{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T12:28:45Z","timestamp":1772627325739,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T00:00:00Z","timestamp":1744070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T00:00:00Z","timestamp":1744070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the Key Research Project of Natural Science in  Anhui Province","award":["2022AH050249"],"award-info":[{"award-number":["2022AH050249"]}]},{"name":"the University Synergy Innovation Program of  Anhui Province","award":["GXXT-2023-012"],"award-info":[{"award-number":["GXXT-2023-012"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Multimed Info Retr"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s13735-025-00364-w","type":"journal-article","created":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T21:29:54Z","timestamp":1744147794000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Multi-view learning for camouflaged object detection with PVTv2"],"prefix":"10.1007","volume":"14","author":[{"given":"Pu","family":"Yan","sequence":"first","affiliation":[]},{"given":"Kang","family":"Ruan","sequence":"additional","affiliation":[]},{"given":"Lili","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Xu","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,8]]},"reference":[{"key":"364_CR1","doi-asserted-by":"crossref","unstructured":"Fan DP, Ji GP, Sun G, et\u00a0al (2020) Camouflaged object detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 2777\u20132787","DOI":"10.1109\/CVPR42600.2020.00285"},{"issue":"5","key":"364_CR2","doi-asserted-by":"publisher","first-page":"1389","DOI":"10.1093\/beheco\/arv096","volume":"26","author":"MG Nafus","year":"2015","unstructured":"Nafus MG, Germano JM, Perry JA et al (2015) Hiding in plain sight: a study on camouflage and habitat selection in a slow-moving desert herbivore. Behav Ecol 26(5):1389\u20131394","journal-title":"Behav Ecol"},{"key":"364_CR3","doi-asserted-by":"crossref","unstructured":"Fan DP, Ji GP, Zhou T, et\u00a0al (2020) Pranet: parallel reverse attention network for polyp segmentation. In: International conference on medical image computing and computer-assisted intervention, Springer, pp 263\u2013273","DOI":"10.1007\/978-3-030-59725-2_26"},{"key":"364_CR4","doi-asserted-by":"crossref","unstructured":"Lv Y, Zhang J, Dai Y, et\u00a0al (2021) Simultaneously localize, segment and rank the camouflaged objects. In: Proceedings of the IEEE\/CVF conference on Computer Vision and Pattern Recognition, pp 11591\u201311601","DOI":"10.1109\/CVPR46437.2021.01142"},{"key":"364_CR5","doi-asserted-by":"crossref","unstructured":"Li A, Zhang J, Lv Y, et\u00a0al (2021) Uncertainty-aware joint salient object and camouflaged object detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 10071\u201310081","DOI":"10.1109\/CVPR46437.2021.00994"},{"key":"364_CR6","doi-asserted-by":"crossref","unstructured":"Zhai Q, Li X, Yang F, et\u00a0al (2021) Mutual graph learning for camouflaged object detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 12997\u201313007","DOI":"10.1109\/CVPR46437.2021.01280"},{"key":"364_CR7","doi-asserted-by":"crossref","unstructured":"Sun Y, Chen G, Zhou T, et\u00a0al (2021) Context-aware cross-level fusion network for camouflaged object detection. arXiv preprint arXiv:2105.12555","DOI":"10.24963\/ijcai.2021\/142"},{"key":"364_CR8","unstructured":"Dosovitskiy A, Beyer L, Kolesnikov A, et\u00a0al (2020) An image is worth 16x16 words: transformers for image recognition at scale. arXiv preprint arXiv:2010.11929"},{"key":"364_CR9","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, et\u00a0al (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"issue":"2","key":"364_CR10","doi-asserted-by":"publisher","first-page":"652","DOI":"10.1109\/TPAMI.2019.2938758","volume":"43","author":"SH Gao","year":"2019","unstructured":"Gao SH, Cheng MM, Zhao K et al (2019) Res2net: a new multi-scale backbone architecture. IEEE Trans Pattern Anal Mach Intell 43(2):652\u2013662","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"364_CR11","doi-asserted-by":"crossref","unstructured":"Pang Y, Zhao X, Xiang TZ, et\u00a0al (2022) Zoom in and out: a mixed-scale triplet network for camouflaged object detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 2160\u20132170","DOI":"10.1109\/CVPR52688.2022.00220"},{"key":"364_CR12","doi-asserted-by":"crossref","unstructured":"Huang Z, Dai H, Xiang TZ, et\u00a0al (2023) Feature shrinkage pyramid for camouflaged object detection with transformers. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 5557\u20135566","DOI":"10.1109\/CVPR52729.2023.00538"},{"key":"364_CR13","doi-asserted-by":"crossref","unstructured":"Wang W, Xie E, Li X, et\u00a0al (2021) Pyramid vision transformer: a versatile backbone for dense prediction without convolutions. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp 568\u2013578","DOI":"10.1109\/ICCV48922.2021.00061"},{"key":"364_CR14","doi-asserted-by":"publisher","first-page":"107445","DOI":"10.1016\/j.asoc.2021.107445","volume":"109","author":"S Poudel","year":"2021","unstructured":"Poudel S, Lee SW (2021) Deep multi-scale attentional features for medical image segmentation. Appl Soft Comput 109:107445","journal-title":"Appl Soft Comput"},{"key":"364_CR15","doi-asserted-by":"crossref","unstructured":"Chen X, Dong C, Ji J, et\u00a0al (2021) Image manipulation detection by multi-view multi-scale supervision. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp 14185\u201314193","DOI":"10.1109\/ICCV48922.2021.01392"},{"issue":"3","key":"364_CR16","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/s41095-022-0274-8","volume":"8","author":"W Wang","year":"2022","unstructured":"Wang W, Xie E, Li X et al (2022) Pvt v2: improved baselines with pyramid vision transformer. Comput Vis Med 8(3):415\u2013424","journal-title":"Comput Vis Med"},{"key":"364_CR17","unstructured":"Vaswani A, Shazeer N, Parmar N, et\u00a0al (2017) Attention is all you need. Adv Neural Inf Process Syst 30"},{"key":"364_CR18","doi-asserted-by":"crossref","unstructured":"Lin TY, Doll\u00e1r P, Girshick R, et\u00a0al (2017) Feature pyramid networks for object detection. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2117\u20132125","DOI":"10.1109\/CVPR.2017.106"},{"issue":"9","key":"364_CR19","doi-asserted-by":"publisher","first-page":"1904","DOI":"10.1109\/TPAMI.2015.2389824","volume":"37","author":"K He","year":"2015","unstructured":"He K, Zhang X, Ren S et al (2015) Spatial pyramid pooling in deep convolutional networks for visual recognition. IEEE Trans Pattern Anal Mach Intell 37(9):1904\u20131916","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"4","key":"364_CR20","doi-asserted-by":"publisher","first-page":"834","DOI":"10.1109\/TPAMI.2017.2699184","volume":"40","author":"LC Chen","year":"2017","unstructured":"Chen LC, Papandreou G, Kokkinos I et al (2017) Deeplab: semantic image segmentation with deep convolutional nets, atrous convolution, and fully connected crfs. IEEE Trans Pattern Anal Mach Intell 40(4):834\u2013848","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"11","key":"364_CR21","doi-asserted-by":"publisher","first-page":"2691","DOI":"10.1109\/TIFS.2018.2825953","volume":"13","author":"B Bayar","year":"2018","unstructured":"Bayar B, Stamm MC (2018) Constrained convolutional neural networks: a new approach towards general purpose image manipulation detection. IEEE Trans Inf Forens Secur 13(11):2691\u20132706","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"364_CR22","doi-asserted-by":"crossref","unstructured":"Xie E, Wang W, Wang W, et\u00a0al (2020) Segmenting transparent objects in the wild. In: Computer vision\u2013ECCV 2020: 16th European conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part XIII 16, Springer, pp 696\u2013711","DOI":"10.1007\/978-3-030-58601-0_41"},{"key":"364_CR23","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.cviu.2019.04.006","volume":"184","author":"TN Le","year":"2019","unstructured":"Le TN, Nguyen TV, Nie Z et al (2019) Anabranch network for camouflaged object segmentation. Comput Vis Image Underst 184:45\u201356","journal-title":"Comput Vis Image Underst"},{"key":"364_CR24","doi-asserted-by":"crossref","unstructured":"Fan DP, Cheng MM, Liu Y, et\u00a0al (2017) Structure-measure: a new way to evaluate foreground maps. In: Proceedings of the IEEE international conference on computer vision, pp 4548\u20134557","DOI":"10.1109\/ICCV.2017.487"},{"key":"364_CR25","doi-asserted-by":"crossref","unstructured":"Perazzi F, Kr\u00e4henb\u00fchl P, Pritch Y, et\u00a0al (2012) Saliency filters: contrast based filtering for salient region detection. In: 2012 IEEE conference on computer vision and pattern recognition, IEEE, pp 733\u2013740","DOI":"10.1109\/CVPR.2012.6247743"},{"key":"364_CR26","doi-asserted-by":"crossref","unstructured":"Margolin R, Zelnik-Manor L, Tal A (2014) How to evaluate foreground maps? In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 248\u2013255","DOI":"10.1109\/CVPR.2014.39"},{"issue":"6","key":"364_CR27","first-page":"5","volume":"6","author":"DP Fan","year":"2021","unstructured":"Fan DP, Ji GP, Qin X et al (2021) Cognitive vision inspired object segmentation metric and loss function. Sci Sinica Inform 6(6):5","journal-title":"Sci Sinica Inform"},{"key":"364_CR28","unstructured":"Kingma DP, Ba J (2014) Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980"},{"key":"364_CR29","doi-asserted-by":"crossref","unstructured":"Liu JJ, Hou Q, Cheng MM, et\u00a0al (2019) A simple pooling-based design for real-time salient object detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 3917\u20133926","DOI":"10.1109\/CVPR.2019.00404"},{"key":"364_CR30","doi-asserted-by":"crossref","unstructured":"Zhao JX, Liu JJ, Fan DP, et\u00a0al (2019) Egnet: edge guidance network for salient object detection. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp 8779\u20138788","DOI":"10.1109\/ICCV.2019.00887"},{"key":"364_CR31","doi-asserted-by":"crossref","unstructured":"Wu Z, Su L, Huang Q (2019) Stacked cross refinement network for edge-aware salient object detection. