{"id":"https://openalex.org/W7131400887","doi":"https://doi.org/10.48550/arxiv.2602.19870","title":"ApET: Approximation-Error Guided Token Compression for Efficient VLMs","display_name":"ApET: Approximation-Error Guided Token Compression for Efficient VLMs","publication_year":2026,"publication_date":"2026-02-23","ids":{"openalex":"https://openalex.org/W7131400887","doi":"https://doi.org/10.48550/arxiv.2602.19870"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2602.19870","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.19870","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2602.19870","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067624120","display_name":"Qiankun Ma","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ma, Qiankun","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126811946","display_name":"Ziyao Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhang, Ziyao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100771234","display_name":"Haofei Wang","orcid":"https://orcid.org/0000-0002-3898-0927"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wang, Haofei","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126778859","display_name":"Jie Chen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chen, Jie","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020224567","display_name":"Zhen Song","orcid":"https://orcid.org/0000-0001-8381-0225"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Song, Zhen","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5102197680","display_name":"Hairong Zheng","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zheng, Hairong","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5067624120"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11714","display_name":"Multimodal Machine Learning Applications","score":0.949400007724762,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11714","display_name":"Multimodal Machine Learning Applications","score":0.949400007724762,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.01080000028014183,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.003800000064074993,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.6071000099182129},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.5954999923706055},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5759000182151794},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5472999811172485},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5110999941825867},{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.48910000920295715},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.4138000011444092},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.39980000257492065}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8258000016212463},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.6071000099182129},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.5954999923706055},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5759000182151794},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5472999811172485},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5110999941825867},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.48910000920295715},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.4138000011444092},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.39980000257492065},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39089998602867126},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.38280001282691956},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3671000003814697},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35740000009536743},{"id":"https://openalex.org/C180016635","wikidata":"https://www.wikidata.org/wiki/Q2712821","display_name":"Compression (physics)","level":2,"score":0.334199994802475},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.32339999079704285},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3228999972343445},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3052000105381012},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.3009999990463257},{"id":"https://openalex.org/C12426560","wikidata":"https://www.wikidata.org/wiki/Q189569","display_name":"Basis (linear algebra)","level":2,"score":0.28769999742507935},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2700999975204468},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2694999873638153},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.25920000672340393},{"id":"https://openalex.org/C117896860","wikidata":"https://www.wikidata.org/wiki/Q11376","display_name":"Acceleration","level":2,"score":0.2565000057220459},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.2513999938964844}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2602.19870","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.19870","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2602.19870","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.19870","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Recent":[0],"Vision-Language":[1],"Models":[2],"(VLMs)":[3],"have":[4],"demonstrated":[5],"remarkable":[6],"multimodal":[7],"understanding":[8],"capabilities,":[9],"yet":[10],"the":[11,110,126,133,150,165],"redundant":[12,37],"visual":[13,38,81,92,112],"tokens":[14,113,120],"incur":[15],"prohibitive":[16],"computational":[17],"overhead":[18],"and":[19,35,79,131,142,156,170,187],"degrade":[20],"inference":[21,185],"efficiency.":[22],"Prior":[23],"studies":[24],"typically":[25],"relies":[26],"on":[27,153,160],"[CLS]":[28],"attention":[29,58,77,96],"or":[30],"text-vision":[31],"cross-attention":[32],"to":[33,47,89,129,174],"identify":[34,130],"discard":[36],"tokens.":[39,136],"Despite":[40],"promising":[41],"results,":[42],"such":[43,60],"solutions":[44],"are":[45,54],"prone":[46],"introduce":[48],"positional":[49],"bias":[50],"and,":[51],"more":[52,191],"critically,":[53],"incompatible":[55],"with":[56,114,181],"efficient":[57],"kernels":[59],"as":[61],"FlashAttention,":[62,182],"limiting":[63],"their":[64],"practical":[65],"deployment":[66,190],"for":[67],"VLM":[68,189],"acceleration.":[69],"In":[70],"this":[71],"paper,":[72],"we":[73],"step":[74],"away":[75],"from":[76,84],"dependencies":[78],"revisit":[80],"token":[82,166],"compression":[83,105],"an":[85,101],"information-theoretic":[86],"perspective,":[87],"aiming":[88],"maximally":[90],"preserve":[91],"information":[93],"without":[94],"any":[95],"involvement.":[97],"We":[98],"present":[99],"ApET,":[100],"Approximation-Error":[102],"guided":[103],"Token":[104],"framework.":[106],"ApET":[107,146,178],"first":[108],"reconstructs":[109],"original":[111,151],"a":[115],"small":[116],"set":[117],"of":[118,149],"basis":[119],"via":[121],"linear":[122],"approximation,":[123],"then":[124],"leverages":[125],"approximation":[127],"error":[128],"drop":[132],"least":[134],"informative":[135],"Extensive":[137],"experiments":[138],"across":[139],"multiple":[140],"VLMs":[141],"benchmarks":[143],"demonstrate":[144],"that":[145],"retains":[147],"95.2%":[148],"performance":[152],"image-understanding":[154],"tasks":[155],"even":[157],"attains":[158],"100.4%":[159],"video-understanding":[161],"tasks,":[162],"while":[163],"compressing":[164],"budgets":[167],"by":[168],"88.9%":[169],"87.5%,":[171],"respectively.":[172],"Thanks":[173],"its":[175],"attention-free":[176],"design,":[177],"seamlessly":[179],"integrates":[180],"enabling":[183],"further":[184],"acceleration":[186],"making":[188],"practical.":[192],"Code":[193],"is":[194],"available":[195],"at":[196],"https://github.com/MaQianKun0/ApET.":[197]},"counts_by_year":[],"updated_date":"2026-02-26T06:34:08.959763","created_date":"2026-02-26T00:00:00"}
