)
- weights in multi-objective reward
axioms (1)
- domain assumption Pretrained general-domain generative models can be aligned to target privacy-sensitive domains via cold-start adaptation
Reference graph
Works this paper leans on
-
[1]
Power to the people: The role of humans in interactive machine learning.AI magazine, 35(4):105– 120, 2014
Saleema Amershi, Maya Cakmak, William Bradley Knox, and Todd Kulesza. Power to the people: The role of humans in interactive machine learning.AI magazine, 35(4):105– 120, 2014. 1
2014
-
[2]
Sface: Privacy-friendly and accurate face recognition using synthetic data
Fadi Boutros, Marco Huber, Patrick Siebke, Tim Rieber, and Naser Damer. Sface: Privacy-friendly and accurate face recognition using synthetic data. In2022 IEEE International Joint Conference on Biometrics (IJCB), pages 1–11. IEEE,
-
[3]
Idiff-face: Synthetic-based face recognition through fizzy identity-conditioned diffusion model
Fadi Boutros, Jonas Henry Grebe, Arjan Kuijper, and Naser Damer. Idiff-face: Synthetic-based face recognition through fizzy identity-conditioned diffusion model. InProceedings of the IEEE/CVF International Conference on Computer Vi- sion, pages 19650–19661, 2023. 5, 6, 7
2023
-
[4]
Sface2: Synthetic-based face recognition with w-space identity-driven sampling.IEEE Transactions on Biometrics, Behavior, and Identity Science, 6(3):290–303,
Fadi Boutros, Marco Huber, Anh Thi Luu, Patrick Siebke, and Naser Damer. Sface2: Synthetic-based face recognition with w-space identity-driven sampling.IEEE Transactions on Biometrics, Behavior, and Identity Science, 6(3):290–303,
-
[5]
Eduarda Caldeira, Naser Damer, and Fadi Boutros. Neg- facediff: The power of negative context in identity- conditioned diffusion for synthetic face generation.arXiv preprint arXiv:2508.09661, 2025. 6, 7
-
[6]
Imagenet: A large-scale hierarchical im- age database
Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. Imagenet: A large-scale hierarchical im- age database. InComputer Vision and Pattern Recognition, pages 248–255, 2009. 3, 5
2009
-
[7]
An image is worth 16x16 words: Transformers for image recognition at scale
Alexey Dosovitskiy, Lucas Beyer, Alexander Kolesnikov, Dirk Weissenborn, Xiaohua Zhai, Thomas Unterthiner, Mostafa Dehghani, Matthias Minderer, Georg Heigold, Syl- vain Gelly, Jakob Uszkoreit, and Neil Houlsby. An image is worth 16x16 words: Transformers for image recognition at scale. InInternational Conference on Learning Representa- tions, 2021. 5
2021
-
[8]
Minimizing the accumulated trajectory error to improve dataset distillation
Jiawei Du, Yidi Jiang, Vincent YF Tan, Joey Tianyi Zhou, and Haizhou Li. Minimizing the accumulated trajectory error to improve dataset distillation. InProceedings of the IEEE/CVF conference on computer vision and pattern recognition, pages 3749–3758, 2023. 1
2023
-
[9]
Diversity-driven synthesis: Enhancing dataset distillation through directed weight adjustment.Advances in neural information processing systems, 37:119443–119465,
Jiawei Du, Xin Zhang, Juncheng Hu, Wenxing Huang, and Joey T Zhou. Diversity-driven synthesis: Enhancing dataset distillation through directed weight adjustment.Advances in neural information processing systems, 37:119443–119465,
-
[10]
Dpok: Reinforcement learning for fine-tuning text-to-image diffu- sion models.Advances in Neural Information Processing Systems, 36:79858–79885, 2023
