{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T14:07:04Z","timestamp":1775570824818,"version":"3.50.1"},"publisher-location":"Cham","reference-count":65,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031197963","type":"print"},{"value":"9783031197970","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-19797-0_2","type":"book-chapter","created":{"date-parts":[[2022,11,2]],"date-time":"2022-11-02T20:28:41Z","timestamp":1667420921000},"page":"19-37","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":62,"title":["OSFormer: One-Stage Camouflaged Instance Segmentation with\u00a0Transformers"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2630-2838","authenticated-orcid":false,"given":"Jialun","family":"Pei","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7910-3624","authenticated-orcid":false,"given":"Tianyang","family":"Cheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5245-7518","authenticated-orcid":false,"given":"Deng-Ping","family":"Fan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8454-1407","authenticated-orcid":false,"given":"He","family":"Tang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8006-7851","authenticated-orcid":false,"given":"Chuanbo","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3445-5711","authenticated-orcid":false,"given":"Luc","family":"Van Gool","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,3]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Bai, M., Urtasun, R.: Deep watershed transform for instance segmentation. In: IEEE CVPR (2017)","DOI":"10.1109\/CVPR.2017.305"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Bhajantri, N.U., Nagabhushan, P.: Camouflage defect identification: a novel approach. In: IEEE ICIT (2006)","DOI":"10.1109\/ICIT.2006.34"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Bolya, D., Zhou, C., Xiao, F., Lee, Y.J.: Yolact: Real-time instance segmentation. In: IEEE CVPR (2019)","DOI":"10.1109\/ICCV.2019.00925"},{"issue":"5","key":"2_CR4","doi-asserted-by":"publisher","first-page":"1483","DOI":"10.1109\/TPAMI.2019.2956516","volume":"43","author":"Z Cai","year":"2019","unstructured":"Cai, Z., Vasconcelos, N.: Cascade r-cnn: high quality object detection and instance segmentation. IEEE TPAMI 43(5), 1483\u20131498 (2019)","journal-title":"IEEE TPAMI"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-030-58452-8_13","volume-title":"Computer Vision \u2013 ECCV 2020","author":"N Carion","year":"2020","unstructured":"Carion, N., Massa, F., Synnaeve, G., Usunier, N., Kirillov, A., Zagoruyko, S.: End-to-end object detection with transformers. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12346, pp. 213\u2013229. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58452-8_13"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Chen, H., Sun, K., Tian, Z., Shen, C., Huang, Y., Yan, Y.: Blendmask: Top-down meets bottom-up for instance segmentation. In: IEEE CVPR (2020)","DOI":"10.1109\/CVPR42600.2020.00860"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Chen, K., et al.: Hybrid task cascade for instance segmentation. In: IEEE CVPR (2019)","DOI":"10.1109\/CVPR.2019.00511"},{"issue":"4","key":"2_CR8","doi-asserted-by":"publisher","first-page":"834","DOI":"10.1109\/TPAMI.2017.2699184","volume":"40","author":"LC Chen","year":"2017","unstructured":"Chen, L.C., Papandreou, G., Kokkinos, I., Murphy, K., Yuille, A.L.: Deeplab: Semantic image segmentation with deep convolutional nets, atrous convolution, and fully connected crfs. IEEE TPAMI 40(4), 834\u2013848 (2017)","journal-title":"IEEE TPAMI"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-030-01240-3_15","volume-title":"Computer Vision \u2013 ECCV 2018","author":"S Chen","year":"2018","unstructured":"Chen, S., Tan, X., Wang, B., Hu, X.: Reverse attention for salient object detection. