{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T13:53:45Z","timestamp":1774965225312,"version":"3.50.1"},"reference-count":67,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T00:00:00Z","timestamp":1696464000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T00:00:00Z","timestamp":1696464000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,5]]},"DOI":"10.1109\/mapr59823.2023.10288682","type":"proceedings-article","created":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T17:50:46Z","timestamp":1698342646000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["CE-OST: Contour Emphasis for One-Stage Transformer-based Camouflage Instance Segmentation"],"prefix":"10.1109","author":[{"given":"Thanh-Danh","family":"Nguyen","sequence":"first","affiliation":[{"name":"University of Information Technology,Ho Chi Minh City,Vietnam"}]},{"given":"Duc-Tuan","family":"Luu","sequence":"additional","affiliation":[{"name":"University of Information Technology,Ho Chi Minh City,Vietnam"}]},{"given":"Vinh-Tiep","family":"Nguyen","sequence":"additional","affiliation":[{"name":"University of Information Technology,Ho Chi Minh City,Vietnam"}]},{"given":"Thanh Duc","family":"Ngo","sequence":"additional","affiliation":[{"name":"University of Information Technology,Ho Chi Minh City,Vietnam"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2946-1"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2004.1273918"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICMULT.2010.5631434"},{"key":"ref56","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2014","journal-title":"arXiv preprint arXiv 1409 1556"},{"key":"ref15","first-page":"4204","article-title":"Foreground object detection using topdown information based on em framework","volume":"21","author":"liu","year":"2012","journal-title":"IEEE TIP"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5539\/mas.v5n4p152"},{"key":"ref58","first-page":"213","article-title":"End-to-end object detection with transformers","author":"carion","year":"2020","journal-title":"ECCV"},{"key":"ref53","article-title":"It&#x2019;s moving! a probabilistic model for causal motion segmentation in moving camera videos","author":"pia bideau","year":"2016","journal-title":"ECCV"},{"key":"ref52","author":"skurowski","year":"2018","journal-title":"Animal camouflage analysis Chameleon database"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2003.1238418"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01142"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2018.8451218"},{"key":"ref54","article-title":"Betrayed by motion: Camouflaged object discovery via motion segmentation","author":"lamdouar","year":"2020","journal-title":"ACCV"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"2201","DOI":"10.1016\/j.proeng.2011.08.412","article-title":"Detection of the mobile object with camouflage color under dynamic background based on optical flow","volume":"15","author":"yin","year":"2011","journal-title":"Procedia Engineering"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICETET.2008.232"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00285"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7025670"},{"key":"ref51","article-title":"Solov2: Dynamic, faster and stronger","author":"wang","year":"2020","journal-title":"NeurIPS"},{"key":"ref50","article-title":"SOLO: Segmenting objects by locations","author":"wang","year":"2020","journal-title":"ECCV"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00860"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00913"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01718"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00511"},{"key":"ref42","article-title":"Faster r-cnn: Towards real-time object detection with region proposal networks","author":"ren","year":"2016","journal-title":"IEEE TPAMI"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.322"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00644"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00657"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00925"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-006-7934-5"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/83.388090"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2011.5946600"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-16440-8_13"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00996"},{"key":"ref6","first-page":"715","article-title":"Domain adaptive nuclei instance segmentation and classification via category-aware feature alignment and pseudo-labelling","author":"li","year":"2022","journal-title":"MICCAI"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-16440-8_2"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58452-8_17"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1111\/2041-210X.13019"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2017.8297083"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00866"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01280"},{"key":"ref31","first-page":"287","article-title":"Camouflaged instance segmentation inthe-wild: Dataset, method, and benchmark suite","volume":"31","author":"le","year":"2022","journal-title":"IEEE TIP"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19797-0_2"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2946-1"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01142"},{"key":"ref2","first-page":"45","article-title":"Anabranch network for camouflaged object segmentation","volume":"184","author":"le","year":"2019","journal-title":"CVIU"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ieri.2013.11.050"},{"key":"ref39","article-title":"Inferring camouflage objects by texture-aware interactive guidance network","author":"zhu","year":"2021","journal-title":"AAAI"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3064443"},{"key":"ref24","article-title":"Attention is all you need","volume":"30","author":"vaswani","year":"2017","journal-title":"NeurIPS"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11548-019-01917-1"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00707"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1109\/TPAMI.2022.3152247","article-title":"A survey on vision transformer","volume":"45","author":"han","year":"2022","journal-title":"IEEE TPAMI"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3505244"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46448-0_35"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00437"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.164"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00683"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2700300"},{"key":"ref65","first-page":"282","article-title":"Conditional convolutions for instance segmentation","author":"tian","year":"2020","journal-title":"ECCV"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01733"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01855"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00297"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s41095-022-0274-8"},{"key":"ref62","author":"wu","year":"2019","journal-title":"Detectron2"},{"key":"ref61","article-title":"Hierarchical vit using shifted windows","author":"liu","year":"2021","journal-title":"CVPR"}],"event":{"name":"2023 International Conference on Multimedia Analysis and Pattern Recognition (MAPR)","location":"Quy Nhon, Vietnam","start":{"date-parts":[[2023,10,5]]},"end":{"date-parts":[[2023,10,6]]}},"container-title":["2023 International Conference on Multimedia Analysis and Pattern Recognition (MAPR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10288584\/10288633\/10288682.pdf?arnumber=10288682","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T19:04:44Z","timestamp":1699902284000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10288682\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,5]]},"references-count":67,"URL":"https:\/\/doi.org\/10.1109\/mapr59823.2023.10288682","relation":{},"subject":[],"published":{"date-parts":[[2023,10,5]]}}}