Ying Fan, Olivia Watkins, Yuqing Du, Hao Liu, Moonkyung Ryu, Craig Boutilier, Pieter Abbeel, Moham- mad Ghavamzadeh, Kangwook Lee, and Kimin Lee. Dpok: Reinforcement learning for fine-tuning text-to-image diffu- sion models.Advances in Neural Information Processing Systems, 36:79858–79885, 2023. 3, 5
2023
-
[11]
Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron C
Ian J. Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron C. Courville, and Yoshua Bengio. Generative adversarial nets. InAd- vances in Neural Information Processing Systems, pages 2672–2680, 2014. 1, 2
2014
-
[12]
Advancing text-driven chest x- ray generation with policy-based reinforcement learning
Woojung Han, Chanyoung Kim, Dayun Ju, Yumin Shim, and Seong Jae Hwang. Advancing text-driven chest x- ray generation with policy-based reinforcement learning. InInternational Conference on Medical Image Computing and Computer-Assisted Intervention, pages 56–66. Springer,
-
[13]
Deep residual learning for image recognition
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. InIEEE Con- ference on Computer Vision and Pattern Recognition, pages 770–778, 2016. 5
2016
-
[14]
Denoising dif- fusion probabilistic models
Jonathan Ho, Ajay Jain, and Pieter Abbeel. Denoising dif- fusion probabilistic models. InAdvances in Neural Informa- tion Processing Systems, 2020. 1, 2
2020
-
[15]
Camera-specific informative data augmentation module for unbalanced person re-identification
Pingting Hong, Dayan Wu, Bo Li, and Weipinng Wang. Camera-specific informative data augmentation module for unbalanced person re-identification. InProceedings of the 30th ACM International Conference on Multimedia, pages 501–510, 2022. 5
2022
-
[16]
Contrastive-generative-contrastive: Neutralize subjectivity in sketch re-identification.IEEE Transactions on Informa- tion Forensics and Security, 2025
Zechao Hu, Zhengwei Yang, Hao Li, and Zheng Wang. Contrastive-generative-contrastive: Neutralize subjectivity in sketch re-identification.IEEE Transactions on Informa- tion Forensics and Security, 2025. 2
2025
-
[17]
Labeled faces in the wild: A database forstudying face recognition in unconstrained environments
Gary B Huang, Marwan Mattar, Tamara Berg, and Eric Learned-Miller. Labeled faces in the wild: A database forstudying face recognition in unconstrained environments. InWorkshop on faces in’Real-Life’Images: detection, align- ment, and recognition, 2008. 5
2008
-
[18]
Complementary data augmentation for cloth-changing person re-identification.IEEE Trans
Xuemei Jia, Xian Zhong, Mang Ye, Wenxuan Liu, and Wenxin Huang. Complementary data augmentation for cloth-changing person re-identification.IEEE Trans. Image Process., 31:4227–4239, 2022. 2
2022
-
[19]
Balancing privacy and perfor- mance: A many-in-one approach for image anonymization
Xuemei Jia, Jiawei Du, Hui Wei, Ruinian Xue, Zheng Wang, Hongyuan Zhu, and Jun Chen. Balancing privacy and perfor- mance: A many-in-one approach for image anonymization. InProceedings of the AAAI Conference on Artificial Intelli- gence, pages 17608–17616, 2025. 2
2025
-
[20]
Kankanhalli
Kajal Kansal, Yongkang Wong, and Mohan S. Kankanhalli. Privacy-enhancing person re-identification framework - A dual-stage approach. InIEEE/CVF Winter Conference on Applications of Computer Vision, pages 8528–8537, 2024. 2
2024
-
[21]
Training generative adver- sarial networks with limited data.Advances in neural infor- mation processing systems, 33:12104–12114, 2020
Tero Karras, Miika Aittala, Janne Hellsten, Samuli Laine, Jaakko Lehtinen, and Timo Aila. Training generative adver- sarial networks with limited data.Advances in neural infor- mation processing systems, 33:12104–12114, 2020. 1, 2
