{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T16:45:35Z","timestamp":1776876335205,"version":"3.51.2"},"reference-count":60,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100007433","name":"China West Normal University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007433","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012478","name":"Fundamental Research Funds of China West Normal University","doi-asserted-by":"publisher","award":["23kc007"],"award-info":[{"award-number":["23kc007"]}],"id":[{"id":"10.13039\/501100012478","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Applied Soft Computing"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.asoc.2026.115178","type":"journal-article","created":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T16:58:58Z","timestamp":1775494738000},"page":"115178","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["FMLNet: A lightweight camouflage object detection network via frequency-RGB multi-domain feature mutual learning"],"prefix":"10.1016","volume":"197","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9439-4711","authenticated-orcid":false,"given":"He","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Liping","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Xue","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Haiyang","family":"Zou","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.asoc.2026.115178_bib0005","first-page":"1","article-title":"Attention-guided pyramid context network for polyp segmentation in colonoscopy images","volume":"72","author":"Yue","year":"2023","journal-title":"IEEE Trans. Instrum. Meas."},{"issue":"5","key":"10.1016\/j.asoc.2026.115178_bib0010","doi-asserted-by":"crossref","first-page":"1552","DOI":"10.1109\/JBHI.2024.3350245","article-title":"FD-net: feature distillation network for oral squamous cell carcinoma lymph node segmentation in hyperspectral imagery","volume":"28","author":"Zhang","year":"2024","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"10.1016\/j.asoc.2026.115178_bib0015","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TIM.2022.3196430","article-title":"BCSNet: boundary, context, and semantic for automatic COVID-19 lung infection segmentation from CT images","volume":"71","author":"Cong","year":"2022","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"10.1016\/j.asoc.2026.115178_bib0020","series-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit","first-page":"20402","article-title":"SimpleNet: a simple network for image anomaly detection and localization","author":"Liu","year":"2023"},{"key":"10.1016\/j.asoc.2026.115178_bib0025","series-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit","first-page":"16699","article-title":"RealNet: a feature selection network with realistic synthetic anomaly for anomaly detection","author":"Zhang","year":"2024"},{"key":"10.1016\/j.asoc.2026.115178_bib0030","series-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit","first-page":"17201","article-title":"Depth-aware concealed crop detection in dense agricultural scenes","author":"Wang","year":"2024"},{"issue":"1","key":"10.1016\/j.asoc.2026.115178_bib0035","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.aspen.2019.11.006","article-title":"Application of an image and environmental sensor network for automated greenhouse insect pest monitoring","volume":"23","author":"Rustia","year":"2020","journal-title":"J. Asia Pac. Entomol."},{"key":"10.1016\/j.asoc.2026.115178_bib0040","series-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit","first-page":"6226","article-title":"NeuralHumanFV: real-time neural volumetric human performance rendering using RGB cameras","author":"Suo","year":"2021"},{"key":"10.1016\/j.asoc.2026.115178_bib0045","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2023.127050","article-title":"A systematic review of image-level camouflaged object detection with deep learning","volume":"566","author":"Liang","year":"2024","journal-title":"Neurocomputing"},{"key":"10.1016\/j.asoc.2026.115178_bib0050","doi-asserted-by":"crossref","first-page":"7114","DOI":"10.1109\/TMM.2024.3360710","article-title":"Decoupling and integration network for camouflaged object detection","volume":"26","author":"Zhou","year":"2024","journal-title":"IEEE Trans. Multimedia"},{"key":"10.1016\/j.asoc.2026.115178_bib0055","series-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit","first-page":"8768","article-title":"Camouflaged object segmentation with distraction mining","author":"Mei","year":"2021"},{"key":"10.1016\/j.asoc.2026.115178_bib0060","series-title":"Proc. Int. Joint Conf. Artif. Intell","first-page":"1025","article-title":"Context-aware