Fig. 1From: Exploiting prunability for person re-identificationTypical person re-identification systemBack to article page