2020
-
[22]
Dc- face: Synthetic face generation with dual condition diffusion model
Minchul Kim, Feng Liu, Anil Jain, and Xiaoming Liu. Dc- face: Synthetic face generation with dual condition diffusion model. InProceedings of the ieee/cvf conference on com- puter vision and pattern recognition, pages 12715–12725,
-
[23]
Kingma and Jimmy Ba
Diederik P. Kingma and Jimmy Ba. Adam: A method for stochastic optimization. InInternational Conference on Learning Representations, 2015. 5
2015
-
[24]
Identity-driven three- player generative adversarial network for synthetic-based face recognition
Jan Niklas Kolf, Tim Rieber, Jurek Elliesen, Fadi Boutros, Arjan Kuijper, and Naser Damer. Identity-driven three- player generative adversarial network for synthetic-based face recognition. InProceedings of the IEEE/CVF Con- ference on Computer Vision and Pattern Recognition, pages 806–816, 2023. 2, 6
2023
-
[25]
Deep- reid: Deep filter pairing neural network for person re- identification
Wei Li, Rui Zhao, Tong Xiao, and Xiaogang Wang. Deep- reid: Deep filter pairing neural network for person re- identification. InConference on Computer Vision and Pat- tern Recognition, pages 152–159, 2014. 5
2014
-
[26]
Generative mo- ment matching networks
Yujia Li, Kevin Swersky, and Rich Zemel. Generative mo- ment matching networks. InInternational conference on ma- chine learning, pages 1718–1727. PMLR, 2015. 4
2015
-
[27]
Privacy-protected person re-identification via virtual sam- ples.IEEE Transactions on Information Forensics and Se- curity, 18:5495–5505, 2023
Yutian Lin, Xiaoyang Guo, Zheng Wang, and Bo Du. Privacy-protected person re-identification via virtual sam- ples.IEEE Transactions on Information Forensics and Se- curity, 18:5495–5505, 2023. 2
2023
-
[28]
Cloth-aware augmen- tation for cloth-generalized person re-identification
Fangyi Liu, Mang Ye, and Bo Du. Cloth-aware augmen- tation for cloth-generalized person re-identification. InPro- ceedings of the 32nd ACM International Conference on Mul- timedia, pages 4053–4062, 2024. 5
2024
-
[29]
Doubly stochastic neighbor embedding on spheres
Yao Lu, Jukka Corander, and Zhirong Yang. Doubly stochastic neighbor embedding on spheres.arXiv preprint arXiv:1609.01977, 2016. 7
-
[30]
A strong baseline and batch normalization neck for deep person re-identification.IEEE Trans
Hao Luo, Wei Jiang, Youzhi Gu, Fuxu Liu, Xingyu Liao, Shenqi Lai, and Jianyang Gu. A strong baseline and batch normalization neck for deep person re-identification.IEEE Trans. Multim., 22(10):2597–2609, 2020. 2
2020
-
[31]
Training diffusion models towards diverse image generation with reinforcement learning
Zichen Miao, Jiang Wang, Ze Wang, Zhengyuan Yang, Li- juan Wang, Qiang Qiu, and Zicheng Liu. Training diffusion models towards diverse image generation with reinforcement learning. InProceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 10844– 10853, 2024. 2, 3
2024
-
[32]
Conditional Generative Adversarial Nets
Mehdi Mirza and Simon Osindero. Conditional generative adversarial nets.arXiv preprint arXiv:1411.1784, 2014. 2
work page internal anchor Pith review arXiv 2014
-
[33]
Agedb: The first manually collected, in-the-wild age database
Stylianos Moschoglou, Athanasios Papaioannou, Chris- tos Sagonas, Jiankang Deng, Irene Kotsia, and Stefanos Zafeiriou. Agedb: The first manually collected, in-the-wild age database. InIEEE Conference on Computer Vision and Pattern Recognition Workshops, pages 1997–2005, 2017. 5