cross-level fusion network for camouflaged object detection","author":"Sun","year":"2021"},{"issue":"1","key":"10.1016\/j.asoc.2026.115178_bib0065","first-page":"34","article-title":"A universal multi-view guided network for salient object and camouflaged object detection","volume":"11","author":"Song","year":"2024","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.asoc.2026.115178_bib0070","series-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit","first-page":"2777","article-title":"Camouflaged object detection","author":"Fan","year":"2020"},{"issue":"3","key":"10.1016\/j.asoc.2026.115178_bib0075","first-page":"3608","article-title":"I can find you! boundary-guided separated attention network for camouflaged object detection","volume":"36","author":"Zhu","year":"2022","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"key":"10.1016\/j.asoc.2026.115178_bib0080","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2021.108414","article-title":"Fast camouflaged object detection via edge-based reversible re-calibration network","volume":"123","author":"Ji","year":"2022","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.asoc.2026.115178_bib0085","doi-asserted-by":"crossref","first-page":"748","DOI":"10.1109\/LSP.2023.3286787","article-title":"Mask-and-edge co-guided separable network for camouflaged object detection","volume":"30","author":"Wu","year":"2023","journal-title":"IEEE Signal Process. Lett."},{"issue":"5","key":"10.1016\/j.asoc.2026.115178_bib0090","doi-asserted-by":"crossref","first-page":"3286","DOI":"10.1109\/TCSVT.2023.3318672","article-title":"Dual-constraint coarse-to-fine network for camouflaged object detection","volume":"34","author":"Yue","year":"2024","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.asoc.2026.115178_bib0095","first-page":"0005","article-title":"Efficient camouflaged object detection via progressive refinement network","volume":"31","author":"Zhang","year":"2024","journal-title":"IEEE Signal Process. Lett."},{"key":"10.1016\/j.asoc.2026.115178_bib0100","series-title":"Comput. Vis. Image Understand","first-page":"45","article-title":"Anabranch network for camouflaged object segmentation","volume":"vol. 184","author":"Le","year":"2019"},{"key":"10.1016\/j.asoc.2026.115178_bib0105","series-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit","first-page":"11586","article-title":"Simultaneously localize, segment, and rank the camouflaged objects","author":"Lv","year":"2021"},{"key":"10.1016\/j.asoc.2026.115178_bib0110","doi-asserted-by":"crossref","first-page":"5155","DOI":"10.1109\/TMM.2022.3188401","article-title":"Deep texton-coherence network for camouflaged object detection","volume":"25","author":"Zhai","year":"2023","journal-title":"IEEE Trans. Multimedia"},{"key":"10.1016\/j.asoc.2026.115178_bib0115","series-title":"Proc. IEEE\/CVF Int. Conf. Comput. Vis","first-page":"4126","article-title":"Uncertainty-guided transformer reasoning for camouflaged object detection","author":"Yang","year":"2021"},{"issue":"10","key":"10.1016\/j.asoc.2026.115178_bib0120","doi-asserted-by":"crossref","first-page":"10194","DOI":"10.1109\/TCSVT.2024.3404005","article-title":"Edge perception camouflaged object detection under frequency domain reconstruction","volume":"34","author":"Liu","year":"2024","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.asoc.2026.115178_bib0125","series-title":"Proc. ACM Int. Conf. Multimedia","first-page":"1179","article-title":"Frequency perception network for camouflaged object detection","author":"Cong","year":"2023"},{"key":"10.1016\/j.asoc.2026.115178_bib0130","series-title":"Proc. ACM Int. Conf. Multimedia","first-page":"1789","article-title":"Frequency representation integration for camouflaged object detection","author":"Xie","year":"2023"},{"key":"10.1016\/j.asoc.2026.115178_bib0135","series-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit","first-page":"4494","article-title":"Detecting camouflaged object in frequency domain","author":"Zhong","year":"2022"},{"key":"10.1016\/j.asoc.2026.115178_bib0140","first-page":"1","article-title":"Frequency-aware camouflaged object detection","volume":"19","author":"Lin","year":"2023","journal-title":"ACM Trans. Multimedia Comput. Commun. Appl."},{"key":"10.1016\/j.asoc.2026.115178_bib0145","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/TMM.2024.3521681","article-title":"Frequency-guided spatial adaptation for camouflaged object detection","volume":"27","author":"Zhang","year":"2025","journal-title":"IEEE Trans. Multimedia"},{"key":"10.1016\/j.asoc.2026.115178_bib0150","series-title":"Proc. ICASSP","first-page":"1","article-title":"TINYCOD: tiny and effective model for camouflaged object detection","author":"Xing","year":"2023"},{"key":"10.1016\/j.asoc.2026.115178_bib0155","doi-asserted-by":"crossref","first-page":"526","DOI":"10.1109\/LSP.2024.3356416","article-title":"FINet: frequency injection network for lightweight camouflaged object detection","volume":"31","author":"Liang","year":"2024","journal-title":"IEEE Signal Process. Lett."