{"id":"https://openalex.org/W4304098552","doi":"https://doi.org/10.1145/3503161.3548178","title":"PreyNet: Preying on Camouflaged Objects","display_name":"PreyNet: Preying on Camouflaged Objects","publication_year":2022,"publication_date":"2022-10-10","ids":{"openalex":"https://openalex.org/W4304098552","doi":"https://doi.org/10.1145/3503161.3548178"},"language":"en","primary_location":{"id":"doi:10.1145/3503161.3548178","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3503161.3548178","pdf_url":null,"source":{"id":"https://openalex.org/S4363608757","display_name":"Proceedings of the 30th ACM International Conference on Multimedia","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 30th ACM International Conference on Multimedia","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100376482","display_name":"Miao Zhang","orcid":"https://orcid.org/0000-0002-7972-7047"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Miao Zhang","raw_affiliation_strings":["Dalian University of Technology &amp; Key Lab for Ubiquitous Network and Service Software of Liaoning Province, Dalian , China"],"affiliations":[{"raw_affiliation_string":"Dalian University of Technology &amp; Key Lab for Ubiquitous Network and Service Software of Liaoning Province, Dalian , China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102732438","display_name":"Shuang Xu","orcid":"https://orcid.org/0000-0003-1804-4012"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuang Xu","raw_affiliation_strings":["Dalian University of Technology, Dalian, China"],"affiliations":[{"raw_affiliation_string":"Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014975416","display_name":"Yongri Piao","orcid":"https://orcid.org/0000-0002-0860-252X"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongri Piao","raw_affiliation_strings":["Dalian University of Technology, Dalian, China"],"affiliations":[{"raw_affiliation_string":"Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076977816","display_name":"Dongxiang Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongxiang Shi","raw_affiliation_strings":["Dalian University of Technology, Dalian, China"],"affiliations":[{"raw_affiliation_string":"Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110942808","display_name":"Shusen Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shusen Lin","raw_affiliation_strings":["Dalian University of Technology, Dalian, China"],"affiliations":[{"raw_affiliation_string":"Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006986293","display_name":"Huchuan Lu","orcid":"https://orcid.org/0000-0002-6668-9758"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huchuan Lu","raw_affiliation_strings":["Dalian University of Technology &amp; Pengcheng Lab, Dalian, China"],"affiliations":[{"raw_affiliation_string":"Dalian University of Technology &amp; Pengcheng Lab, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100376482"],"corresponding_institution_ids":["https://openalex.org/I27357992"],"apc_list":null,"apc_paid":null,"fwci":5.194,"has_fulltext":false,"cited_by_count":93,"citation_normalized_percentile":{"value":0.96593329,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"5323","last_page":"5332"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11605","display_name":"Visual Attention and Saliency Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11605","display_name":"Visual Attention and Saliency Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11019","display_name":"Image Enhancement Techniques","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.9807999730110168,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8120037913322449},{"id":"https://openalex.org/keywords/camouflage","display_name":"Camouflage","score":0.7638577818870544},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6837344765663147},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.670292854309082},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.570677638053894},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5461217164993286},{"id":"https://openalex.org/keywords/salient","display_name":"Salient","score":0.5455044507980347},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5121974349021912},{"id":"https://openalex.org/keywords/object-detection","display_name":"Object detection","score":0.49342337250709534},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.43024319410324097},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.41786086559295654},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.2024596631526947},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14214524626731873},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08211922645568848}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8120037913322449},{"id":"https://openalex.org/C2776196576","wikidata":"https://www.wikidata.org/wiki/Q196113","display_name":"Camouflage","level":2,"score":0.7638577818870544},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6837344765663147},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.670292854309082},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.570677638053894},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5461217164993286},{"id":"https://openalex.org/C2780719617","wikidata":"https://www.wikidata.org/wiki/Q1030752","display_name":"Salient","level":2,"score":0.5455044507980347},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5121974349021912},{"id":"https://openalex.org/C2776151529","wikidata":"https://www.wikidata.org/wiki/Q3045304","display_name":"Object