Skip to main content

Showing 1–4 of 4 results for author: Hoe, J T

.
  1. arXiv:2312.05849  [pdf, other

    cs.CV cs.GR cs.MM

    InteractDiffusion: Interaction Control in Text-to-Image Diffusion Models

    Authors: Jiun Tian Hoe, Xudong Jiang, Chee Seng Chan, Yap-Peng Tan, Weipeng Hu

    Abstract: Large-scale text-to-image (T2I) diffusion models have showcased incredible capabilities in generating coherent images based on textual descriptions, enabling vast applications in content generation. While recent advancements have introduced control over factors such as object localization, posture, and image contours, a crucial gap remains in our ability to control the interactions between objects… ▽ More

    Submitted 26 February, 2024; v1 submitted 10 December, 2023; originally announced December 2023.

    Comments: Website: https://jiuntian.github.io/interactdiffusion. Accepted at CVPR2024

  2. arXiv:2302.07669  [pdf, other

    cs.CV cs.IR

    Unsupervised Hashing with Similarity Distribution Calibration

    Authors: Kam Woh Ng, Xiatian Zhu, Jiun Tian Hoe, Chee Seng Chan, Tianyu Zhang, Yi-Zhe Song, Tao Xiang

    Abstract: Unsupervised hashing methods typically aim to preserve the similarity between data points in a feature space by map** them to binary hash codes. However, these methods often overlook the fact that the similarity between data points in the continuous feature space may not be preserved in the discrete hash code space, due to the limited similarity range of hash codes. The similarity range is bound… ▽ More

    Submitted 31 August, 2023; v1 submitted 15 February, 2023; originally announced February 2023.

    Comments: BMVC 2023

  3. arXiv:2109.14449  [pdf, other

    cs.CV cs.LG

    One Loss for All: Deep Hashing with a Single Cosine Similarity based Learning Objective

    Authors: Jiun Tian Hoe, Kam Woh Ng, Tianyu Zhang, Chee Seng Chan, Yi-Zhe Song, Tao Xiang

    Abstract: A deep hashing model typically has two main learning objectives: to make the learned binary hash codes discriminative and to minimize a quantization error. With further constraints such as bit balance and code orthogonality, it is not uncommon for existing models to employ a large number (>4) of losses. This leads to difficulties in model training and subsequently impedes their effectiveness. In t… ▽ More

    Submitted 29 September, 2021; originally announced September 2021.

    Comments: Accepted at NeurIPS 2021

  4. arXiv:2106.05407  [pdf, other

    cs.CR cs.NI

    OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VR

    Authors: Rahmadi Trimananda, Hieu Le, Hao Cui, Janice Tran Ho, Anastasia Shuba, Athina Markopoulou

    Abstract: Virtual reality (VR) is an emerging technology that enables new applications but also introduces privacy risks. In this paper, we focus on Oculus VR (OVR), the leading platform in the VR space and we provide the first comprehensive analysis of personal data exposed by OVR apps and the platform itself, from a combined networking and privacy policy perspective. We experimented with the Quest 2 heads… ▽ More

    Submitted 19 November, 2021; v1 submitted 9 June, 2021; originally announced June 2021.

    Comments: This is the extended version of the paper with the same title published at USENIX Security Symposium 2022