{"id":"https://openalex.org/W7155102379","doi":"https://doi.org/10.48550/arxiv.2604.16854","title":"CATP: Confidence-Aware Token Pruning for Camouflaged Object Detection","display_name":"CATP: Confidence-Aware Token Pruning for Camouflaged Object Detection","publication_year":2026,"publication_date":"2026-04-18","ids":{"openalex":"https://openalex.org/W7155102379","doi":"https://doi.org/10.48550/arxiv.2604.16854"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2604.16854","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.16854","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2604.16854","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5134120721","display_name":"Yuhan Gao","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Gao, Yuhan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068307499","display_name":"Shuhao Kang","orcid":"https://orcid.org/0009-0006-3290-7274"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kang, Shuhao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5134150432","display_name":"Xin He","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"He, Xin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5134100086","display_name":"Bing Li","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li, Bing","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5134102078","display_name":"Xu Cheng","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Cheng, Xu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5134163820","display_name":"Yun Liu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liu, Yun","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5134120721"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11605","display_name":"Visual Attention and Saliency Detection","score":0.9794999957084656,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11605","display_name":"Visual Attention and Saliency Detection","score":0.9794999957084656,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.0027000000700354576,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11019","display_name":"Image Enhancement Techniques","score":0.0019000000320374966,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/pruning","display_name":"Pruning","score":0.7228999733924866},{"id":"https://openalex.org/keywords/object-detection","display_name":"Object detection","score":0.617900013923645},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.5726000070571899},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5065000057220459},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4878000020980835},{"id":"https://openalex.org/keywords/computational-complexity-theory","display_name":"Computational complexity theory","score":0.45730000734329224},{"id":"https://openalex.org/keywords/object","display_name":"Object (grammar)","score":0.4401000142097473},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.39320001006126404},{"id":"https://openalex.org/keywords/subnetwork","display_name":"Subnetwork","score":0.38530001044273376},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3700000047683716}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8065000176429749},{"id":"https://openalex.org/C108010975","wikidata":"https://www.wikidata.org/wiki/Q500094","display_name":"Pruning","level":2,"score":0.7228999733924866},{"id":"https://openalex.org/C2776151529","wikidata":"https://www.wikidata.org/wiki/Q3045304","display_name":"Object detection","level":3,"score":0.617900013923645},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.5726000070571899},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5333999991416931},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5065000057220459},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4878000020980835},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.45730000734329224},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.4401000142097473},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.39320001006126404},{"id":"https://openalex.org/C2780186347","wikidata":"https://www.wikidata.org/wiki/Q11414","display_name":"Subnetwork","level":2,"score":0.38530001044273376},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3700000047683716},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.362199991941452},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.34630000591278076},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.33959999680519104},{"id":"https://openalex.org/C19768560","wikidata":"https://www.wikidata.org/wiki/Q320727","display_name":"Dependency (UML)","level":2,"score":0.33250001072883606},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.32739999890327454},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.32280001044273376},{"id":"https://openalex.org/C66024118","wikidata":"https://www.wikidata.org/wiki/Q1122506","display_name":"Computational model","level":2,"score":0.31929999589920044},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.31769999861717224},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.3167000114917755},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.3091999888420105},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.30169999599456787},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.2922999858856201},{"id":"https://openalex.org/C151201525","wikidata":"https://www.wikidata.org/wiki/Q177239","display_name":"Limit (mathematics)","level":2,"score":0.29089999198913574},{"id":"https://openalex.org/C2780023022","wikidata":"https://www.wikidata.org/wiki/Q1338171","display_name":"Compensation (psychology)","level":2,"score":0.28790000081062317},{"id":"https://openalex.org/C2988416141","wikidata":"https://www.wikidata.org/wiki/Q6031139","display_name":"Information loss","level":2,"score":0.28690001368522644},{"id":"https://openalex.org/C31170391","wikidata":"https://www.wikidata.org/wiki/Q188619","display_name":"Hierarchy","level":2,"score":0.28220000863075256},{"id":"https://openalex.org/C2776650193","wikidata":"https://www.wikidata.org/wiki/Q264661","display_name":"Obstacle","level":2,"score":0.2768000066280365},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.2614000141620636},{"id":"https://openalex.org/C62354387","wikidata":"https://www.wikidata.org/wiki/Q875399","display_name":"Boundary (topology)","level":2,"score":0.2590999901294708},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.25839999318122864},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.25699999928474426},{"id":"https://openalex.org/C111696304","wikidata":"https://www.wikidata.org/wiki/Q2303697","display_name":"Sorting","level":2,"score":0.2567000091075897},{"id":"https://openalex.org/C64876066","wikidata":"https://www.wikidata.org/wiki/Q5141226","display_name":"Cognitive neuroscience of visual object recognition","level":3,"score":0.2531999945640564}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2604.16854","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.16854","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2604.16854","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.16854","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Camouflaged":[0],"Object":[1],"Detection":[2],"(COD)":[3],"aims":[4],"to":[5],"segment":[6],"targets":[7],"that":[8,97,114],"share":[9],"extreme":[10],"textural":[11],"and":[12,33,66,74],"structural":[13],"similarities":[14],"with":[15],"their":[16,20,39],"complex":[17],"environments.":[18],"Leveraging":[19],"capacity":[21],"for":[22,60,85,130],"long-range":[23],"dependency":[24],"modeling,":[25],"Transformer-based":[26],"detectors":[27],"have":[28],"become":[29],"the":[30,131],"mainstream":[31],"approach":[32,63],"achieve":[34],"state-of-the-art":[35],"(SoTA)":[36],"accuracy,":[37,124],"yet":[38],"substantial":[40],"computational":[41,119],"overhead":[42],"severely":[43],"limits":[44],"practical":[45],"deployment.":[46],"To":[47,83],"address":[48],"this,":[49],"we":[50,90],"propose":[51],"a":[52,92,126],"hierarchical":[53],"Confidence-Aware":[54],"Token":[55],"Pruning":[56],"framework":[57],"(CATP)":[58],"tailored":[59],"COD.":[61],"Our":[62],"hierarchically":[64],"identifies":[65],"discards":[67],"easily":[68],"distinguishable":[69],"tokens":[70,103],"from":[71,88,101],"both":[72],"background":[73],"object":[75],"interiors,":[76],"focusing":[77],"computations":[78],"on":[79,109],"critical":[80],"boundary":[81],"tokens.":[82],"compensate":[84],"information":[86],"loss":[87],"pruning,":[89],"introduce":[91],"dual-path":[93],"feature":[94],"compensation":[95],"mechanism":[96],"aggregates":[98],"contextual":[99],"knowledge":[100],"pruned":[102],"into":[104],"enriched":[105],"features.":[106],"Extensive":[107],"experiments":[108],"multiple":[110],"COD":[111,135],"benchmarks":[112],"demonstrate":[113],"our":[115],"method":[116],"significantly":[117],"reduces":[118],"complexity":[120],"while":[121],"maintaining":[122],"high":[123],"offering":[125],"promising":[127],"research":[128],"direction":[129],"efficient":[132],"deployment":[133],"of":[134],"models":[136],"in":[137],"real-world":[138],"scenarios.":[139],"The":[140],"code":[141],"will":[142],"be":[143],"released.":[144]},"counts_by_year":[],"updated_date":"2026-04-22T06:07:44.442478","created_date":"2026-04-22T00:00:00"}
