{"id":"https://openalex.org/W4416251063","doi":"https://doi.org/10.1109/ijcnn64981.2025.11228434","title":"Time2Text-PM: Reprogramming Pre-trained Models for Few-Shot Intention Recognition","display_name":"Time2Text-PM: Reprogramming Pre-trained Models for Few-Shot Intention Recognition","publication_year":2025,"publication_date":"2025-06-30","ids":{"openalex":"https://openalex.org/W4416251063","doi":"https://doi.org/10.1109/ijcnn64981.2025.11228434"},"language":null,"primary_location":{"id":"doi:10.1109/ijcnn64981.2025.11228434","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11228434","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010100753","display_name":"Yan-Tong Chen","orcid":"https://orcid.org/0009-0007-7884-1765"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yantong Chen","raw_affiliation_strings":["Nanjing University of Aeronautics and Astronautics,Nanjing,China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Aeronautics and Astronautics,Nanjing,China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058973889","display_name":"Feng Hu","orcid":"https://orcid.org/0000-0002-9607-3313"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feng Hu","raw_affiliation_strings":["Nanjing University of Aeronautics and Astronautics,Nanjing,China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Aeronautics and Astronautics,Nanjing,China","institution_ids":["https://openalex.org/I9842412"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5010100753"],"corresponding_institution_ids":["https://openalex.org/I9842412"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19446499,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.1679999977350235,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.1679999977350235,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13371","display_name":"Military Defense Systems Analysis","score":0.11230000108480453,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.057500001043081284,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5967000126838684},{"id":"https://openalex.org/keywords/bridge","display_name":"Bridge (graph theory)","score":0.5430999994277954},{"id":"https://openalex.org/keywords/situation-awareness","display_name":"Situation awareness","score":0.5042999982833862},{"id":"https://openalex.org/keywords/natural-language","display_name":"Natural language","score":0.4097000062465668},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.39250001311302185},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.3767000138759613},{"id":"https://openalex.org/keywords/naturalness","display_name":"Naturalness","score":0.3637000024318695},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.34529998898506165},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.33959999680519104}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6819000244140625},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6043000221252441},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5967000126838684},{"id":"https://openalex.org/C100776233","wikidata":"https://www.wikidata.org/wiki/Q2532492","display_name":"Bridge (graph theory)","level":2,"score":0.5430999994277954},{"id":"https://openalex.org/C145804949","wikidata":"https://www.wikidata.org/wiki/Q478123","display_name":"Situation awareness","level":2,"score":0.5042999982833862},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.45410001277923584},{"id":"https://openalex.org/C195324797","wikidata":"https://www.wikidata.org/wiki/Q33742","display_name":"Natural language","level":2,"score":0.4097000062465668},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.39250001311302185},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3767000138759613},{"id":"https://openalex.org/C134537474","wikidata":"https://www.wikidata.org/wiki/Q17144832","display_name":"Naturalness","level":2,"score":0.3637000024318695},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.34529998898506165},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.33959999680519104},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.3190000057220459},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.31470000743865967},{"id":"https://openalex.org/C168725872","wikidata":"https://www.wikidata.org/wiki/Q991663","display_name":"Sophistication","level":2,"score":0.3133000135421753},{"id":"https://openalex.org/C2779439875","wikidata":"https://www.wikidata.org/wiki/Q1078276","display_name":"Natural language understanding","level":3,"score":0.31310001015663147},{"id":"https://openalex.org/C9114305","wikidata":"https://www.wikidata.org/wiki/Q1428317","display_name":"Situational