{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T17:04:51Z","timestamp":1777655091709,"version":"3.51.4"},"reference-count":70,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62402055"],"award-info":[{"award-number":["62402055"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62025604"],"award-info":[{"award-number":["62025604"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62322203"],"award-info":[{"award-number":["62322203"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172052"],"award-info":[{"award-number":["62172052"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2023RC09"],"award-info":[{"award-number":["2023RC09"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2022ZD0118100"],"award-info":[{"award-number":["2022ZD0118100"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Image Process."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tip.2024.3475219","type":"journal-article","created":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T17:28:00Z","timestamp":1729013280000},"page":"5936-5948","source":"Crossref","is-referenced-by-count":36,"title":["Hierarchical Graph Interaction Transformer With Dynamic Token Clustering for Camouflaged Object Detection"],"prefix":"10.1109","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8479-5124","authenticated-orcid":false,"given":"Siyuan","family":"Yao","sequence":"first","affiliation":[{"name":"School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6752-9580","authenticated-orcid":false,"given":"Hao","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3321-1993","authenticated-orcid":false,"given":"Tian-Zhu","family":"Xiang","sequence":"additional","affiliation":[{"name":"Inception Institute of Artificial Intelligence, Abu Dhabi, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4444-7811","authenticated-orcid":false,"given":"Xiao","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Software, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7141-708X","authenticated-orcid":false,"given":"Xiaochun","family":"Cao","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Sun Yat-sen University, Shenzhen Campus, Shenzhen, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00285"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00866"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01280"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02111"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-87193-2_14"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00376"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1213775110"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00538"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3085766"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00411"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00446"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICETET.2008.232"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"2201","DOI":"10.1016\/j.proeng.2011.08.412","article-title":"Detection of the mobile object with camouflage color under dynamic background based on optical flow","volume":"15","author":"Jianqin","year":"2011","journal-title":"Proc. Eng."},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5539\/mas.v5n4p152"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3126591"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01142"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00943"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00220"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00467"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR56361.2022.9956724"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/142"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2023.3266659"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/186"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2022.3189828"},{"key":"ref25","article-title":"CoFiNet: Unveiling camouflaged objects with multi-scale finesse","author":"Guo","year":"2024","journal-title":"arXiv:2402.02217"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2022.3217695"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2023.3277793"},{"key":"ref28","first-page":"1","article-title":"Strategic preys make acute predators: Enhancing camouflaged object detectors by generating camouflaged objects","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"He"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00994"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00267"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2023.3287137"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2021.3078379"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548178"},{"key":"ref34","article-title":"ZoomNeXt: A unified collaborative pyramid network for camouflaged object detection","author":"Pang","year":"2023","journal-title":"arXiv:2310.20208"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2010.11929"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58452-8_13"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00863"},{"key":"ref38","first-page":"13937","article-title":"DynamicViT: Efficient vision transformers with dynamic token sparsification","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NIPS)","author":"Rao"},{"key":"ref39","first-page":"1","article-title":"EViT: Expediting vision transformers via token reorganizations","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Liang"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01185"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00078"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01199"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20083-0_24"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01054"},{"key":"ref45","article-title":"Spectral networks and locally connected networks on graphs","author":"Bruna","year":"2014","journal-title":"arXiv:1312.6203"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58610-2_16"},{"key":"ref47","first-page":"9245","article-title":"Beyond grids: Learning graph representations for visual recognition","volume-title":"Proc. Annu. Conf. Neural Inf. Process. Syst.","author":"Li"},{"key":"ref48","article-title":"A generalization of transformer networks to graphs","author":"Dwivedi","year":"2020","journal-title":"arXiv:2012.09699"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3487553.3524258"},{"key":"ref50","first-page":"1","article-title":"Graph attention networks","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Velickovic"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3578518"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00216"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00897"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00227"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01979"},{"key":"ref56","first-page":"14582","article-title":"Pure transformers are powerful graph learners","volume-title":"Proc. Annu. Conf. Neural Inf. Process. Syst.","author":"Kim"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02118"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.02.001"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00813"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i1.25167"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2023\/124"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00101"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/WACV57701.2024.00146"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2019.04.006"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.487"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.39"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/97"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00995"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01349"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i2.27890"}],"container-title":["IEEE Transactions on Image Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/83\/10346232\/10719619.pdf?arnumber=10719619","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:50:15Z","timestamp":1732668615000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10719619\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":70,"URL":"https:\/\/doi.org\/10.1109\/tip.2024.3475219","relation":{},"ISSN":["1057-7149","1941-0042"],"issn-type":[{"value":"1057-7149","type":"print"},{"value":"1941-0042","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}