{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T12:37:26Z","timestamp":1774874246226,"version":"3.50.1"},"reference-count":51,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["High-Confidence Computing"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1016\/j.hcc.2025.100336","type":"journal-article","created":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T16:45:11Z","timestamp":1751388311000},"page":"100336","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"title":["KANs-DETR: Enhancing Detection Transformer with Kolmogorov\u2013Arnold Networks for small object"],"prefix":"10.1016","volume":"6","author":[{"given":"Jingyu","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Wentao","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Anyan","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Junchao","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhuo","family":"Yan","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.hcc.2025.100336_b1","series-title":"End-to-end object detection with transformers","author":"Carion","year":"2020"},{"key":"10.1016\/j.hcc.2025.100336_b2","series-title":"Attention is all you need","author":"Vaswani","year":"2017"},{"key":"10.1016\/j.hcc.2025.100336_b3","doi-asserted-by":"crossref","unstructured":"D. Meng, X. Chen, Z. Fan, G. Zeng, H. Li, Y. Yuan, L. Sun, J. Wang, Conditional DETR for Fast Training Convergence, in: Proceedings of the IEEE\/CVF International Conference on Computer Vision, ICCV, 2021, pp. 3651\u20133660.","DOI":"10.1109\/ICCV48922.2021.00363"},{"issue":"4","key":"10.1016\/j.hcc.2025.100336_b4","doi-asserted-by":"crossref","DOI":"10.1016\/j.hcc.2022.100083","article-title":"Deep transfer network of heterogeneous domain feature in machine translation","volume":"2","author":"Liu","year":"2022","journal-title":"High- Confid. Comput."},{"issue":"1","key":"10.1016\/j.hcc.2025.100336_b5","doi-asserted-by":"crossref","DOI":"10.1016\/j.hcc.2022.100098","article-title":"A robust adversarial attack against speech recognition with UAP","volume":"3","author":"Qin","year":"2023","journal-title":"High- Confid. Comput."},{"issue":"4","key":"10.1016\/j.hcc.2025.100336_b6","doi-asserted-by":"crossref","DOI":"10.1016\/j.hcc.2023.100169","article-title":"An insider user authentication method based on improved temporal convolutional network","volume":"3","author":"Tao","year":"2023","journal-title":"High- Confid. Comput."},{"issue":"4","key":"10.1016\/j.hcc.2025.100336_b7","doi-asserted-by":"crossref","DOI":"10.1016\/j.hcc.2023.100153","article-title":"An effective digital audio watermarking using a deep convolutional neural network with a search location optimization algorithm for improvement in robustness and imperceptibility","volume":"3","author":"Patil","year":"2023","journal-title":"High- Confid. Comput."},{"key":"10.1016\/j.hcc.2025.100336_b8","series-title":"Deformable DETR: Deformable transformers for end-to-end object detection","author":"Zhu","year":"2020"},{"key":"10.1016\/j.hcc.2025.100336_b9","series-title":"Decomposed attention: Self-attention with linear complexities","author":"Shen","year":"2018"},{"key":"10.1016\/j.hcc.2025.100336_b10","doi-asserted-by":"crossref","first-page":"4784","DOI":"10.1109\/CVPR52688.2022.00475","article-title":"Vision transformer with deformable attention","author":"Xia","year":"2022","journal-title":"2022 IEEE\/ CVF Conf. Comput. Vis. Pattern Recognition ( CVPR)"},{"key":"10.1016\/j.hcc.2025.100336_b11","series-title":"Anchor DETR: Query design for transformer-based object detection","author":"Wang","year":"2021"},{"issue":"1","key":"10.1016\/j.hcc.2025.100336_b12","doi-asserted-by":"crossref","DOI":"10.1016\/j.hcc.2023.100167","article-title":"Security defense strategy algorithm for internet of things based on deep reinforcement learning","volume":"4","author":"Feng","year":"2024","journal-title":"High- Confid. Comput."},{"issue":"4","key":"10.1016\/j.hcc.2025.100336_b13","doi-asserted-by":"crossref","DOI":"10.1016\/j.hcc.2024.100228","article-title":"Unsupervised machine learning approach for tailoring educational content to individual student weaknesses","volume":"4","author":"Rahman","year":"2024","journal-title":"High- Confid. Comput."},{"issue":"3","key":"10.1016\/j.hcc.2025.100336_b14","doi-asserted-by":"crossref","DOI":"10.1016\/j.hcc.2024.100256","article-title":"Erratum to \u201can effective digital audio watermarking using a deep convolutional neural network with a search location optimization algorithm for improvement in robustness and imperceptibility\u201d [high-confid. Comput. 3 (2023) 100153]","volume":"4","author":"Patil","year":"2024","journal-title":"High- Confid. Comput."