ethics","level":2,"score":0.31060001254081726},{"id":"https://openalex.org/C33954974","wikidata":"https://www.wikidata.org/wiki/Q486494","display_name":"Sensor fusion","level":2,"score":0.3052999973297119},{"id":"https://openalex.org/C175154964","wikidata":"https://www.wikidata.org/wiki/Q380077","display_name":"Task analysis","level":3,"score":0.3019999861717224},{"id":"https://openalex.org/C2779669469","wikidata":"https://www.wikidata.org/wiki/Q4895508","display_name":"Battlefield","level":2,"score":0.2944999933242798},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.28839999437332153},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.2784999907016754},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.27709999680519104},{"id":"https://openalex.org/C170858558","wikidata":"https://www.wikidata.org/wiki/Q1394144","display_name":"Automatic summarization","level":2,"score":0.2700999975204468},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.2632000148296356},{"id":"https://openalex.org/C129792486","wikidata":"https://www.wikidata.org/wiki/Q1050419","display_name":"Language identification","level":3,"score":0.2549000084400177},{"id":"https://openalex.org/C2983448237","wikidata":"https://www.wikidata.org/wiki/Q1078276","display_name":"Language understanding","level":2,"score":0.25279998779296875}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn64981.2025.11228434","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11228434","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1498436455","https://openalex.org/W1904550098","https://openalex.org/W2064675550","https://openalex.org/W2963026768","https://openalex.org/W3023179277","https://openalex.org/W3177318507","https://openalex.org/W4229377210","https://openalex.org/W4301347335","https://openalex.org/W4404356490"],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,12,37,59,112,156,161],"escalating":[2],"sophistication":[3],"of":[4,15,21,65,96,116,160],"unmanned":[5],"aerial":[6],"vehicle":[7],"(UAV)":[8],"adversarial":[9],"operations":[10],"and":[11,43,61],"growing":[13],"complexity":[14],"electronic":[16],"warfare":[17],"environments,":[18],"precise":[19],"identification":[20,64],"hostile":[22],"target\u2019s":[23],"intentions":[24,67],"has":[25],"emerged":[26],"as":[27,87,209],"a":[28,74,81],"critical":[29],"capability":[30,159],"for":[31,105,200],"achieving":[32],"tactical":[33],"dominance.":[34],"To":[35],"bridge":[36],"gap":[38],"between":[39],"temporal":[40,122],"situational":[41,94],"data":[42,95,190],"natural":[44],"language":[45,84,106],"text,":[46],"our":[47],"research":[48],"explores":[49],"intention":[50,139,151,210],"recognition":[51,140],"based":[52],"on":[53],"pre-trained":[54,83,117],"models,":[55],"aiming":[56],"to":[57,89,119,146],"enhance":[58],"accurate":[60],"few-shot":[62,157],"learning":[63,158,203],"target":[66,98,138],"in":[68,124,137,150,184,205],"complex":[69,121],"battlefield":[70],"environments.":[71],"We":[72],"propose":[73],"unified":[75],"reprogramming":[76,162],"framework":[77,163,169],"Time2Text-PM":[78],"that":[79,131],"utilizes":[80],"frozen":[82],"model":[85],"(such":[86],"BERT)":[88],"transform":[90],"multivariate":[91],"time":[92],"series":[93],"UAV":[97,125],"into":[99],"text":[100],"prototype":[101],"representations":[102],"more":[103],"suitable":[104],"models.":[107],"This":[108,194],"innovative":[109],"approach":[110,133],"leverages":[111],"semantic":[113],"understanding":[114],"capabilities":[115],"models":[118,148],"interpret":[120],"patterns":[123],"confrontation":[126],"scenarios.":[127],"Experimental":[128],"results":[129],"demonstrate":[130],"this":[132],"improves":[134],"classification":[135],"accuracy":[136],"tasks":[141],"by":[142],"approximately":[143],"4.5%":[144],"compared":[145],"traditional":[147],"used":[149],"recognition.":[152,211],"Furthermore,":[153],"we":[154],"validate":[155],"with":[164,176],"limited":[165],"training":[166],"data.":[167],"The":[168],"achieves":[170],"robust":[171],"performance":[172],"even":[173],"when":[174],"trained":[175],"significantly":[177],"reduced":[178],"datasets,":[179],"demonstrating":[180],"its":[181],"practical":[182],"applicability":[183],"real-world":[185],"scenarios":[186],"where":[187],"extensive":[188],"labeled":[189],"is":[191],"often":[192],"unavailable.":[193],"study":[195],"provides":[196],"new":[197],"methodological":[198],"guidance":[199],"applying":[201],"deep":[202],"techniques":[204],"data-constrained":[206],"domains,":[207],"such":[208]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-14T00:00:00"}
