{"id":"https://openalex.org/W7129018172","doi":"https://doi.org/10.48550/arxiv.2602.12696","title":"Channel-Aware Probing for Multi-Channel Imaging","display_name":"Channel-Aware Probing for Multi-Channel Imaging","publication_year":2026,"publication_date":"2026-02-13","ids":{"openalex":"https://openalex.org/W7129018172","doi":"https://doi.org/10.48550/arxiv.2602.12696"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2602.12696","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.12696","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2602.12696","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054281881","display_name":"Umar Marikkar","orcid":"https://orcid.org/0000-0002-1951-7793"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Marikkar, Umar","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041914042","display_name":"Syed Sameed Husain","orcid":"https://orcid.org/0000-0002-9659-053X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Husain, Syed Sameed","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126149877","display_name":"Muhammad Awais","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Awais, Muhammad","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5126143458","display_name":"Sara Atito","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Atito, Sara","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5054281881"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.23929999768733978,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.23929999768733978,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11992","display_name":"CCD and CMOS Imaging Sensors","score":0.21330000460147858,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.07850000262260437,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.705299973487854},{"id":"https://openalex.org/keywords/pooling","display_name":"Pooling","score":0.5680999755859375},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.5257999897003174},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5065000057220459},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4869999885559082},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4672999978065491},{"id":"https://openalex.org/keywords/encode","display_name":"ENCODE","score":0.4438999891281128},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.41769999265670776}],"concepts":[{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.705299973487854},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6854000091552734},{"id":"https://openalex.org/C70437156","wikidata":"https://www.wikidata.org/wiki/Q7228652","display_name":"Pooling","level":2,"score":0.5680999755859375},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.5257999897003174},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5065000057220459},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4869999885559082},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4672999978065491},{"id":"https://openalex.org/C66746571","wikidata":"https://www.wikidata.org/wiki/Q1134833","display_name":"ENCODE","level":3,"score":0.4438999891281128},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43779999017715454},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.41769999265670776},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4050000011920929},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.3944000005722046},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.3831999897956848},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3292999863624573},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.32829999923706055},{"id":"https://openalex.org/C191172861","wikidata":"https://www.wikidata.org/wiki/Q7899321","display_name":"Upstream (networking)","level":2,"score":0.3091999888420105},{"id":"https://openalex.org/C190839683","wikidata":"https://www.wikidata.org/wiki/Q2448197","display_name":"Train","level":2,"score":0.3050000071525574},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.2872999906539917},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.2644999921321869},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.2531000077724457},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.2515000104904175}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2602.12696","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.12696","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2602.12696","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.12696","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Training":[0],"and":[1,21,120,134,164],"evaluating":[2],"vision":[3],"encoders":[4,26,35,48],"on":[5,27,58],"Multi-Channel":[6],"Imaging":[7],"(MCI)":[8],"data":[9],"remains":[10],"challenging":[11],"as":[12],"channel":[13,29,132],"configurations":[14],"vary":[15],"across":[16,144],"datasets,":[17],"preventing":[18],"fixed-channel":[19],"training":[20,94],"limiting":[22],"reuse":[23],"of":[24],"pre-trained":[25,47,176],"new":[28],"settings.":[30],"Prior":[31],"work":[32],"trains":[33],"MCI":[34,87,110,148,175],"but":[36],"typically":[37],"evaluates":[38],"them":[39],"via":[40],"full":[41,170],"fine-tuning,":[42],"leaving":[43],"probing":[44,55,153,158],"with":[45],"frozen":[46],"comparatively":[49],"underexplored.":[50],"Existing":[51],"studies":[52],"that":[53],"perform":[54],"largely":[56,165],"focus":[57],"improving":[59],"representations,":[60],"rather":[61],"than":[62,93],"how":[63],"to":[64,86,129,138,169],"best":[65],"leverage":[66],"fixed":[67],"representations":[68],"for":[69],"downstream":[70],"tasks.":[71],"Although":[72],"the":[73,105,118,156,167,173],"latter":[74],"problem":[75],"has":[76],"been":[77],"studied":[78],"in":[79,109,182],"other":[80],"domains,":[81],"directly":[82],"transferring":[83],"those":[84],"strategies":[85],"yields":[88],"weak":[89],"results,":[90],"even":[91],"worse":[92],"from":[95,162,172],"scratch.":[96],"We":[97],"therefore":[98],"propose":[99],"Channel-Aware":[100],"Probing":[101],"(CAP),":[102],"which":[103],"exploits":[104],"intrinsic":[106],"inter-channel":[107],"diversity":[108],"datasets":[111],"by":[112],"controlling":[113],"feature":[114],"flow":[115],"at":[116],"both":[117],"encoder":[119],"probe":[121],"levels.":[122],"CAP":[123,150],"uses":[124],"Independent":[125],"Feature":[126],"Encoding":[127],"(IFE)":[128],"encode":[130],"each":[131],"separately,":[133],"Decoupled":[135],"Pooling":[136],"(DCP)":[137],"pool":[139],"within":[140],"channels":[141],"before":[142],"aggregating":[143],"channels.":[145],"Across":[146],"three":[147],"benchmarks,":[149],"consistently":[151],"improves":[152],"performance":[154],"over":[155],"default":[157],"protocol,":[159],"matches":[160],"fine-tuning":[161,171],"scratch,":[163],"reduces":[166],"gap":[168],"same":[174],"checkpoints.":[177],"Code":[178],"can":[179],"be":[180],"found":[181],"https://github.com/umarikkar/CAP.":[183]},"counts_by_year":[],"updated_date":"2026-02-17T06:10:05.244387","created_date":"2026-02-17T00:00:00"}
