{"id":"https://openalex.org/W4414359963","doi":"https://doi.org/10.24963/ijcai.2025/164","title":"Towards Anytime Retrieval: A Benchmark for Anytime Person Re-Identification","display_name":"Towards Anytime Retrieval: A Benchmark for Anytime Person Re-Identification","publication_year":2025,"publication_date":"2025-09-01","ids":{"openalex":"https://openalex.org/W4414359963","doi":"https://doi.org/10.24963/ijcai.2025/164"},"language":"en","primary_location":{"id":"doi:10.24963/ijcai.2025/164","is_oa":false,"landing_page_url":"https://doi.org/10.24963/ijcai.2025/164","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Thirty-Fourth International Joint Conference on Artificial Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054048117","display_name":"Xulin Li","orcid":"https://orcid.org/0000-0002-8133-6125"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]},{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xulin Li","raw_affiliation_strings":["Anhui Province Key Laboratory of Digital Security","School of Cyber Science and Technology, University of Science and Technology of China"],"affiliations":[{"raw_affiliation_string":"Anhui Province Key Laboratory of Digital Security","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"School of Cyber Science and Technology, University of Science and Technology of China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100756584","display_name":"Yan Lu","orcid":"https://orcid.org/0000-0001-5383-6424"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Lu","raw_affiliation_strings":["The Chinese University of Hong Kong"],"affiliations":[{"raw_affiliation_string":"The Chinese University of Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100395613","display_name":"Bin Liu","orcid":"https://orcid.org/0009-0007-0797-0658"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]},{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Liu","raw_affiliation_strings":["Anhui Province Key Laboratory of Digital Security","School of Cyber Science and Technology, University of Science and Technology of China"],"affiliations":[{"raw_affiliation_string":"Anhui Province Key Laboratory of Digital Security","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"School of Cyber Science and Technology, University of Science and Technology of China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107094342","display_name":"Jiaze Li","orcid":"https://orcid.org/0009-0007-7038-7043"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]},{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiaze Li","raw_affiliation_strings":["Anhui Province Key Laboratory of Digital Security","School of Cyber Science and Technology, University of Science and Technology of China"],"affiliations":[{"raw_affiliation_string":"Anhui Province Key Laboratory of Digital Security","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"School of Cyber Science and Technology, University of Science and Technology of China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104350977","display_name":"Qinhong Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]},{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qinhong Yang","raw_affiliation_strings":["Anhui Province Key Laboratory of Digital Security","School of Cyber Science and Technology, University of Science and Technology of China"],"affiliations":[{"raw_affiliation_string":"Anhui Province Key Laboratory of Digital Security","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"School of Cyber Science and Technology, University of Science and Technology of China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114910706","display_name":"Tao Gong","orcid":"https://orcid.org/0000-0003-0026-6813"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]},{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Gong","raw_affiliation_strings":["Anhui Province Key Laboratory of Digital Security","School of Cyber Science and Technology, University of Science and Technology of China"],"affiliations":[{"raw_affiliation_string":"Anhui Province Key Laboratory of Digital Security","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"School of Cyber Science and Technology, University of Science and Technology of China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045938154","display_name":"Qi Chu","orcid":"https://orcid.org/0000-0003-3028-0755"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]},{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Chu","raw_affiliation_strings":["Anhui Province Key Laboratory of Digital Security","School of Cyber Science and Technology, University of Science and Technology of China"],"affiliations":[{"raw_affiliation_string":"Anhui Province Key Laboratory of Digital Security","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"School of Cyber Science and Technology, University of Science and Technology of China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008999954","display_name":"Mang Ye","orcid":"https://orcid.org/0000-0003-3989-7655"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mang Ye","raw_affiliation_strings":["School of Computer Science, Wuhan University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Wuhan University, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090634503","display_name":"Nenghai Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]},{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nenghai Yu","raw_affiliation_strings":["Anhui Province Key Laboratory of Digital Security","School of Cyber Science and Technology, University of Science and Technology of China"],"affiliations":[{"raw_affiliation_string":"Anhui Province Key Laboratory of Digital Security","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"School of Cyber Science and Technology, University of Science and Technology of