Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence 2022
DOI: 10.24963/ijcai.2022/186
|View full text |Cite
|
Sign up to set email alerts
|

Boundary-Guided Camouflaged Object Detection

Abstract: Forecasting the future trajectories of multiple agents is a core technology for human-robot interaction systems. To predict multi-agent trajectories more accurately, it is inevitable that models need to improve interpretability and reduce redundancy. However, many methods adopt implicit weight calculation or black-box networks to learn the semantic interaction of agents, which obviously lack enough interpretation. In addition, most of the existing works model the relation among all agents in a one-to-one manne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 114 publications
(30 citation statements)
references
References 0 publications
0
30
0
Order By: Relevance
“…To demonstrate the effectiveness of the proposed method, we compare it with 24 state-of-the-art methods, including 10 salient object detection methods (i.e., BAS-Net [33], CPD-R [45], EGNet [54], SCRN [46], F 3 Net [44], CSNet [13], SSAL [50], ITSD [58], UCNet [49], and VST [22]), and 14 COD methods (i.e., SINet [11], SLSR [25], PFNet [28], MGL-R [48], UJSC [19], PreyNet [51], BSA-Net [59], C 2 FNet [36], UGTR [47], OCE-Net [21], BGNet [37], SegMaR [16], ZoomNet [30], and SINet-v2 [10]). All the predictions of competitors are either provided by the authors or generated by models retrained based on opensource codes.…”
Section: Comparison With State-of-the-art Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…To demonstrate the effectiveness of the proposed method, we compare it with 24 state-of-the-art methods, including 10 salient object detection methods (i.e., BAS-Net [33], CPD-R [45], EGNet [54], SCRN [46], F 3 Net [44], CSNet [13], SSAL [50], ITSD [58], UCNet [49], and VST [22]), and 14 COD methods (i.e., SINet [11], SLSR [25], PFNet [28], MGL-R [48], UJSC [19], PreyNet [51], BSA-Net [59], C 2 FNet [36], UGTR [47], OCE-Net [21], BGNet [37], SegMaR [16], ZoomNet [30], and SINet-v2 [10]). All the predictions of competitors are either provided by the authors or generated by models retrained based on opensource codes.…”
Section: Comparison With State-of-the-art Methodsmentioning
confidence: 99%
“…Besides, the multi-task learning framework is commonly used for COD. These methods generally introduce auxiliary tasks such as classification [18], edge/boundary detection [37,48,59], and object ranking [25]. Furthermore, some methods detect camouflaged objects by mimicking behavior patterns or visual mechanics of predators such as the search and identification process [10], and zooming in…”
Section: Cnn-based Camouflaged Object Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, with the advancement of large-scale benchmark datasets [9]- [11], a plethora of COD [8], [10], [12]- [14] methods have been proposed and have exhibited exceptional performance in diverse and intricate scenarios. In general, the detection process of these models can be summarized into , FAPNet [7] and PreyNet [8], our method preserves better details and is competent to distinguish the entire target from the background.…”
Section: Introductionmentioning
confidence: 99%
“…Despite the effectiveness of this widely adopted framework in addressing various challenging scenarios, there exist certain overlooked flaws that significantly hinder its overall performance. Concretely, in the first step, the majority of COD models employ low-resolution images (e.g., 352 × 352 [7], [15], [16], 416 × 416 [14]) as their input. However, camouflaged objects can be small in size and exhibit fuzzy boundaries.…”
Section: Introductionmentioning
confidence: 99%