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11213, pp. 236\u2013252. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01240-3_15"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Chu, H.K., Hsu, W.H., Mitra, N.J., Cohen-Or, D., Wong, T.T., Lee, T.Y.: Camouflage images. ACM TOG 29(4), 51\u201361 (2010)","DOI":"10.1145\/1778765.1778788"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Cuthill, I.: Camouflage. JOZ 308(2), 75\u201392 (2019)","DOI":"10.1111\/jzo.12682"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Dai, X., Chen, Y., Yang, J., Zhang, P., Yuan, L., Zhang, L.: Dynamic detr: End-to-end object detection with dynamic attention. In: IEEE CVPR (2021)","DOI":"10.1109\/ICCV48922.2021.00298"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Dai, Z., Cai, B., Lin, Y., Chen, J.: Up-detr: Unsupervised pre-training for object detection with transformers. In: IEEE CVPR (2021)","DOI":"10.1109\/CVPR46437.2021.00165"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: Imagenet: A large-scale hierarchical image database. In: IEEE CVPR (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"2_CR15","unstructured":"Dosovitskiy, A., et al.: An image is worth 16x16 words: Transformers for image recognition at scale. In: ICLR (2021)"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Fan, D.P., Ji, G.P., Sun, G., Cheng, M.M., Shen, J., Shao, L.: Camouflaged object detection. In: IEEE CVPR (2020)","DOI":"10.1109\/CVPR42600.2020.00285"},{"key":"2_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/978-3-030-59725-2_26","volume-title":"Medical Image Computing and Computer Assisted Intervention \u2013 MICCAI 2020","author":"D-P Fan","year":"2020","unstructured":"Fan, D.-P., et al.: PraNet: Parallel reverse attention network for polyp segmentation. In: Martel, A.L., Abolmaesumi, P., Stoyanov, D., Mateus, D., Zuluaga, M.A., Zhou, S.K., Racoceanu, D., Joskowicz, L. (eds.) MICCAI 2020. LNCS, vol. 12266, pp. 263\u2013273. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-59725-2_26"},{"issue":"8","key":"2_CR18","first-page":"2626","volume":"39","author":"DP Fan","year":"2020","unstructured":"Fan, D.P., et al.: Inf-net: Automatic covid-19 lung infection segmentation from ct images. IEEE TMI 39(8), 2626\u20132637 (2020)","journal-title":"IEEE TMI"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Fang, Y., et al.: Instances as queries. In: IEEE CVPR (2021)","DOI":"10.1109\/ICCV48922.2021.00683"},{"issue":"3","key":"2_CR20","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1111\/evo.14162","volume":"75","author":"JG Fennell","year":"2021","unstructured":"Fennell, J.G., Talas, L., Baddeley, R.J., Cuthill, I.C., Scott-Samuel, N.E.: The camouflage machine: Optimizing protective coloration using deep learning with genetic algorithms. Evolution 75(3), 614\u2013624 (2021)","journal-title":"Evolution"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Gao, N., et al.: Ssap: Single-shot instance segmentation with affinity pyramid. In: IEEE CVPR (2019)","DOI":"10.1109\/ICCV.2019.00073"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Guo, R., Niu, D., Qu, L., Li, Z.: Sotr: Segmenting objects with transformers. In: IEEE ICCV (2021)","DOI":"10.1109\/ICCV48922.2021.00707"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"He, K., Gkioxari, G., Doll\u00e1r, P., Girshick, R.: Mask r-cnn. In: IEEE ICCV (2017)","DOI":"10.1109\/ICCV.2017.322"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: IEEE CVPR (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Huang, X., Belongie, S.: Arbitrary