},{"key":"10.1016\/j.asoc.2026.115178_bib0160","doi-asserted-by":"crossref","first-page":"1897","DOI":"10.1109\/TIP.2022.3223216","article-title":"MGL: mutual graph learning for camouflaged object detection","volume":"32","author":"Zhai","year":"2023","journal-title":"IEEE Trans. Image Process."},{"issue":"2","key":"10.1016\/j.asoc.2026.115178_bib0165","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1109\/TEVC.2006.890271","article-title":"Intrinsic motivation systems for autonomous mental development","volume":"11","author":"Oudeyer","year":"2007","journal-title":"IEEE Trans. Evol. Comput."},{"key":"10.1016\/j.asoc.2026.115178_bib0170","series-title":"Proc. IEEE Workshop on Visual Surveillance","first-page":"42","article-title":"Detection of regions of interest and camouflage breaking by direct convexity estimation","author":"Tankus","year":"1998"},{"key":"10.1016\/j.asoc.2026.115178_bib0175","doi-asserted-by":"crossref","first-page":"152","DOI":"10.5539\/mas.v5n4p152","article-title":"Study on the camouflaged target detection method based on 3d convexity","volume":"5","author":"Pan","year":"2011","journal-title":"Modern Appl. Sci."},{"key":"10.1016\/j.asoc.2026.115178_bib0180","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1007\/s10772-020-09699-7","article-title":"Camouflaged object detection for machine vision applications","volume":"23","author":"Rao","year":"2020","journal-title":"Int. J. Speech Technol."},{"key":"10.1016\/j.asoc.2026.115178_bib0185","series-title":"Proc. Int. Conf. Green Circuits and Systems","first-page":"463","article-title":"Robust outdoor human segmentation based on color-based statistical approach and edge combination","author":"Siricharoen","year":"2010"},{"key":"10.1016\/j.asoc.2026.115178_bib0190","series-title":"Proc. IEEE\/CVF Int. Conf. Comput. Vis","first-page":"716","article-title":"Texture segmentation by multiscale aggregation of filter responses and shape elements","author":"Galun","year":"2003"},{"issue":"10","key":"10.1016\/j.asoc.2026.115178_bib0195","doi-asserted-by":"crossref","first-page":"6024","DOI":"10.1109\/TPAMI.2021.3085766","article-title":"Concealed object detection","volume":"44","author":"Fan","year":"2022","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"10","key":"10.1016\/j.asoc.2026.115178_bib0200","doi-asserted-by":"crossref","first-page":"6981","DOI":"10.1109\/TCSVT.2022.3178173","article-title":"Camouflaged object detection via context-aware cross-level fusion","volume":"32","author":"Chen","year":"2022","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"11","key":"10.1016\/j.asoc.2026.115178_bib0205","doi-asserted-by":"crossref","first-page":"15993","DOI":"10.1109\/TNNLS.2023.3291595","article-title":"Camouflaged object segmentation based on matching-recognition-refinement network","volume":"35","author":"Yan","year":"2024","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"10.1016\/j.asoc.2026.115178_bib0210","series-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit","first-page":"22046","article-title":"Camouflaged object detection with feature decomposition and edge reconstruction","author":"He","year":"2023"},{"issue":"4","key":"10.1016\/j.asoc.2026.115178_bib0215","doi-asserted-by":"crossref","first-page":"2346","DOI":"10.1109\/TCSVT.2023.3308964","article-title":"Finding camouflaged objects along the camouflage mechanisms","volume":"34","author":"Yang","year":"2024","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"12","key":"10.1016\/j.asoc.2026.115178_bib0220","doi-asserted-by":"crossref","first-page":"10362","DOI":"10.1109\/TPAMI.2024.3438565","article-title":"CamoFormer: masked separable attention for camouflaged object detection","volume":"46","author":"Yin","year":"2024","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.asoc.2026.115178_bib0225","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2025.126451","article-title":"CSFIN: a lightweight network for camouflaged object detection via cross-stage feature interaction","volume":"269","author":"Li","year":"2025","journal-title":"Expert Syst. Appl."