China","institution_ids":["https://openalex.org/I126520041"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5054048117"],"corresponding_institution_ids":["https://openalex.org/I126520041","https://openalex.org/I143868143"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.26717383,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1467","last_page":"1475"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.9065999984741211,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.9065999984741211,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.6754999756813049},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.6348000168800354},{"id":"https://openalex.org/keywords/weighting","display_name":"Weighting","score":0.6104000210762024},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.5723999738693237},{"id":"https://openalex.org/keywords/ranging","display_name":"Ranging","score":0.42570000886917114},{"id":"https://openalex.org/keywords/training-set","display_name":"Training set","score":0.4074000120162964},{"id":"https://openalex.org/keywords/rgb-color-model","display_name":"RGB color model","score":0.350600004196167}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7885000109672546},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.6754999756813049},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.6348000168800354},{"id":"https://openalex.org/C183115368","wikidata":"https://www.wikidata.org/wiki/Q856577","display_name":"Weighting","level":2,"score":0.6104000210762024},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.5723999738693237},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5631999969482422},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5177000164985657},{"id":"https://openalex.org/C115051666","wikidata":"https://www.wikidata.org/wiki/Q6522493","display_name":"Ranging","level":2,"score":0.42570000886917114},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.4074000120162964},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35429999232292175},{"id":"https://openalex.org/C82990744","wikidata":"https://www.wikidata.org/wiki/Q166194","display_name":"RGB color model","level":2,"score":0.350600004196167},{"id":"https://openalex.org/C175154964","wikidata":"https://www.wikidata.org/wiki/Q380077","display_name":"Task analysis","level":3,"score":0.3488999903202057},{"id":"https://openalex.org/C530175646","wikidata":"https://www.wikidata.org/wiki/Q11460","display_name":"Clothing","level":2,"score":0.3368000090122223},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.29319998621940613},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.29010000824928284},{"id":"https://openalex.org/C2777211547","wikidata":"https://www.wikidata.org/wiki/Q17141490","display_name":"Training (meteorology)","level":2,"score":0.2863999903202057},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.2671000063419342},{"id":"https://openalex.org/C2780719617","wikidata":"https://www.wikidata.org/wiki/Q1030752","display_name":"Salient","level":2,"score":0.2531999945640564}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.24963/ijcai.2025/164","is_oa":false,"landing_page_url":"https://doi.org/10.24963/ijcai.2025/164","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Thirty-Fourth International Joint Conference on Artificial Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"In":[0],"real":[1],"applications,":[2],"person":[3,11],"re-identification":[4],"(ReID)":[5],"expects":[6],"to":[7,23,64,139,169,180,194,201],"retrieve":[8],"the":[9,78,83,141],"target":[10],"at":[12],"any":[13],"time,":[14],"including":[15],"both":[16],"daytime":[17],"and":[18,29,42,46,100,111,173,197],"nighttime,":[19],"ranging":[20],"from":[21],"short-term":[22],"long-term.":[24],"However,":[25],"existing":[26],"ReID":[27,158],"tasks":[28],"datasets":[30],"cannot":[31],"meet":[32],"this":[33],"requirement,":[34],"as":[35],"they":[36],"are":[37],"constrained":[38],"by":[39,98],"available":[40],"time":[41],"only":[43],"provide":[44],"training":[45,183],"evaluation":[47],"for":[48,133,161],"specific":[49],"scenarios.":[50,186,203],"Therefore,":[51],"we":[52,81,147],"investigate":[53],"a":[54,149,156,165,174],"new":[55,142],"task":[56],"called":[57],"Anytime":[58],"Person":[59],"Re-identification":[60],"(AT-ReID),":[61],"which":[62,88,154],"aims":[63],"achieve":[65],"effective":[66],"retrieval":[67],"in":[68,74,136],"multiple":[69,95],"scenarios":[70],"based":[71],"on":[72,116],"variations":[73],"time.":[75],"To":[76],"address":[77],"AT-ReID":[79],"problem,":[80],"collect":[82],"first":[84],"large-scale":[85],"dataset,":[86],"AT-USTC,":[87],"contains":[89],"135k":[90],"images":[91],"of":[92,144],"individuals":[93],"wearing":[94],"clothes":[96],"captured":[97],"RGB":[99],"IR":[101],"cameras.":[102],"Our":[103],"data":[104],"collection":[105],"spans":[106],"over":[107],"an":[108],"entire":[109],"year":[110],"270":[112],"volunteers":[113],"were":[114],"photographed":[115],"average":[117],"29.1":[118],"times":[119,126],"across":[120,184],"different":[121],"dates":[122],"or":[123],"scenes,":[124],"4-15":[125],"more":[127],"than":[128],"current":[129],"datasets,":[130],"providing":[131],"conditions":[132],"follow-up":[134],"investigations":[135],"AT-ReID.":[137],"Further,":[138],"tackle":[140],"challenge":[143],"multi-scenario":[145,157],"retrieval,":[146],"propose":[148],"unified":[150],"model":[151,192],"named":[152],"Uni-AT,":[153],"comprises":[155],"(MS-ReID)":[159],"framework":[160],"scenario-specific":[162],"features":[163],"learning,":[164],"Mixture-of-Attribute-Experts":[166],"(MoAE)":[167],"module":[168],"alleviate":[170],"inter-scenario":[171],"interference,":[172],"Hierarchical":[175],"Dynamic":[176],"Weighting":[177],"(HDW)":[178],"strategy":[179],"ensure":[181],"balanced":[182],"all":[185,202],"Extensive":[187],"experiments":[188],"show":[189],"that":[190],"our":[191],"leads":[193],"satisfactory":[195],"results":[196],"exhibits":[198],"excellent":[199],"generalization":[200]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