1997
-
[34]
Improved denoising diffusion probabilistic models
Alexander Quinn Nichol and Prafulla Dhariwal. Improved denoising diffusion probabilistic models. InInternational Conference on Machine Learning, pages 8162–8171, 2021. 2
2021
-
[35]
Synthesizing efficient data with diffusion models for person re-identification pre-training, 2024
Ke Niu, Haiyang Yu, Xuelin Qian, Teng Fu, Bin Li, and Xiangyang Xue. Synthesizing efficient data with diffusion models for person re-identification pre-training, 2024. 2
2024
-
[36]
Scalable diffusion models with transformers
William Peebles and Saining Xie. Scalable diffusion models with transformers. InInternational Conference on Computer Vision, pages 4172–4182, 2023. 3, 5
2023
-
[37]
A stochastic approxi- mation method.The annals of mathematical statistics, pages 400–407, 1951
Herbert Robbins and Sutton Monro. A stochastic approxi- mation method.The annals of mathematical statistics, pages 400–407, 1951. 5
1951
-
[38]
High-resolution image syn- thesis with latent diffusion models
Robin Rombach, Andreas Blattmann, Dominik Lorenz, Patrick Esser, and Bj¨orn Ommer. High-resolution image syn- thesis with latent diffusion models. InIEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 10674– 10685, 2022. 1, 2
2022
-
[39]
Denton, Seyed Kamyar Seyed Ghasemipour, Raphael Gontijo Lopes, Burcu Karagol Ayan, Tim Salimans, Jonathan Ho, David J
Chitwan Saharia, William Chan, Saurabh Saxena, Lala Li, Jay Whang, Emily L. Denton, Seyed Kamyar Seyed Ghasemipour, Raphael Gontijo Lopes, Burcu Karagol Ayan, Tim Salimans, Jonathan Ho, David J. Fleet, and Mohammad Norouzi. Photorealistic text-to-image diffusion models with deep language understanding. InAdvances in Neural Infor- mation Processing Systems...
2022
-
[40]
Rl4med-ddpo: reinforcement learning for controlled guidance towards diverse medical im- age generation using vision-language foundation models
Parham Saremi, Amar Kumar, Mohamed Mohamed, Zahra TehraniNasab, and Tal Arbel. Rl4med-ddpo: reinforcement learning for controlled guidance towards diverse medical im- age generation using vision-language foundation models. In International Conference on Medical Image Computing and Computer-Assisted Intervention, pages 478–488. Springer,
-
[41]
Facenet: A unified embedding for face recognition and clus- tering
Florian Schroff, Dmitry Kalenichenko, and James Philbin. Facenet: A unified embedding for face recognition and clus- tering. InProceedings of the IEEE conference on computer vision and pattern recognition, pages 815–823, 2015. 5
2015
-
[42]
Patel, Rama Chellappa, and David W
Soumyadip Sengupta, Jun-Cheng Chen, Carlos Domingo Castillo, Vishal M. Patel, Rama Chellappa, and David W. Jacobs. Frontal to profile face verification in the wild. In IEEE Winter Conference on Applications of Computer Vi- sion, pages 1–9, 2016. 5
2016
-
[43]
Denoising Diffusion Implicit Models
Jiaming Song, Chenlin Meng, and Stefano Ermon. Denoising diffusion implicit models.arXiv preprint arXiv:2010.02502, 2020. 2
work page internal anchor Pith review Pith/arXiv arXiv 2010
-
[44]
Dissecting person re- identification from the viewpoint of viewpoint
Xiaoxiao Sun and Liang Zheng. Dissecting person re- identification from the viewpoint of viewpoint. InIEEE Con- ference on Computer Vision and Pattern Recognition, pages 608–617, 2019. 1, 2
2019
-
[45]
