{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:40:08Z","timestamp":1774449608429,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T00:00:00Z","timestamp":1654560000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T00:00:00Z","timestamp":1654560000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1007\/s11042-022-13141-2","type":"journal-article","created":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T18:02:56Z","timestamp":1654624976000},"page":"389-405","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Asymmetric hashing based on generative adversarial network"],"prefix":"10.1007","volume":"82","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7607-5154","authenticated-orcid":false,"given":"Muhammad Umair","family":"Hassan","sequence":"first","affiliation":[]},{"given":"Dongmei","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Mingxuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiuyang","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,7]]},"reference":[{"key":"13141_CR1","doi-asserted-by":"crossref","unstructured":"Andoni A, Indyk P (2006) Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. In: 2006 47th annual IEEE symposium on foundations of computer science (FOCS\u201906). IEEE, pp 459\u2013468","DOI":"10.1109\/FOCS.2006.49"},{"key":"13141_CR2","doi-asserted-by":"crossref","unstructured":"Andoni A, Razenshteyn I (2015) Optimal data-dependent hashing for approximate near neighbors. In: Proceedings of the forty-seventh annual ACM symposium on theory of computing, pp 793\u2013801","DOI":"10.1145\/2746539.2746553"},{"key":"13141_CR3","doi-asserted-by":"crossref","unstructured":"Becker C, Rigamonti R, Lepetit V, Fua P (2013) Supervised feature learning for curvilinear structure segmentation. In: International conference on medical image computing and computer-assisted intervention. Springer, pp 526\u2013533","DOI":"10.1007\/978-3-642-40811-3_66"},{"key":"13141_CR4","doi-asserted-by":"crossref","unstructured":"Cao Z, Long M, Wang J, Yu PS (2017) Hashnet: Deep learning to hash by continuation. In: Proceedings of the IEEE international conference on computer vision, pp 5608\u20135617","DOI":"10.1109\/ICCV.2017.598"},{"key":"13141_CR5","unstructured":"Chatfield K, Simonyan K, Vedaldi A, Zisserman A (2020) Return of the devil in the details: Delving deep into convolutional nets. arXiv:1405.3531"},{"key":"13141_CR6","unstructured":"Chen X, Duan Y, Houthooft R, Schulman J, Sutskever I, Abbeel P (2016) Infogan: Interpretable representation learning by information maximizing generative adversarial nets. In: Advances in neural information processing systems, pp 2172\u20132180"},{"key":"13141_CR7","doi-asserted-by":"crossref","unstructured":"Chua T-S, Tang J, Hong R, Li H, Luo Z, Zheng Y (2009) Nus-wide: a real-world web image database from national university of singapore. In: Proceedings of the ACM international conference on image and video retrieval, pp 1\u20139","DOI":"10.1145\/1646396.1646452"},{"key":"13141_CR8","doi-asserted-by":"crossref","unstructured":"Do T-T, Doan A-D, Cheung N-M (2016) Learning to hash with binary deep neural network. In: European conference on computer vision. Springer, pp 219\u2013234","DOI":"10.1007\/978-3-319-46454-1_14"},{"key":"13141_CR9","doi-asserted-by":"crossref","unstructured":"Gao X, Shen F, Yang Y, Xu X, Li H, Shen HT (2017) Asymmetric sparse hashing. In: 2017 IEEE international conference on multimedia and expo (ICME). IEEE, pp 127\u2013132","DOI":"10.1109\/ICME.2017.8019306"},{"key":"13141_CR10","unstructured":"Gionis A, Indyk P, Motwani R et al (1999) Similarity search in high dimensions via hashing. In: Vldb, vol 99, pp 518\u2013529"},{"issue":"12","key":"13141_CR11","doi-asserted-by":"publisher","first-page":"2916","DOI":"10.1109\/TPAMI.2012.193","volume":"35","author":"Y Gong","year":"2012","unstructured":"Gong Y, Lazebnik S, Gordo A, Perronnin F (2012) Iterative quantization: a procrustean approach to learning binary codes for large-scale image retrieval. IEEE Transactions on Pattern Analysis and Machine Intelligence 35(12):2916\u20132929","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"13141_CR12","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. In: Advances in neural information processing systems, pp 2672\u2013 2680"},{"key":"13141_CR13","unstructured":"Jiang Q-Y, Li W-J (2015) Scalable graph hashing with feature transformation. In: Twenty-fourth international joint conference on artificial intelligence"},{"key":"13141_CR14","doi-asserted-by":"crossref","unstructured":"Jiang Q-Y, Li W-J (2018) Asymmetric deep supervised hashing. In: Thirty-second AAAI conference on artificial intelligence","DOI":"10.1609\/aaai.v32i1.11814"},{"key":"13141_CR15","doi-asserted-by":"crossref","unstructured":"Kang