},{"key":"10.1016\/j.hcc.2025.100336_b15","series-title":"DAB-DETR: Dynamic anchor boxes are better queries for DETR","author":"Liu","year":"2022"},{"issue":"4","key":"10.1016\/j.hcc.2025.100336_b16","doi-asserted-by":"crossref","DOI":"10.1016\/j.hcc.2023.100125","article-title":"Capsule networks embedded with prior known support information for image reconstruction","volume":"3","author":"Wang","year":"2023","journal-title":"High- Confid. Comput."},{"key":"10.1016\/j.hcc.2025.100336_b17","series-title":"Rank-DETR for high quality object detection","author":"Pu","year":"2023"},{"key":"10.1016\/j.hcc.2025.100336_b18","series-title":"2024 IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"17027","article-title":"MS-DETR: Efficient DETR training with mixed supervision","author":"Zhao","year":"2024"},{"key":"10.1016\/j.hcc.2025.100336_b19","series-title":"2024 IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"17574","article-title":"Salience DETR: Enhancing detection transformer with hierarchical salience filtering refinement","author":"Hou","year":"2024"},{"issue":"1","key":"10.1016\/j.hcc.2025.100336_b20","doi-asserted-by":"crossref","DOI":"10.1016\/j.hcc.2023.100164","article-title":"Decoupled knowledge distillation method based on meta-learning","volume":"4","author":"Du","year":"2024","journal-title":"High- Confid. Comput."},{"issue":"1","key":"10.1016\/j.hcc.2025.100336_b21","doi-asserted-by":"crossref","DOI":"10.1016\/j.hcc.2023.100182","article-title":"A self-driving solution for resource-constrained autonomous vehicles in parked areas","volume":"4","author":"Qian","year":"2024","journal-title":"High- Confid. Comput."},{"key":"10.1016\/j.hcc.2025.100336_b22","series-title":"2024 IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"16965","article-title":"DETRs beat YOLOs on real-time object detection","author":"Zhao","year":"2024"},{"issue":"1","key":"10.1016\/j.hcc.2025.100336_b23","doi-asserted-by":"crossref","DOI":"10.1016\/j.hcc.2023.100186","article-title":"Neural-based inexact graph de-anonymization","volume":"4","author":"Lu","year":"2024","journal-title":"High- Confid. Comput."},{"issue":"3","key":"10.1016\/j.hcc.2025.100336_b24","doi-asserted-by":"crossref","DOI":"10.1016\/j.hcc.2024.100200","article-title":"Outlier item detection in bundle recommendation via the attention mechanism","volume":"4","author":"Liang","year":"2024","journal-title":"High- Confid. Comput."},{"issue":"4","key":"10.1016\/j.hcc.2025.100336_b25","doi-asserted-by":"crossref","DOI":"10.1016\/j.hcc.2024.100210","article-title":"Bioinvasion risk analysis based on automatic identification system and marine ecoregion data","volume":"4","author":"Shi","year":"2024","journal-title":"High- Confid. Comput."},{"key":"10.1016\/j.hcc.2025.100336_b26","series-title":"Computer Vision & Pattern Recognition","article-title":"You only look once: Unified, real-time object detection","author":"Redmon","year":"2016"},{"key":"10.1016\/j.hcc.2025.100336_b27","series-title":"2017 IEEE Conference on Computer Vision and Pattern Recognition","first-page":"6517","article-title":"YOLO9000: Better, faster, stronger","author":"Redmon","year":"2017"},{"key":"10.1016\/j.hcc.2025.100336_b28","series-title":"YOLOv3: An incremental improvement","author":"Redmon","year":"2018"},{"key":"10.1016\/j.hcc.2025.100336_b29","series-title":"YOLOv4: Optimal speed and accuracy of object detection","author":"Bochkovskiy","year":"2020"},{"key":"10.1016\/j.hcc.2025.100336_b30","series-title":"YOLOv6: A single-stage object detection framework for industrial applications","author":"Li","year":"2022"},{"key":"10.1016\/j.hcc.2025.100336_b31","series-title":"YOLOv7: Trainable bag-of-freebies sets new state-of-the-art for real-time object detectors","author":"Wang","year":"2022"},{"key":"10.1016\/j.hcc.2025.100336_b32","series-title":"YOLOv9: Learning what you want to learn using programmable gradient information","author":"Wang","year":"2024"},{"key":"10.1016\/j.hcc.2025.100336_b33","series-title":"YOLOv10: Real-time end-to-end object detection","author":"Wang","year":"2024"},{"key":"10.1016\/j.hcc.2025.100336_b34","series-title":"YOLOv11: An overview of the key architectural enhancements","author":"Khanam","year":"2024"},{"key":"10.1016\/j.hcc.2025.100336_b35","doi-asserted-by":"crossref","first-page":"16901","DOI":"10.1109\/CVPR52733.2024.01599","article-title":"YOLO-world: Real-time open-vocabulary object detection","author":"Cheng","year":"2024","journal-title":"2024 IEEE\/ CVF Conf. Comput. Vis. Pattern Recognition ( CVPR)"},{"key":"10.1016\/j.hcc.2025.100336_b36","series-title":"KAN: Kolmogorov-arnold networks","author":"Liu","year":"2024"},{"key":"10.1016\/j.hcc.2025.100336_b37","series-title":"Swin transformer: Hierarchical vision transformer using shifted windows","author":"Liu","year":"2021"},{"key":"10.1016\/j.hcc.2025.100336_b38","series-title":"2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","first-page":"2246","article-title":"An improved lightweight linear K-value transformer","author":"Xiao","year":"2023"},{"issue":"1","key":"10.1016\/j.hcc.2025.100336_b39","doi-asserted-by":"crossref","DOI":"10.1016\/j.hcc.2024.100235","article-title":"Data distribution inference attack in federated learning via reinforcement learning support","volume":"5","author":"Yu","year":"2025","journal-title":"High- Confid. Comput."