},{"issue":"7","key":"10.1016\/j.asoc.2026.115178_bib0230","doi-asserted-by":"crossref","first-page":"5452","DOI":"10.1109\/TCSVT.2023.3349209","article-title":"Efficient camouflaged object detection network based on global localization perception and local guidance refinement","volume":"34","author":"Hu","year":"2024","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"4","key":"10.1016\/j.asoc.2026.115178_bib0235","doi-asserted-by":"crossref","first-page":"2833","DOI":"10.1109\/TPAMI.2025.3527469","article-title":"Conditional diffusion models for camouflaged and salient object detection","volume":"47","author":"Sun","year":"2025","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.asoc.2026.115178_bib0240","doi-asserted-by":"crossref","first-page":"5936","DOI":"10.1109\/TIP.2024.3475219","article-title":"Hierarchical graph interaction transformer with dynamic token clustering for camouflaged object detection","volume":"33","author":"Yao","year":"2024","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.asoc.2026.115178_bib0245","series-title":"Proc. ACM Int. Conf. Multimedia","first-page":"5323","article-title":"Preynet: preying on camouflaged objects","author":"Zhang","year":"2022"},{"key":"10.1016\/j.asoc.2026.115178_bib0250","series-title":"Proc. ICLR","article-title":"Strategic preys make acute predators: enhancing camouflaged object detectors by generating camouflaged objects","author":"He","year":"2024"},{"key":"10.1016\/j.asoc.2026.115178_bib0255","series-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit","first-page":"12992","article-title":"Mutual graph learning for camouflaged object detection","author":"Zhai","year":"2021"},{"key":"10.1016\/j.asoc.2026.115178_bib0260","doi-asserted-by":"crossref","first-page":"6396","DOI":"10.1109\/TIP.2022.3189828","article-title":"FindNet: can you find me? Boundary-and-texture enhancement network for camouflaged object detection","volume":"31","author":"Li","year":"2022","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.asoc.2026.115178_bib0265","series-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit","first-page":"10071","article-title":"Uncertainty-aware joint salient object and camouflaged object detection","author":"Li","year":"2021"},{"key":"10.1016\/j.asoc.2026.115178_bib0270","first-page":"1","article-title":"Camouflaged object segmentation based on joint salient object for contrastive learning","volume":"72","author":"Jiang","year":"2023","journal-title":"IEEE Trans. Instrum. Meas."},{"issue":"5","key":"10.1016\/j.asoc.2026.115178_bib0275","doi-asserted-by":"crossref","first-page":"3597","DOI":"10.1109\/TPAMI.2025.3532440","article-title":"Referring camouflaged object detection","volume":"47","author":"Zhang","year":"2025","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.asoc.2026.115178_bib0280","doi-asserted-by":"crossref","first-page":"5207","DOI":"10.1109\/TMM.2023.3330082","article-title":"LARNet: towards lightweight, accurate and real-time salient object detection","volume":"26","author":"Wang","year":"2024","journal-title":"IEEE Trans. Multimedia"},{"key":"10.1016\/j.asoc.2026.115178_bib0285","author":"Mehta"},{"issue":"11","key":"10.1016\/j.asoc.2026.115178_bib0290","doi-asserted-by":"crossref","first-page":"6404","DOI":"10.1109\/TCSVT.2023.3269951","article-title":"ELWNet: an extremely lightweight approach for real-time salient object detection","volume":"33","author":"Wang","year":"2023","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.asoc.2026.115178_bib0295","series-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit","first-page":"11531","article-title":"ECA-net: efficient channel attention for deep convolutional neural networks","author":"Wang","year":"2020"},{"key":"10.1016\/j.asoc.2026.115178_bib0300","unstructured":"P. Skurowski, H. Abdulameer, J. Blaszczyk, T. Depta, A. Kornacki, P. Koziel, Animal camouflage analysis: chameleon database, 2018. Available at: http:\/\/kgwisc.aei.polsl.pl\/index.php\/en\/dataset\/63-animal-camouflage-analysis (Accessed 2018)."}],"container-title":["Applied Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494626006265?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494626006265?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T16:01:20Z","timestamp":1776873680000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1568494626006265"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":60,"alternative-id":["S1568494626006265"],"URL":"https:\/\/doi.org\/10.1016\/j.asoc.2026.115178","relation":{},"ISSN":["1568-4946"],"issn-type":[{"value":"1568-4946","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"FMLNet: A lightweight camouflage object detection network via frequency-RGB multi-domain feature mutual learning","name":"articletitle","label":"Article Title"},{"value":"Applied Soft Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.asoc.2026.115178","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"115178"}}