Attention-Oriented Deep Multi-Task Hash Learning
-
Published:2023-03-04
Issue:5
Volume:12
Page:1226
-
ISSN:2079-9292
-
Container-title:Electronics
-
language:en
-
Short-container-title:Electronics
Author:
Wang Letian1, Meng Ziyu1, Dong Fei2, Yang Xiao1, Xi Xiaoming1, Nie Xiushan1ORCID
Affiliation:
1. School of Computer Science and Technology, Shandong Jianzhu University, Jinan 250101, China 2. School of Journalism and Communication, Shandong Normal University, Jinan 250358, China
Abstract
Hashing has wide applications in image retrieval at large scales due to being an efficient approach to approximate nearest neighbor calculation. It can squeeze complex high-dimensional arrays via binarization while maintaining the semantic properties of the original samples. Currently, most existing hashing methods always predetermine the stable length of hash code before training the model. It is inevitable for these methods to increase the computing time, as the code length converts, caused by the task requirements changing. A single hash code fails to reflect the semantic relevance. Toward solving these issues, we put forward an attention-oriented deep multi-task hash learning (ADMTH) method, in which multiple hash codes of varying length can be simultaneously learned. Compared with the existing methods, ADMTH is one of the first attempts to apply multi-task learning theory to the deep hashing framework to generate and explore multi-length hash codes. Meanwhile, it embeds the attention mechanism in the backbone network to further extract discriminative information. We utilize two common available large-scale datasets, proving its effectiveness. The proposed method substantially improves retrieval efficiency and assures the image characterizing quality.
Funder
National Natural Science Foundation of China Shandong Provincial Natural Science Foundation for Distinguished Young Scholars Shandong Provincial Natural Science Foundation Taishan Scholar Project of Shandong Province
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference54 articles.
1. Binary hashing for approximate nearest neighbor search on big data: A survey;Cao;IEEE Access,2017 2. Alwen, J., Gazi, P., Kamath, C., Klein, K., Osang, G., Pietrzak, K., Reyzin, L., Rolínek, M., and Rybár, M. (2018, January 4–8). On the memory-hardness of data-independent password-hashing functions. Proceedings of the 2018 on Asia Conference on Computer and Communications Security, Incheon, Republic of Korea. 3. Andoni, A., and Razenshteyn, I. (2015, January 15–17). Optimal data-dependent hashing for approximate near neighbors. Proceedings of the Forty-Seventh Annual ACM Symposium on Theory of Computing, Portland, OR, USA. 4. Indyk, P., and Motwani, R. (1998, January 24–26). Approximate nearest neighbors: Towards removing the curse of dimensionality. Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, Dallas, TX, USA. 5. Spectral hashing;Weiss;Advances in Neural Information Process Systems, Proceedings of the NIPS 2008, Vancouver, BC, Canada, 8–11 December,2008
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|