{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T13:20:51Z","timestamp":1769260851580,"version":"3.49.0"},"reference-count":67,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Top. Comput. Intell."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1109\/tetci.2025.3575412","type":"journal-article","created":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T13:46:53Z","timestamp":1749649613000},"page":"286-299","source":"Crossref","is-referenced-by-count":0,"title":["Towards Reliable Tracking: An Uncertainty-Aware Siamese Tracker"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3676-5139","authenticated-orcid":false,"given":"Jie","family":"Ma","sequence":"first","affiliation":[{"name":"Guangxi Key Lab of Multi-Source Information Mining &amp; Security, Guangxi Normal University, Guilin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8564-0346","authenticated-orcid":false,"given":"Xiangyuan","family":"Lan","sequence":"additional","affiliation":[{"name":"Peng Cheng Laboratory, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2353-5246","authenticated-orcid":false,"given":"Qihua","family":"Liang","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Multi-Source Information Mining &amp; Security, Guangxi Normal University, Guilin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3954-2387","authenticated-orcid":false,"given":"Guorong","family":"Li","sequence":"additional","affiliation":[{"name":"University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6123-363X","authenticated-orcid":false,"given":"Zhiyi","family":"Mo","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Multi-Source Information Mining &amp; Security, Guangxi Normal University, Guilin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3423-1539","authenticated-orcid":false,"given":"Bineng","family":"Zhong","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Multi-Source Information Mining &amp; Security, Guangxi Normal University, Guilin, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00670"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48881-3_56"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00441"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00935"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.2978194"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2019.2948151"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2020.3041019"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2024.3462973"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2024.3398011"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2016.2577031"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00376"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58589-1_46"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00721"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11009-3_1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2019.00276"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2014.2388226"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.128"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46448-0_27"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00552"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01246-5_19"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2957464"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.158"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48881-3_56"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01240-3_7"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00814"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00972"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01264-9_45"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2021.3118043"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00630"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/IPEC54454.2022.9777624"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ITME56794.2022.00120"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.7002"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00633"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20047-2_20"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2024.3349519"},{"issue":"2","key":"ref37","first-page":"183","article-title":"On Bayesian neural networks","volume":"18","author":"Kononenko","year":"1994","journal-title":"Informatica"},{"key":"ref38","article-title":"A comprehensive guide to bayesian convolutional neural network with variational inference","author":"Shridhar","year":"2019"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.5555\/3045390.3045502"},{"key":"ref40","volume-title":"Uncertainty in Deep Learning","author":"Gal","year":"2016"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-25085-9_2"},{"key":"ref42","first-page":"91","article-title":"Faster R-CNN: Towards real-time object detection with region proposal networks","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Ren","year":"2015"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2016.91"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00628"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00479"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01216-8_30"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2919201"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00142"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58565-5_23"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01630"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-25085-9_2"},{"key":"ref53","first-page":"21002","article-title":"Generalized focal loss: Learning qualified and distributed bounding boxes for dense object detection","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Li","year":"2020"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.465"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.733"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46454-1_29"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3127492"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW60793.2023.00195"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr46437.2021.00525"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01400"},{"key":"ref61","article-title":"Tracking anything in high quality","author":"Zhu","year":"2023"},{"key":"ref62","article-title":"Associating objects with transformers for video object segmentation","author":"Yang","year":"2021"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20047-2_33"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01019"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58595-2_13"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00492"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3120479"}],"container-title":["IEEE Transactions on Emerging Topics in Computational Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/7433297\/11361307\/11030863.pdf?arnumber=11030863","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T21:01:13Z","timestamp":1769202073000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11030863\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":67,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tetci.2025.3575412","relation":{},"ISSN":["2471-285X"],"issn-type":[{"value":"2471-285X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2]]}}}