},{"issue":"1","key":"10.1016\/j.hcc.2025.100336_b40","doi-asserted-by":"crossref","DOI":"10.1016\/j.hcc.2024.100280","article-title":"Three-dimensional dynamic gesture recognition method based on convolutional neural network","volume":"5","author":"Xi","year":"2025","journal-title":"High- Confid. Comput."},{"key":"10.1016\/j.hcc.2025.100336_b41","series-title":"MLP-mixer: An all-MLP architecture for vision","author":"Tolstikhin","year":"2021"},{"key":"10.1016\/j.hcc.2025.100336_b42","first-page":"5436","article-title":"Beyond self-attention: External attention using two linear layers for visual tasks","volume":"45","author":"Guo","year":"2021","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.hcc.2025.100336_b43","series-title":"RepMLP: Re-parameterizing convolutions into fully-connected layers for image recognition","author":"Ding","year":"2021"},{"key":"10.1016\/j.hcc.2025.100336_b44","series-title":"Do you even need attention? A stack of feed-forward layers does surprisingly well on ImageNet","author":"Melas-Kyriazi","year":"2021"},{"key":"10.1016\/j.hcc.2025.100336_b45","series-title":"2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","first-page":"2257","article-title":"Design and implementation of mask detection system based on improved YOLOv5s","author":"Zhao","year":"2023"},{"issue":"000","key":"10.1016\/j.hcc.2025.100336_b46","article-title":"MSGU-net: A lightweight multi-scale ghost U-net for image segmentation","volume":"18","author":"Cheng","year":"2024","journal-title":"Front. Neurorobotics"},{"issue":"2","key":"10.1016\/j.hcc.2025.100336_b47","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1109\/TSC.2023.3331570","article-title":"MMLF: Multi-metric latent feature analysis for high-dimensional and incomplete data","volume":"17","author":"Wu","year":"2024","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.hcc.2025.100336_b48","series-title":"Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence and Thirty-First Innovative Applications of Artificial Intelligence Conference and Ninth AAAI Symposium on Educational Advances in Artificial Intelligence","article-title":"Online learning from data streams with varying feature spaces","author":"Beyazit","year":"2019"},{"issue":"3","key":"10.1016\/j.hcc.2025.100336_b49","doi-asserted-by":"crossref","first-page":"3845","DOI":"10.1109\/TNNLS.2022.3200009","article-title":"A prediction-sampling-based multilayer-structured latent factor model for accurate representation to high-dimensional and sparse data","volume":"35","author":"Wu","year":"2024","journal-title":"IEEE Trans. Neural Networks Learn. Syst."},{"issue":"2","key":"10.1016\/j.hcc.2025.100336_b50","doi-asserted-by":"crossref","first-page":"802","DOI":"10.1109\/TSC.2022.3178543","article-title":"A double-space and double-norm ensembled latent factor model for highly accurate web service QoS prediction","volume":"16","author":"Wu","year":"2023","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"99","key":"10.1016\/j.hcc.2025.100336_b51","article-title":"Squeeze-and-excitation networks","volume":"PP","author":"Hu","year":"2017","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."}],"container-title":["High-Confidence Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295225000406?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295225000406?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T11:26:30Z","timestamp":1774869990000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2667295225000406"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3]]},"references-count":51,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["S2667295225000406"],"URL":"https:\/\/doi.org\/10.1016\/j.hcc.2025.100336","relation":{},"ISSN":["2667-2952"],"issn-type":[{"value":"2667-2952","type":"print"}],"subject":[],"published":{"date-parts":[[2026,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"KANs-DETR: Enhancing Detection Transformer with Kolmogorov\u2013Arnold Networks for small object","name":"articletitle","label":"Article Title"},{"value":"High-Confidence Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.hcc.2025.100336","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 The Author(s). Published by Elsevier B.V. on behalf of Shandong University.","name":"copyright","label":"Copyright"}],"article-number":"100336"}}