{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T08:23:34Z","timestamp":1770107014868,"version":"3.49.0"},"reference-count":119,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62525212"],"award-info":[{"award-number":["62525212"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62236008"],"award-info":[{"award-number":["62236008"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62025604"],"award-info":[{"award-number":["62025604"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62441232"],"award-info":[{"award-number":["62441232"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62441619"],"award-info":[{"award-number":["62441619"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21B2038"],"award-info":[{"award-number":["U21B2038"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U23B2051"],"award-info":[{"award-number":["U23B2051"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62502496"],"award-info":[{"award-number":["62502496"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62206264"],"award-info":[{"award-number":["62206264"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["92370102"],"award-info":[{"award-number":["92370102"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004739","name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004739","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Strategic Priority Research Program of the Chinese Academy of Sciences","award":["XDB0680201"],"award-info":[{"award-number":["XDB0680201"]}]},{"name":"Postdoctoral Fellowship Program of CPSF","award":["GZB20240729"],"award-info":[{"award-number":["GZB20240729"]}]},{"name":"General Program of the China Postdoctoral Science Foundation","award":["2025M771492"],"award-info":[{"award-number":["2025M771492"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Pattern Anal. Mach. Intell."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1109\/tpami.2025.3609882","type":"journal-article","created":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T17:33:51Z","timestamp":1758044031000},"page":"1115-1132","source":"Crossref","is-referenced-by-count":0,"title":["Towards Size-invariant Salient Object Detection: A Generic Evaluation and Optimization Approach"],"prefix":"10.1109","volume":"48","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4336-8900","authenticated-orcid":false,"given":"Shilong","family":"Bao","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3512-7277","authenticated-orcid":false,"given":"Qianqian","family":"Xu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of AI Safety, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Feiran","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security (SKLOIS), Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-8705-7048","authenticated-orcid":false,"given":"Boyu","family":"Han","sequence":"additional","affiliation":[{"name":"State Key Laboratory of AI Safety, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4409-4999","authenticated-orcid":false,"given":"Zhiyong","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7141-708X","authenticated-orcid":false,"given":"Xiaochun","family":"Cao","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Shenzhen Campus of Sun Yat-sen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7542-296X","authenticated-orcid":false,"given":"Qingming","family":"Huang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of AI Safety, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3051099"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s41095-019-0149-9"},{"key":"ref3","first-page":"126863","article-title":"AUCSeg: AUC-oriented pixel-level long-tail semantic segmentation","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Han"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00112"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3298433"},{"key":"ref6","article-title":"Revisiting evaluation metrics for semantic segmentation: Optimization and evaluation of fine-grained intersection over union","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Wang"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00303"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/s23073490"},{"key":"ref9","article-title":"Salient conditional diffusion for defending against backdoor attacks","author":"May","year":"2023"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2024.3406153"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206573"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2013.2280096"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2608882"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2852750"},{"key":"ref15","first-page":"655","article-title":"Causal intervention for weakly-supervised semantic segmentation","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Zhang"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3326581"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/rs16020327"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2022.3164550"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.698"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00967"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i3.16331"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref23","first-page":"15448","article-title":"Learning generative vision transformer with energy-based latent space for saliency prediction","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Zhang"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3127149"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2023.3275308"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2024.3388153"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00371"},{"key":"ref28","article-title":"Adaptive low rank adaptation of segment anything to salient object detection","author":"Cui","year":"2023"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW60793.2023.00361"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICME57554.2024.10688340"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3185311"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-021-01452-0"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-022-01646-0"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3101125"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.118"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1256\/003590002320603584"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206596"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/97"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.487"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-021-01490-8"},{"key":"ref41","article-title":"Size-invariance matters: Rethinking metrics and losses for imbalanced multi-object salient object detection","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Li"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2024.3375505"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3107956"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3233883"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2024.3476683"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2025.3527469"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3099405"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i4.16408"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3109942"},{"key":"ref50","article-title":"Sample selection with uncertainty of losses for learning with noisy labels","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Xia"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46128-1_42"},{"key":"ref52","article-title":"Moderate coreset: A universal method of data selection for real-world data-efficient deep learning","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Xia"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/IGARSS47720.2021.9554737"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.125562"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2024.3507047"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2024.110903"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.32"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.58"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00326"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3065822"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01304"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3179526"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00187"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.2997178"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00735"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2022.3154931"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2024.3413529"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475601"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00468"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00404"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58523-5_4"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2022.3187856"},{"key":"ref73","first-page":"8774","article-title":"DVSOD: RGB-D video salient object detection","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Jingjing"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-022-01734-1"},{"key":"ref75","first-page":"896","article-title":"Memory-oriented decoder for light field salient object detection","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Zhang"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2020.2990341"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00158"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2024.129204"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2025.3528347"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2010.5543739"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.15251"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6247743"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.39"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-014-0733-5"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2015.2487833"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2016.2579306"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3141095"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/3554729"},{"key":"ref89","first-page":"10324","article-title":"Stochastic methods for AUC optimization subject to AUC-based fairness constraints","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Yao"},{"key":"ref90","article-title":"Revive re-weighting in imbalanced learning by density ratio estimation","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Luo"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3117983"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2025.3527372"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58536-5_3"},{"key":"ref95","article-title":"Richer and deeper supervision network for salient object detection","author":"Jia","year":"2019"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/3DV.2016.79"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/2964284.2967274"},{"key":"ref98","first-page":"841","article-title":"Learning structured models with the AUC loss and its generalizations","volume-title":"Proc. 17th Int. Conf. Artif. Intell. Statist.","author":"Rosenfeld"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2210727"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2815601"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.81"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3140168"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i10.26405"},{"key":"ref104","first-page":"313","article-title":"AUC optimization vs. error rate minimization","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Cortes"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2024.3357814"},{"key":"ref106","first-page":"91","article-title":"Faster R-CNN: Towards real-time object detection with region proposal networks","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Ren"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58520-4_12"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2969527"},{"issue":"1","key":"ref110","first-page":"3852","article-title":"A general framework for consistent structured prediction with implicit loss embeddings","volume":"21","author":"Ciliberto","year":"2020","journal-title":"J. Mach. Learn. Res."},{"key":"ref111","first-page":"11945","article-title":"Joint semantic mining for weakly supervised RGB-D salient object detection","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Li"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20212-4"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46379-7_1"},{"key":"ref114","article-title":"$\\ell _{\\infty }$\u2113\u221e vector contraction for rademacher complexity","author":"Foster","year":"2019"},{"key":"ref115","first-page":"961","article-title":"Consistency analysis for binary classification revisited","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Dembczy\u0144ski"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-022-04186-9"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-024-02020-y"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2022.3216476"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2022.3176540"}],"container-title":["IEEE Transactions on Pattern Analysis and Machine Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/34\/11345188\/11164475.pdf?arnumber=11164475","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T20:44:04Z","timestamp":1770065044000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11164475\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":119,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tpami.2025.3609882","relation":{},"ISSN":["0162-8828","2160-9292","1939-3539"],"issn-type":[{"value":"0162-8828","type":"print"},{"value":"2160-9292","type":"electronic"},{"value":"1939-3539","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2]]}}}