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp 7264\u20137273","DOI":"10.1109\/ICCV.2019.00736"},{"key":"364_CR32","doi-asserted-by":"crossref","unstructured":"Wei J, Wang S, Huang Q (2020) F$$^3$$net: fusion, feedback and focus for salient object detection. In: Proceedings of the AAAI conference on artificial intelligence, pp 12321\u201312328","DOI":"10.1609\/aaai.v34i07.6916"},{"key":"364_CR33","doi-asserted-by":"crossref","unstructured":"Zhou H, Xie X, Lai JH, et\u00a0al (2020) Interactive two-stream decoder for accurate and fast saliency detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 9141\u20139150","DOI":"10.1109\/CVPR42600.2020.00916"},{"key":"364_CR34","doi-asserted-by":"crossref","unstructured":"Zhang J, Fan DP, Dai Y, et\u00a0al (2020) Uc-net: Uncertainty inspired rgb-d saliency detection via conditional variational autoencoders. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 8582\u20138591","DOI":"10.1109\/CVPR42600.2020.00861"},{"key":"364_CR35","doi-asserted-by":"crossref","unstructured":"Gao SH, Tan YQ, Cheng MM, et\u00a0al (2020) Highly efficient salient object detection with 100k parameters. In: European conference on computer vision, Springer, pp 702\u2013721","DOI":"10.1007\/978-3-030-58539-6_42"},{"key":"364_CR36","doi-asserted-by":"crossref","unstructured":"Mei H, Ji GP, Wei Z, et\u00a0al (2021) Camouflaged object segmentation with distraction mining. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 8772\u20138781","DOI":"10.1109\/CVPR46437.2021.00866"},{"key":"364_CR37","doi-asserted-by":"crossref","unstructured":"Yang F, Zhai Q, Li X, et\u00a0al (2021) Uncertainty-guided transformer reasoning for camouflaged object detection. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp 4146\u20134155","DOI":"10.1109\/ICCV48922.2021.00411"},{"key":"364_CR38","doi-asserted-by":"crossref","unstructured":"Sun Y, Wang S, Chen C, et\u00a0al (2022) Boundary-guided camouflaged object detection. In: Raedt LD (ed) Proceedings of the thirty-first international joint conference on artificial intelligence, IJCAI-22. international joint conferences on artificial intelligence organization, pp 1335\u20131341","DOI":"10.24963\/ijcai.2022\/186"},{"issue":"10","key":"364_CR39","doi-asserted-by":"publisher","first-page":"6024","DOI":"10.1109\/TPAMI.2021.3085766","volume":"44","author":"DP Fan","year":"2021","unstructured":"Fan DP, Ji GP, Cheng MM et al (2021) Concealed object detection. IEEE Trans Patt Anal Mach Intell 44(10):6024\u20136042","journal-title":"IEEE Trans Patt Anal Mach Intell"},{"key":"364_CR40","doi-asserted-by":"crossref","unstructured":"Zhu H, Li P, Xie H, et\u00a0al (2022) I can find you! boundary-guided separated attention network for camouflaged object detection. In: Proceedings of the AAAI conference on artificial intelligence, pp 3608\u20133616","DOI":"10.1609\/aaai.v36i3.20273"},{"key":"364_CR41","doi-asserted-by":"crossref","unstructured":"Jia Q, Yao S, Liu Y, et\u00a0al (2022) Segment, magnify and reiterate: Detecting camouflaged objects the hard way. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 4713\u20134722","DOI":"10.1109\/CVPR52688.2022.00467"},{"key":"364_CR42","doi-asserted-by":"crossref","unstructured":"He R, Dong Q, Lin J, et\u00a0al (2023) Weakly-supervised camouflaged object detection with scribble annotations. In: Proceedings of the AAAI conference on artificial intelligence, pp 781\u2013789","DOI":"10.1609\/aaai.v37i1.25156"},{"key":"364_CR43","unstructured":"He C, Li K, Zhang Y, et\u00a0al (2024) Strategic preys make acute predators: enhancing camouflaged object detectors by generating camouflaged objects. In: The Twelfth international conference on learning representations, pp 1\u201319"}],"container-title":["International Journal of Multimedia Information Retrieval"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13735-025-00364-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13735-025-00364-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13735-025-00364-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T13:41:01Z","timestamp":1749562861000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13735-025-00364-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,8]]},"references-count":43,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["364"],"URL":"https:\/\/doi.org\/10.1007\/s13735-025-00364-w","relation":{},"ISSN":["2192-6611","2192-662X"],"issn-type":[{"value":"2192-6611","type":"print"},{"value":"2192-662X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,8]]},"assertion":[{"value":"14 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 February 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 February 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 April 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no Conflict of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"14"}}