style transfer in real-time with adaptive instance normalization. In: IEEE ICCV (2017)","DOI":"10.1109\/ICCV.2017.167"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Huang, Z., Huang, L., Gong, Y., Huang, C., Wang, X.: Mask scoring r-cnn. In: IEEE CVPR (2019)","DOI":"10.1109\/CVPR.2019.00657"},{"key":"2_CR27","unstructured":"Huerta, I., Rowe, D., Mozerov, M., Gonz\u00e0lez, J.: Improving background subtraction based on a casuistry of colour-motion segmentation problems. In: Iberian PRIA (2007)"},{"key":"2_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/978-3-030-87193-2_14","volume-title":"Medical Image Computing and Computer Assisted Intervention \u2013 MICCAI 2021","author":"G-P Ji","year":"2021","unstructured":"Ji, G.-P., et al.: Progressively normalized self-attention network for video polyp segmentation. In: de Bruijne, M., et al. (eds.) MICCAI 2021. LNCS, vol. 12901, pp. 142\u2013152. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-87193-2_14"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Ke, L., Danelljan, M., Li, X., Tai, Y.W., Tang, C.K., Yu, F.: Mask transfiner for high-quality instance segmentation. In: IEEE CVPR (2022)","DOI":"10.1109\/CVPR52688.2022.00437"},{"key":"2_CR30","first-page":"287","volume":"31","author":"TN Le","year":"2022","unstructured":"Le, T.N., et al.: Camouflaged instance segmentation in-the-wild: Dataset, method, and benchmark suite. IEEE TIP 31, 287\u2013300 (2022)","journal-title":"IEEE TIP"},{"key":"2_CR31","first-page":"45","volume":"184","author":"TN Le","year":"2019","unstructured":"Le, T.N., Nguyen, T.V., Nie, Z., Tran, M.T., Sugimoto, A.: Anabranch network for camouflaged object segmentation. CVIU 184, 45\u201356 (2019)","journal-title":"CVIU"},{"key":"2_CR32","doi-asserted-by":"crossref","unstructured":"Lin, T.Y., Goyal, P., Girshick, R., He, K., Doll\u00e1r, P.: Focal loss for dense object detection. In: IEEE ICCV (2017)","DOI":"10.1109\/ICCV.2017.324"},{"key":"2_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1007\/978-3-319-10602-1_48","volume-title":"Computer Vision \u2013 ECCV 2014","author":"T-Y Lin","year":"2014","unstructured":"Lin, T.-Y., et al.: Microsoft COCO: Common objects in context. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds.) ECCV 2014. LNCS, vol. 8693, pp. 740\u2013755. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10602-1_48"},{"key":"2_CR34","doi-asserted-by":"crossref","unstructured":"Liu, S., Jia, J., Fidler, S., Urtasun, R.: Sgn: Sequential grouping networks for instance segmentation. In: IEEE ICCV (2017)","DOI":"10.1109\/ICCV.2017.378"},{"key":"2_CR35","doi-asserted-by":"crossref","unstructured":"Liu, S., Qi, L., Qin, H., Shi, J., Jia, J.: Path aggregation network for instance segmentation. In: IEEE CVPR (2018)","DOI":"10.1109\/CVPR.2018.00913"},{"key":"2_CR36","doi-asserted-by":"crossref","unstructured":"Liu, Z., et al.: Swin transformer: Hierarchical vision transformer using shifted windows. In: IEEE CVPR (2021)","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"2_CR37","unstructured":"Lyu, Y., et al.: Simultaneously localize, segment and rank the camouflaged objects. In: IEEE CVPR (2021)"},{"issue":"12","key":"2_CR38","doi-asserted-by":"publisher","first-page":"1164","DOI":"10.1167\/15.12.1164","volume":"15","author":"O Matthews","year":"2015","unstructured":"Matthews, O., Liggins, E., Volonakis, T., Scott-Samuel, N., Baddeley, R., Cuthill, I.: Human visual search performance for camouflaged targets. J. Vis. 15(12), 1164\u20131164 (2015)","journal-title":"J. Vis."