The eu general data protection regulation (gdpr).A practical guide, 1st ed., Cham: Springer International Publishing, 10(3152676):10– 5555, 2017
Paul V oigt and Axel V on dem Bussche. The eu general data protection regulation (gdpr).A practical guide, 1st ed., Cham: Springer International Publishing, 10(3152676):10– 5555, 2017. 1
2017
-
[46]
Diffusion model align- ment using direct preference optimization
Bram Wallace, Meihua Dang, Rafael Rafailov, Linqi Zhou, Aaron Lou, Senthil Purushwalkam, Stefano Ermon, Caiming Xiong, Shafiq Joty, and Nikhil Naik. Diffusion model align- ment using direct preference optimization. InProceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 8228–8238, 2024. 3
2024
-
[47]
Cosface: Large margin cosine loss for deep face recognition
Hao Wang, Yitong Wang, Zheng Zhou, Xing Ji, Dihong Gong, Jingchao Zhou, Zhifeng Li, and Wei Liu. Cosface: Large margin cosine loss for deep face recognition. InPro- ceedings of the IEEE conference on computer vision and pat- tern recognition, pages 5265–5274, 2018. 5
2018
-
[48]
A benchmark of video- based clothes-changing person re-identification, 2022
Likai Wang, Xiangqun Zhang, Ruize Han, Jialin Yang, Xi- aoyu Li, Wei Feng, and Song Wang. A benchmark of video- based clothes-changing person re-identification, 2022. 2
2022
-
[49]
Racial faces in the wild: Reducing racial bias by information maximization adaptation network
Mei Wang, Weihong Deng, Jiani Hu, Xunqiang Tao, and Yaohai Huang. Racial faces in the wild: Reducing racial bias by information maximization adaptation network. In Proceedings of the ieee/cvf international conference on com- puter vision, pages 692–702, 2019. 5, 6
2019
-
[50]
Yuran Wang, Bohan Zeng, Chengzhuo Tong, Wenxuan Liu, Yang Shi, Xiaochen Ma, Hao Liang, Yuanxing Zhang, and Wentao Zhang. Scone: Bridging composition and distinction in subject-driven image generation via uni- fied understanding-generation modeling.arXiv preprint arXiv:2512.12675, 2025. 1
work page internal anchor Pith review Pith/arXiv arXiv 2025
-
[51]
Uncovering the disentanglement capability in text- to-image diffusion models
Qiucheng Wu, Yujian Liu, Handong Zhao, Ajinkya Kale, Trung Bui, Tong Yu, Zhe Lin, Yang Zhang, and Shiyu Chang. Uncovering the disentanglement capability in text- to-image diffusion models. InProceedings of the IEEE/CVF conference on computer vision and pattern recognition, pages 1900–1910, 2023. 2
1900
-
[52]
Suncheng Xiang, Dahong Qian, Mengyuan Guan, Binjie Yan, Ting Liu, Yuzhuo Fu, and Guanjie You. Less is more: Learning from synthetic data with fine-grained attributes for person re-identification.ACM Transactions on Multime- dia Computing, Communications and Applications, 19(5s): 1–20, 2023. 5
2023
-
[53]
Dong Yi, Zhen Lei, Shengcai Liao, and Stan Z. Li. Learning face representation from scratch, 2014. 5
2014
-
[54]
Learning Face Representation from Scratch
Dong Yi, Zhen Lei, Shengcai Liao, and Stan Z Li. Learn- ing face representation from scratch.arXiv preprint arXiv:1411.7923, 2014. 6
work page Pith review arXiv 2014
-
[55]
In- finiteperson: Innovating synthetic data creation for general- ization person re-identification.IEEE Transactions on Cir- cuits and Systems for Video Technology, pages 1–1, 2024
Guoqing Zhang, Jin Li, Yuhui Zheng, and Ruili Wang. In- finiteperson: Innovating synthetic data creation for general- ization person re-identification.IEEE Transactions on Cir- cuits and Systems for Video Technology, pages 1–1, 2024. 1, 2
2024
-
[56]
