Search Results for author: Mehmet Saygin Seyfioglu

Found 7 papers, 4 papers with code

Diffuse to Choose: Enriching Image Conditioned Inpainting in Latent Diffusion Models for Virtual Try-All

no code implementations24 Jan 2024 Mehmet Saygin Seyfioglu, Karim Bouyarmane, Suren Kumar, Amir Tavanaei, Ismail B. Tutar

As online shopping is growing, the ability for buyers to virtually visualize products in their settings-a phenomenon we define as "Virtual Try-All"-has become crucial.

Diffusion Personalization

Quilt-LLaVA: Visual Instruction Tuning by Extracting Localized Narratives from Open-Source Histopathology Videos

1 code implementation7 Dec 2023 Mehmet Saygin Seyfioglu, Wisdom O. Ikezogwo, Fatemeh Ghezloo, Ranjay Krishna, Linda Shapiro

Training multi-model models for histopathology requires instruction tuning datasets, which currently contain information for individual image patches, without a spatial grounding of the concepts within each patch and without a wider view of the WSI.

Image Captioning Visual Question Answering (VQA) +1

DreamPaint: Few-Shot Inpainting of E-Commerce Items for Virtual Try-On without 3D Modeling

1 code implementation2 May 2023 Mehmet Saygin Seyfioglu, Karim Bouyarmane, Suren Kumar, Amir Tavanaei, Ismail B. Tutar

We introduce DreamPaint, a framework to intelligently inpaint any e-commerce product on any user-provided context image.

Virtual Try-on

Multi-modal Masked Autoencoders Learn Compositional Histopathological Representations

1 code implementation4 Sep 2022 Wisdom Oluchi Ikezogwo, Mehmet Saygin Seyfioglu, Linda Shapiro

However, the domain shift between natural images and digital pathology images requires further research in designing MAE for patch-level WSIs.

Self-Supervised Learning

Detecting Cybersecurity Events from Noisy Short Text

no code implementations NAACL 2019 Semih Yagcioglu, Mehmet Saygin Seyfioglu, Begum Citamak, Batuhan Bardak, Seren Guldamlasioglu, Azmi Yuksel, Emin Islam Tatli

In this study, we propose a method that leverages both domain-specific word embeddings and task-specific features to detect cyber security events from tweets.

2k Word Embeddings

Cannot find the paper you are looking for? You can Submit a new open access paper.