{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:04:42Z","timestamp":1750309482391,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T00:00:00Z","timestamp":1733443200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62176009 and 62472012"],"award-info":[{"award-number":["62176009 and 62472012"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,6]]},"DOI":"10.1145\/3709026.3709056","type":"proceedings-article","created":{"date-parts":[[2025,2,15]],"date-time":"2025-02-15T10:05:41Z","timestamp":1739613941000},"page":"15-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Fine-Grained Zero-Shot Object Detection via Semantic Decoupling"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9836-482X","authenticated-orcid":false,"given":"Lijuan","family":"Duan","sequence":"first","affiliation":[{"name":"Beijing Key Laboratory of Trusted Computing, Beijing University of TeChinaology, Beijing, China; School of Computer Science, Beijing University of Technology, Beijing, China and National Engineering Laboratory for Key Technologies of Information Security Level Protection, China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-8344-3630","authenticated-orcid":false,"given":"Zichen","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Trusted Computing, Beijing University of TeChinaology, Beijing, China; School of Computer Science, Beijing University of Technology, Beijing, China and National Engineering Laboratory for Key Technologies of Information Security Level Protection, China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0700-4536","authenticated-orcid":false,"given":"Zhi","family":"Gong","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Trusted Computing, Beijing University of TeChinaology, Beijing, China; School of Computer Science, Beijing University of Technology, Beijing, China and National Engineering Laboratory for Key Technologies of Information Security Level Protection, China, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,2,15]]},"reference":[{"key":"e_1_3_3_1_2_2","first-page":"214","volume-title":"International conference on machine learning","author":"Arjovsky Martin","year":"2017","unstructured":"Martin Arjovsky, Soumith Chintala, and L\u00e9on Bottou. 2017. Wasserstein generative adversarial networks. In International conference on machine learning. PMLR, 214\u2013223."},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58452-8_13"},{"key":"e_1_3_3_1_4_2","unstructured":"Berkan Demirel Ramazan\u00a0Gokberk Cinbis and Nazli Ikizler-Cinbis. 2018. Zero-shot object detection by hybrid region embedding. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1805.06157 (2018)."},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.169"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/WACV45572.2020.9093384"},{"key":"e_1_3_3_1_7_2","first-page":"155","volume-title":"Asian Conference on Computer Vision","author":"Hayat Nasir","year":"2020","unstructured":"Nasir Hayat, Munawar Hayat, Shafin Rahman, Salman Khan, Syed\u00a0Waqas Zamir, and Fahad\u00a0Shahbaz Khan. 2020. Synthesizing the Unseen for Zero-Shot Object Detection. In Asian Conference on Computer Vision. 155\u2013170."},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46448-0_2"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6841"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00152"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.690"},{"key":"e_1_3_3_1_13_2","unstructured":"Shaoqing Ren Kaiming He Ross Girshick and Jian Sun. 2015. Faster r-cnn: Towards real-time object detection with region proposal networks. Advances in neural information processing systems 28 (2015)."},{"key":"e_1_3_3_1_14_2","unstructured":"Sandipan Sarma Sushil Kumar and Arijit Sur. 2022. Resolving semantic confusions for improved zero-shot detection. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2212.06097 (2022)."},{"key":"e_1_3_3_1_15_2","unstructured":"Catherine Wah Steve Branson Peter Welinder Pietro Perona and Serge Belongie. 2011. The caltech-ucsd birds-200-2011 dataset. (2011)."},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i6.28353"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Caixia Yan Xiaojun Chang Minnan Luo Huan Liu Xiaoqin Zhang and Qinghua Zheng. 2022. Semantics-guided contrastive network for zero-shot object detection. IEEE transactions on pattern analysis and machine intelligence 46 3 (2022) 1530\u20131544.","DOI":"10.1109\/TPAMI.2021.3140070"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i7.28518"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Zhilin Zhang Ting Zhang Zhaoying Liu Peijie Zhang Shanshan Tu Yujian Li and Muhammad Waqas. 2022. Fine-grained ship image recognition based on BCNN with inception and AM-Softmax. (2022).","DOI":"10.32604\/cmc.2022.029297"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6996"}],"event":{"name":"CSAI 2024: 2024 8th International Conference on Computer Science and Artificial Intelligence (CSAI)","acronym":"CSAI 2024","location":"Beijing China"},"container-title":["Proceedings of the 2024 8th International Conference on Computer Science and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3709026.3709056","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3709026.3709056","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:31Z","timestamp":1750295851000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3709026.3709056"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,6]]},"references-count":19,"alternative-id":["10.1145\/3709026.3709056","10.1145\/3709026"],"URL":"https:\/\/doi.org\/10.1145\/3709026.3709056","relation":{},"subject":[],"published":{"date-parts":[[2024,12,6]]},"assertion":[{"value":"2025-02-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}