},{"key":"2_CR39","doi-asserted-by":"crossref","unstructured":"Mei, H., Ji, G.P., Wei, Z., Yang, X., Wei, X., Fan, D.P.: Camouflaged object segmentation with distraction mining. In: IEEE CVPR (2021)","DOI":"10.1109\/CVPR46437.2021.00866"},{"key":"2_CR40","doi-asserted-by":"crossref","unstructured":"Milletari, F., Navab, N., Ahmadi, S.A.: V-net: Fully convolutional neural networks for volumetric medical image segmentation. In: IEEE 3DV (2016)","DOI":"10.1109\/3DV.2016.79"},{"key":"2_CR41","doi-asserted-by":"crossref","unstructured":"Mondal, A.: Camouflaged object detection and tracking: A survey. IJIG 20(04), 2050028 (2020)","DOI":"10.1142\/S021946782050028X"},{"key":"2_CR42","doi-asserted-by":"crossref","unstructured":"Redmon, J., Divvala, S., Girshick, R., Farhadi, A.: You only look once: Unified, real-time object detection. In: IEEE CVPR (2016)","DOI":"10.1109\/CVPR.2016.91"},{"key":"2_CR43","doi-asserted-by":"crossref","unstructured":"Ren, J., et al.: Deep texture-aware features for camouflaged object detection. In: IEEE TCSVT (2021)","DOI":"10.1109\/TCSVT.2021.3126591"},{"key":"2_CR44","unstructured":"Ren, S., He, K., Girshick, R., Sun, J.: Faster r-cnn: Towards real-time object detection with region proposal networks. In: NeurIPS (2015)"},{"issue":"3","key":"2_CR45","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1162\/jocn.1990.2.3.213","volume":"2","author":"PA Sandon","year":"1990","unstructured":"Sandon, P.A.: Simulating visual attention. J. Cogn. Neurosci. 2(3), 213\u2013231 (1990)","journal-title":"J. Cogn. Neurosci."},{"key":"2_CR46","doi-asserted-by":"crossref","unstructured":"Sofiiuk, K., Barinova, O., Konushin, A.: Adaptis: Adaptive instance selection network. In: IEEE CVPR (2019)","DOI":"10.1109\/ICCV.2019.00745"},{"key":"2_CR47","doi-asserted-by":"crossref","unstructured":"Song, L., Geng, W.: A new camouflage texture evaluation method based on wssim and nature image features. In: ICMT (2010)","DOI":"10.1109\/ICMULT.2010.5631434"},{"issue":"1516","key":"2_CR48","first-page":"423","volume":"364","author":"M Stevens","year":"2009","unstructured":"Stevens, M., Merilaita, S.: Animal camouflage: current issues and new perspectives. PTRS B: BS 364(1516), 423\u2013427 (2009)","journal-title":"PTRS B: BS"},{"key":"2_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-030-58452-8_17","volume-title":"Computer Vision \u2013 ECCV 2020","author":"Z Tian","year":"2020","unstructured":"Tian, Z., Shen, C., Chen, H.: Conditional convolutions for instance segmentation. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12346, pp. 282\u2013298. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58452-8_17"},{"key":"2_CR50","doi-asserted-by":"crossref","unstructured":"Tian, Z., Shen, C., Chen, H., He, T.: Fcos: Fully convolutional one-stage object detection. In: IEEE ICCV (2019)","DOI":"10.1109\/ICCV.2019.00972"},{"issue":"1","key":"2_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s42003-021-01817-8","volume":"4","author":"J Troscianko","year":"2021","unstructured":"Troscianko, J., Nokelainen, O., Skelhorn, J., Stevens, M.: Variable crab camouflage patterns defeat search image formation. Commun. Biol. 4(1), 1\u20139 (2021)","journal-title":"Commun. Biol."},{"key":"2_CR52","unstructured":"Vaswani, A., et al.: Attention is all you need. In: NeurIPS (2017)"},{"key":"2_CR53","doi-asserted-by":"crossref","unstructured":"Wang, H., Zhu, Y., Adam, H., Yuille, A., Chen, L.C.: Max-deeplab: End-to-end panoptic segmentation with mask transformers. In: IEEE CVPR (2021)","DOI":"10.1109\/CVPR46437.2021.00542"},{"key":"2_CR54","doi-asserted-by":"crossref","unstructured":"Wang, W., et al.: Pyramid vision transformer: A versatile backbone for dense prediction without convolutions. In: IEEE CVPR (2021)","DOI":"10.1109\/ICCV48922.2021.00061"},{"key":"2_CR55","doi-asserted-by":"crossref","unstructured":"Wang, W., et al.: Pvtv 2: Improved baselines with pyramid vision transformer. In: CVMJ (2022)","DOI":"10.1007\/s41095-022-0274-8"},{"key":"2_CR56","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1007\/978-3-030-58523-5_38","volume-title":"Computer Vision \u2013 ECCV 2020","author":"X Wang","year":"2020","unstructured":"Wang, X., Kong, T., Shen, C., Jiang, Y., Li, L.: SOLO: Segmenting objects by locations. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12363, pp. 649\u2013665. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58523-5_38"},{"key":"2_CR57","unstructured":"Wang, X., Zhang, R., Kong, T., Li, L., Shen, C.: Solov2: Dynamic and fast instance segmentation. In: NeurIPS (2020)"},{"key":"2_CR58","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-01234-2_1","volume-title":"Computer Vision \u2013 ECCV 2018","author":"S Woo","year":"2018","unstructured":"Woo, S., Park, J., Lee, J.-Y., Kweon, I.S.: CBAM: Convolutional block attention module. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11211, pp. 3\u201319. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01234-2_1"},{"key":"2_CR59","doi-asserted-by":"crossref","unstructured":"Wu, H., et al.: Cvt: Introducing convolutions to vision transformers. In: IEEE CVPR (2021)","DOI":"10.1109\/ICCV48922.2021.00009"},{"key":"2_CR60","unstructured":"Xie, E., Wang, W., Yu, Z., Anandkumar, A., Alvarez, J.M., Luo, P.: Segformer: Simple and efficient design for semantic segmentation with transformers. In: NeurIPS (2021)"},{"key":"2_CR61","doi-asserted-by":"publisher","first-page":"43290","DOI":"10.1109\/ACCESS.2021.3064443","volume":"9","author":"J Yan","year":"2021","unstructured":"Yan, J., Le, T.N., Nguyen, K.D., Tran, M.T., Do, T.T., Nguyen, T.V.: Mirrornet: Bio-inspired camouflaged object segmentation. IEEE Access 9, 43290\u201343300 (2021)","journal-title":"IEEE Access"},{"key":"2_CR62","doi-asserted-by":"crossref","unstructured":"Yang, F., et al.: Uncertainty-guided transformer reasoning for camouflaged object detection. In: IEEE CVPR (2021)","DOI":"10.1109\/ICCV48922.2021.00411"},{"key":"2_CR63","doi-asserted-by":"crossref","unstructured":"Zhai, Q., Li, X., Yang, F., Chen, C., Cheng, H., Fan, D.P.: Mutual graph learning for camouflaged object detection. In: IEEE CVPR (2021)","DOI":"10.1109\/CVPR46437.2021.01280"},{"key":"2_CR64","doi-asserted-by":"crossref","unstructured":"Zhu, J., Zhang, X., Zhang, S., Liu, J.: Inferring camouflaged objects by texture-aware interactive guidance network. In: AAAI (2021)","DOI":"10.1609\/aaai.v35i4.16475"},{"key":"2_CR65","unstructured":"Zhu, X., Su, W., Lu, L., Li, B., Wang, X., Dai, J.: Deformable detr: Deformable transformers for end-to-end object detection. In: ICLR (2020)"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-19797-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,2]],"date-time":"2022-11-02T20:36:51Z","timestamp":1667421411000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-19797-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031197963","9783031197970"],"references-count":65,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-19797-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"3 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tel Aviv","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Israel","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2022.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5804","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1645","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.21","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.91","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}