2022
DOI: 10.1016/j.patcog.2022.108676
|View full text |Cite
|
Sign up to set email alerts
|

MS2GAH: Multi-label semantic supervised graph attention hashing for robust cross-modal retrieval

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9
1

Relationship

2
8

Authors

Journals

citations
Cited by 31 publications
(7 citation statements)
references
References 17 publications
0
7
0
Order By: Relevance
“…In DL algorithms, artificially constructed neural networks are mainly used to solve high-dimensional decision-making problems [18]. The main idea of RL is to use an agent to learn a decision-making policy in the process of interacting with the environment, to obtain the optimal reward [19].…”
Section: Work Motivationsmentioning
confidence: 99%
“…In DL algorithms, artificially constructed neural networks are mainly used to solve high-dimensional decision-making problems [18]. The main idea of RL is to use an agent to learn a decision-making policy in the process of interacting with the environment, to obtain the optimal reward [19].…”
Section: Work Motivationsmentioning
confidence: 99%
“…The basic idea of cross-modal hash retrieval [ 4 , 5 ] is to use the sample pair information of different modalities, learn the hash transform of different modalities and map the data of different modalities to a Hamming binary space [ 6 ] while keeping the similarity of the data in the process of mapping. (Data with more similar original semantics are projected into the Hamming common space, and the distance between their hash codes is closer.)…”
Section: Introductionmentioning
confidence: 99%
“…Blockchain technology has gained widespread acceptance as a security solution as it ensures security, efficiency, and reduces fraud in CNNs [ 26 , 27 , 28 ]. Blockchain technology can prevent the manipulation of object labels by incorporating critical features such as security, authenticity, data privacy, and de-tracking [ 29 ]. To prevent manipulation within CNN architectures, the input parameters of each layer should be verified.…”
Section: Introductionmentioning
confidence: 99%