Live
Black Hat USADark ReadingBlack Hat AsiaAI BusinessClaude Now Has 1 Million Token Context. Here’s What That Actually Means for Developers.Medium AIWhy EHR Data Doesn't Fit Neat ML TablesHackernoon AIAI can write code. It just can’t maintain it — About the future of creative workMedium AIMengapa “Smart City” Saja Tidak Cukup: Urgensi Deep Learning Spasiotemporal untuk Pelayanan PublikMedium AIAI for Frontend Developers — Day 18Medium AIThe Discipline of Not Fooling Ourselves: Episode 4 — The Interpreters of the RulesDEV CommunityHow We Used AI Agents to Security-Audit an Open Source ProjectDEV CommunityAI chatbot traffic grows seven times faster than social media but still trails by a factor of fourThe DecoderWhy We Ditched Bedrock Agents for Nova Pro and Built a Custom OrchestratorDEV CommunityStop leaking your .env to AI! I built a Rust/Tauri Secret Manager to inject API keys safely 🛡️DEV CommunityNevaMind AI: Advanced Memory for Proactive AgentsDEV CommunityHow to Switch Industries Without Starting OverDEV CommunityBlack Hat USADark ReadingBlack Hat AsiaAI BusinessClaude Now Has 1 Million Token Context. Here’s What That Actually Means for Developers.Medium AIWhy EHR Data Doesn't Fit Neat ML TablesHackernoon AIAI can write code. It just can’t maintain it — About the future of creative workMedium AIMengapa “Smart City” Saja Tidak Cukup: Urgensi Deep Learning Spasiotemporal untuk Pelayanan PublikMedium AIAI for Frontend Developers — Day 18Medium AIThe Discipline of Not Fooling Ourselves: Episode 4 — The Interpreters of the RulesDEV CommunityHow We Used AI Agents to Security-Audit an Open Source ProjectDEV CommunityAI chatbot traffic grows seven times faster than social media but still trails by a factor of fourThe DecoderWhy We Ditched Bedrock Agents for Nova Pro and Built a Custom OrchestratorDEV CommunityStop leaking your .env to AI! I built a Rust/Tauri Secret Manager to inject API keys safely 🛡️DEV CommunityNevaMind AI: Advanced Memory for Proactive AgentsDEV CommunityHow to Switch Industries Without Starting OverDEV Community
AI NEWS HUBbyEIGENVECTOREigenvector

SAGE: Style-Adaptive Generalization for Privacy-Constrained Semantic Segmentation Across Domains

arXivMarch 31, 20262 min read1 views
Source Quiz

arXiv:2512.02369v2 Announce Type: replace Abstract: Domain generalization for semantic segmentation aims to mitigate the degradation in model performance caused by domain shifts. However, in many real-world scenarios, we are unable to access the model parameters and architectural details due to privacy concerns and security constraints. Traditional fine-tuning or adaptation is hindered, leading to the demand for input-level strategies that can enhance generalization without modifying model weights. To this end, we propose a \textbf{S}tyle-\textbf{A}daptive \textbf{GE}neralization framework (\t — Qingmei Li, Yang Zhang, Peifeng Zhang, Haohuan Fu, Juepeng Zheng

View PDF HTML (experimental)

Abstract:Domain generalization for semantic segmentation aims to mitigate the degradation in model performance caused by domain shifts. However, in many real-world scenarios, we are unable to access the model parameters and architectural details due to privacy concerns and security constraints. Traditional fine-tuning or adaptation is hindered, leading to the demand for input-level strategies that can enhance generalization without modifying model weights. To this end, we propose a \textbf{S}tyle-\textbf{A}daptive \textbf{GE}neralization framework (\textbf{SAGE}), which improves the generalization of frozen models under privacy constraints. SAGE learns to synthesize visual prompts that implicitly align feature distributions across styles instead of directly fine-tuning the backbone. Specifically, we first utilize style transfer to construct a diverse style representation of the source domain, thereby learning a set of style characteristics that can cover a wide range of visual features. Then, the model adaptively fuses these style cues according to the visual context of each input, forming a dynamic prompt that harmonizes the image appearance without touching the interior of the model. Through this closed-loop design, SAGE effectively bridges the gap between frozen model invariance and the diversity of unseen domains. Extensive experiments on five benchmark datasets demonstrate that SAGE achieves competitive or superior performance compared to state-of-the-art methods under privacy constraints and outperforms full fine-tuning baselines in all settings.

Subjects:

Computer Vision and Pattern Recognition (cs.CV)

Cite as: arXiv:2512.02369 [cs.CV]

(or arXiv:2512.02369v2 [cs.CV] for this version)

https://doi.org/10.48550/arXiv.2512.02369

arXiv-issued DOI via DataCite

Submission history

From: Qingmei Li [view email] [v1] Tue, 2 Dec 2025 03:20:22 UTC (2,310 KB) [v2] Mon, 30 Mar 2026 14:22:42 UTC (2,308 KB)

Was this article helpful?

Sign in to highlight and annotate this article

AI
Ask AI about this article
Powered by Eigenvector · full article context loaded
Ready

Conversation starters

Ask anything about this article…

Daily AI Digest

Get the top 5 AI stories delivered to your inbox every morning.

More about

researchpaperarxiv

Knowledge Map

Knowledge Map
TopicsEntitiesSource
SAGE: Style…researchpaperarxivcomputer-vi…image-recog…arXiv

Connected Articles — Knowledge Graph

This article is connected to other articles through shared AI topics and tags.

Knowledge Graph100 articles · 197 connections
Scroll to zoom · drag to pan · click to open

Discussion

Sign in to join the discussion

No comments yet — be the first to share your thoughts!

More in Research Papers