detection","level":3,"score":0.49342337250709534},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.43024319410324097},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.41786086559295654},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.2024596631526947},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14214524626731873},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08211922645568848},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3503161.3548178","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3503161.3548178","pdf_url":null,"source":{"id":"https://openalex.org/S4363608757","display_name":"Proceedings of the 30th ACM International Conference on Multimedia","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 30th ACM International Conference on Multimedia","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Life below water","score":0.7699999809265137,"id":"https://metadata.un.org/sdg/14"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W1513184069","https://openalex.org/W1562683879","https://openalex.org/W1971014006","https://openalex.org/W1972956328","https://openalex.org/W1988649016","https://openalex.org/W1994922096","https://openalex.org/W2051624325","https://openalex.org/W2064892830","https://openalex.org/W2092792357","https://openalex.org/W2121034719","https://openalex.org/W2150587757","https://openalex.org/W2151040689","https://openalex.org/W2194775991","https://openalex.org/W2296153970","https://openalex.org/W2412782625","https://openalex.org/W2565639579","https://openalex.org/W2594112328","https://openalex.org/W2884490794","https://openalex.org/W2884585870","https://openalex.org/W2928165649","https://openalex.org/W2943545929","https://openalex.org/W2963112696","https://openalex.org/W2963150697","https://openalex.org/W2963685207","https://openalex.org/W2963868681","https://openalex.org/W2965563166","https://openalex.org/W2978968642","https://openalex.org/W2996884277","https://openalex.org/W2997316506","https://openalex.org/W2998449272","https://openalex.org/W3027763298","https://openalex.org/W3034684132","https://openalex.org/W3035422681","https://openalex.org/W3092344722","https://openalex.org/W3108812909","https://openalex.org/W3164098653","https://openalex.org/W3168112135","https://openalex.org/W3173782971","https://openalex.org/W3174857663","https://openalex.org/W3176152216","https://openalex.org/W3203700770","https://openalex.org/W3205387145","https://openalex.org/W3207493400","https://openalex.org/W4232216998"],"related_works":["https://openalex.org/W2978048274","https://openalex.org/W2348329006","https://openalex.org/W2379031960","https://openalex.org/W2376458710","https://openalex.org/W2231217681","https://openalex.org/W2914759737","https://openalex.org/W2984158411","https://openalex.org/W4253283976","https://openalex.org/W3085382568","https://openalex.org/W2891575204"],"abstract_inverted_index":{"Species":[0],"often":[1],"adopt":[2],"various":[3],"camouflage":[4],"strategies":[5],"to":[6,52],"be":[7],"seamlessly":[8],"blended":[9],"into":[10,39],"the":[11,18,27,31,40,64,81,113,138,156,159],"surroundings":[12],"for":[13,55,92,130],"self-protection.":[14],"To":[15,79],"figure":[16],"out":[17],"concealment,":[19],"predators":[20],"have":[21],"evolved":[22],"excellent":[23],"hunting":[24],"skills.":[25],"Exploring":[26],"intrinsic":[28],"mechanisms":[29],"of":[30,42,67,115,158],"predation":[32],"behavior":[33],"can":[34],"offer":[35],"more":[36],"insightful":[37],"glimpse":[38],"task":[41],"camouflaged":[43],"object":[44,168],"detection":[45,71,169],"(COD).":[46],"In":[47],"this":[48],"work,":[49],"we":[50,126],"strive":[51],"seek":[53],"answers":[54],"accurate":[56],"COD":[57],"and":[58,74,94,120],"propose":[59],"a":[60,84,109],"PreyNet,":[61],"which":[62],"mimics":[63],"two":[65],"processes":[66],"predation,":[68],"namely,":[69],"initial":[70,96],"(sensory":[72],"mechanism)":[73],"predator":[75,103,160],"learning":[76,104,161],"(cognitive":[77],"mechanism).":[78],"exploit":[80],"sensory":[82],"process,":[83],"bidirectional":[85],"bridging":[86],"interaction":[87],"module":[88],"(BBIM)":[89],"is":[90,106,173],"designed":[91],"selecting":[93],"aggregating":[95],"features":[97],"in":[98],"an":[99],"attentive":[100],"manner.":[101],"The":[102],"process":[105],"formulated":[107],"as":[108],"policy-and-calibration":[110],"paradigm,":[111],"with":[112],"goal":[114],"deciding":[116],"on":[117,137,150,165],"uncertain":[118],"regions":[119],"encouraging":[121],"targeted":[122],"feature":[123],"calibration.":[124],"Besides,":[125],"obtain":[127],"adaptive":[128],"weight":[129],"multi-layer":[131],"supervision":[132],"during":[133],"training":[134],"via":[135],"computing":[136],"uncertainty":[139],"estimation.":[140],"Extensive":[141],"experiments":[142],"demonstrate":[143],"that":[144],"our":[145],"model":[146],"produces":[147],"state-of-the-art":[148],"results":[149],"several":[151],"benchmarks.":[152],"We":[153],"further":[154],"verify":[155],"scalability":[157],"paradigm":[162],"through":[163],"applications":[164],"top-ranking":[166],"salient":[167],"models.":[170],"Our":[171],"code":[172],"publicly":[174],"available":[175],"at":[176],"\\urlhttps://github.com/OIPLab-DUT/PreyNet.":[177]},"counts_by_year":[{"year":2026,"cited_by_count":6},{"year":2025,"cited_by_count":32},{"year":2024,"cited_by_count":40},{"year":2023,"cited_by_count":15}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
