相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Fine-Tuning CNN Image Retrieval with No Human Annotation
Filip Radenovic et al.
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2019)
Deep Representation Learning for Metadata Verification
Bor-Chun Chen et al.
2019 IEEE WINTER APPLICATIONS OF COMPUTER VISION WORKSHOPS (WACVW) (2019)
Places: A 10 Million Image Database for Scene Recognition
Bolei Zhou et al.
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2018)
Detection of Metadata Tampering through Discrepancy between Image Content and Metadata using Multi-task Deep Learning
Bor-Chun Chen et al.
2017 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW) (2017)
When Was That Made?
Sirion Vittayakorn et al.
2017 IEEE WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION (WACV 2017) (2017)
Densely Connected Convolutional Networks
Gao Huang et al.
30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017) (2017)
YFCC100M: The New Data in Multimedia Research
Bart Thomee et al.
COMMUNICATIONS OF THE ACM (2016)
Photo sundial: Estimating the time of capture in consumer photos
Tsung-Hung Tsai et al.
NEUROCOMPUTING (2016)
PlaNet - Photo Geolocation with Convolutional Neural Networks
Tobias Weyand et al.
COMPUTER VISION - ECCV 2016, PT VIII (2016)
Deep Features or Not: Temperature and Time Prediction in Outdoor Scenes
Anna Volokitin et al.
PROCEEDINGS OF 29TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS, (CVPRW 2016) (2016)
A Century of Portraits: A Visual Historical Record of American High School Yearbooks
Shiry Ginosar et al.
2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION WORKSHOP (ICCVW) (2015)
Transient Attributes for High-Level Understanding and Editing of Outdoor Scenes
Pierre-Yves Laffont et al.
ACM TRANSACTIONS ON GRAPHICS (2014)
An Evaluation of Popular Copy-Move Forgery Detection Approaches
Vincent Christlein et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)
Verifying Temporal Data in Geotagged Images Via Sun Azimuth Estimation
Pravin Kakar et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)