Image retrieval: Ideas, influences, and trends of the new age
We have witnessed great interest and a wealth of promise in content-based image retrieval
as an emerging technology. While the last decade laid foundation to such promise, it also …
as an emerging technology. While the last decade laid foundation to such promise, it also …
Glaze: Protecting artists from style mimicry by {Text-to-Image} models
Recent text-to-image diffusion models such as MidJourney and Stable Diffusion threaten to
displace many in the professional artist community. In particular, models can learn to mimic …
displace many in the professional artist community. In particular, models can learn to mimic …
Data deduplication techniques for efficient cloud storage management: a systematic review
The exponential growth of digital data in cloud storage systems is a critical issue presently
as a large amount of duplicate data in the storage systems exerts an extra load on it …
as a large amount of duplicate data in the storage systems exerts an extra load on it …
Effective and efficient global context verification for image copy detection
To detect illegal copies of copyrighted images, recent copy detection methods mostly rely on
the bag-of-visual-words (BOW) model, in which local features are quantized into visual …
the bag-of-visual-words (BOW) model, in which local features are quantized into visual …
Product quantization for nearest neighbor search
This paper introduces a product quantization-based approach for approximate nearest
neighbor search. The idea is to decompose the space into a Cartesian product of low …
neighbor search. The idea is to decompose the space into a Cartesian product of low …
The inverted multi-index
A new data structure for efficient similarity search in very large datasets of high-dimensional
vectors is introduced. This structure called the inverted multi-index generalizes the inverted …
vectors is introduced. This structure called the inverted multi-index generalizes the inverted …
A survey on data leakage prevention systems
S Alneyadi, E Sithirasenan… - Journal of Network and …, 2016 - Elsevier
Protection of confidential data from being leaked to the public is a growing concern among
organisations and individuals. Traditionally, confidentiality of data has been preserved using …
organisations and individuals. Traditionally, confidentiality of data has been preserved using …
Hawkes processes for events in social media
This chapter provides an accessible introduction for point processes, and especially Hawkes
processes, for modeling discrete, inter-dependent events over continuous time. We start by …
processes, for modeling discrete, inter-dependent events over continuous time. We start by …
[PDF][PDF] Near duplicate image detection: Min-hash and TF-IDF weighting.
This paper proposes two novel image similarity measures for fast indexing via locality
sensitive hashing. The similarity measures are applied and evaluated in the context of near …
sensitive hashing. The similarity measures are applied and evaluated in the context of near …
Visualrank: Applying pagerank to large-scale image search
Because of the relative ease in understanding and processing text, commercial image-
search systems often rely on techniques that are largely indistinguishable from text search …
search systems often rely on techniques that are largely indistinguishable from text search …