In- finiteperson: Innovating synthetic data creation for general- ization person re-identification.IEEE Transactions on Cir- cuits and Systems for Video Technology, 2024
Guoqing Zhang, Jin Li, Yuhui Zheng, and Ruili Wang. In- finiteperson: Innovating synthetic data creation for general- ization person re-identification.IEEE Transactions on Cir- cuits and Systems for Video Technology, 2024. 5
2024
-
[57]
Adding conditional control to text-to-image diffusion models
Lvmin Zhang, Anyi Rao, and Maneesh Agrawala. Adding conditional control to text-to-image diffusion models. In Proceedings of the IEEE/CVF international conference on computer vision, pages 3836–3847, 2023. 2
2023
-
[58]
Viperson: Flexi- bly generating virtual identity for person re-identification
Xiao-Wen Zhang, Delong Zhang, Yi-Xing Peng, Zhi Ouyang, Jingke Meng, and Wei-Shi Zheng. Viperson: Flexi- bly generating virtual identity for person re-identification. In Proceedings of the IEEE/CVF International Conference on Computer Vision, pages 23374–23384, 2025. 5
2025
-
[59]
Expanding small-scale datasets with guided imag- ination.Advances in neural information processing systems, 36:76558–76618, 2023
Yifan Zhang, Daquan Zhou, Bryan Hooi, Kai Wang, and Ji- ashi Feng. Expanding small-scale datasets with guided imag- ination.Advances in neural information processing systems, 36:76558–76618, 2023. 5, 6
2023
-
[60]
Scalable person re-identification: A benchmark
Liang Zheng, Liyue Shen, Lu Tian, Shengjin Wang, Jing- dong Wang, and Qi Tian. Scalable person re-identification: A benchmark. InIEEE International Conference on Com- puter Vision, pages 1116–1124, 2015. 5
2015
-
[61]
Cross-pose lfw: A database for studying cross-pose face recognition in un- constrained environments.Beijing University of Posts and Telecommunications, Tech
Tianyue Zheng and Weihong Deng. Cross-pose lfw: A database for studying cross-pose face recognition in un- constrained environments.Beijing University of Posts and Telecommunications, Tech. Rep, 5(7):5, 2018. 5
2018
-
[62]
Cross-Age LFW: A Database for Studying Cross-Age Face Recognition in Unconstrained Environments
Tianyue Zheng, Weihong Deng, and Jiani Hu. Cross-age lfw: A database for studying cross-age face recognition in un- constrained environments.arXiv preprint arXiv:1708.08197,
-
[63]
Joint discriminative and generative learning for person re-identification
Zhedong Zheng, Xiaodong Yang, Zhiding Yu, Liang Zheng, Yi Yang, and Jan Kautz. Joint discriminative and generative learning for person re-identification. InIEEE Conference on Computer Vision and Pattern Recognition, pages 2138– 2147, 2019. 5
2019
-
[64]
Joint discriminative and genera- tive learning for person re-identification
Zhedong Zheng, Xiaodong Yang, Zhiding Yu, Liang Zheng, Yi Yang, and Jan Kautz. Joint discriminative and genera- tive learning for person re-identification. Inproceedings of the IEEE/CVF conference on computer vision and pattern recognition, pages 2138–2147, 2019. 2
2019
-
[65]
Refined semantic enhancement towards fre- quency diffusion for video captioning
Xian Zhong, Zipeng Li, Shuqin Chen, Kui Jiang, Chen Chen, and Mang Ye. Refined semantic enhancement towards fre- quency diffusion for video captioning. InProceedings of the AAAI conference on artificial intelligence, pages 3724–3732,
-
[66]
Random erasing data augmentation
Zhun Zhong, Liang Zheng, Guoliang Kang, Shaozi Li, and Yi Yang. Random erasing data augmentation. InAAAI Con- ference on Artificial Intelligence, pages 13001–13008, 2020. 1, 2, 5
2020
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.