W-C, Li W-J, Zhou Z-H (2016) Column sampling based discrete supervised hashing. In: Thirtieth AAAI conference on artificial intelligence","DOI":"10.1609\/aaai.v30i1.10176"},{"key":"13141_CR16","unstructured":"Kong W, Li W-J (2012) Isotropic hashing. In: Advances in neural information processing systems, pp 1646\u20131654"},{"key":"13141_CR17","unstructured":"Krizhevsky A, Hinton G et al (2020) Learning multiple layers of features from tiny images"},{"key":"13141_CR18","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Advances in neural information processing systems, pp 1097\u20131105"},{"key":"13141_CR19","doi-asserted-by":"crossref","unstructured":"Kulis B, Grauman K (2009) Kernelized locality-sensitive hashing for scalable image search. In: 2009 IEEE 12th international conference on computer vision. IEEE, pp 2130\u20132137","DOI":"10.1109\/ICCV.2009.5459466"},{"key":"13141_CR20","doi-asserted-by":"crossref","unstructured":"Lai H, Pan Y, Liu Y, Yan S (2015) Simultaneous feature learning and hash coding with deep neural networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 3270\u20133278","DOI":"10.1109\/CVPR.2015.7298947"},{"issue":"1","key":"13141_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/10618600.2000.10474858","volume":"9","author":"K Lange","year":"2000","unstructured":"Lange K, Hunter DR, Yang I (2000) Optimization transfer using surrogate objective functions. J Comput Graph Stat 9(1):1\u201320","journal-title":"J Comput Graph Stat"},{"key":"13141_CR22","unstructured":"Larsen ABL, S\u00f8nderby SK, Larochelle H, Winther O (2016) Autoencoding beyond pixels using a learned similarity metric. arXiv:1512.09300"},{"key":"13141_CR23","doi-asserted-by":"crossref","unstructured":"Ledig C, Theis L, Husz\u00e1r F, Caballero J, Cunningham A, Acosta A, Aitken A, Tejani A, Totz J, Wang Z et al (2017) Photo-realistic single image super-resolution using a generative adversarial network. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 4681\u20134690","DOI":"10.1109\/CVPR.2017.19"},{"key":"13141_CR24","unstructured":"Li W-J, Wang S, Kang W-C (2020) Feature learning based deep supervised hashing with pairwise labels. arXiv:1511.03855"},{"key":"13141_CR25","doi-asserted-by":"publisher","first-page":"106851","DOI":"10.1016\/j.knosys.2021.106851","volume":"219","author":"F Li","year":"2021","unstructured":"Li F, Wang T, Zhu L, Zhang Z, Wang X (2021) Task-adaptive asymmetric deep cross-modal hashing. Knowl-Based Syst 219:106851","journal-title":"Knowl-Based Syst"},{"key":"13141_CR26","doi-asserted-by":"crossref","unstructured":"Lin G, Shen C, Shi Q, Van den Hengel A, Suter D (2014) Fast supervised hashing with decision trees for high-dimensional data. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1963\u20131970","DOI":"10.1109\/CVPR.2014.253"},{"key":"13141_CR27","doi-asserted-by":"crossref","unstructured":"Liu H, Ji R, Wu Y, Liu W (2016) Towards optimal binary code learning via ordinal embedding. In: Thirtieth AAAI conference on artificial intelligence","DOI":"10.1609\/aaai.v30i1.10167"},{"key":"13141_CR28","unstructured":"Liu W., Mu C, Kumar S, Chang S-F (2014) Discrete graph hashing. In: Advances in neural information processing systems, pp 3419\u20133427"},{"key":"13141_CR29","doi-asserted-by":"crossref","unstructured":"Liu W, Wang J, Ji R, Jiang Y-G, Chang S-F (2012) Supervised hashing with kernels. In: 2012 IEEE conference on computer vision and pattern recognition. IEEE, pp 2074\u20132081","DOI":"10.1109\/CVPR.2012.6247912"},{"key":"13141_CR30","doi-asserted-by":"crossref","unstructured":"Liu H, Wang R, Shan S, Chen X (2016) Deep supervised hashing for fast image retrieval. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2064\u20132072","DOI":"10.1109\/CVPR.2016.227"},{"key":"13141_CR31","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.neucom.2019.11.009","volume":"380","author":"L Ma","year":"2020","unstructured":"Ma L, Li H, Meng F, Wu Q, Ngan KN (2020) Discriminative deep metric learning for asymmetric discrete hashing. Neurocomputing 380:115\u2013124","journal-title":"Neurocomputing"},{"key":"13141_CR32","doi-asserted-by":"crossref","unstructured":"Magliani F , Fontanini T, Prati A (2018) Efficient nearest neighbors search for large-scale landmark recognition. In: International symposium on visual computing. Springer, pp 541\u2013551","DOI":"10.1007\/978-3-030-03801-4_47"},{"key":"13141_CR33","unstructured":"Neyshabur B, Srebro N, Salakhutdinov RR, Makarychev Y, Yadollahpour P (2013) The power of asymmetry in binary hashing. In: Advances in neural information processing systems, pp 2823\u20132831"},{"key":"13141_CR34","unstructured":"Norouzi M, Fleet DJ, Salakhutdinov RR (2012) Hamming distance metric learning. In: Advances in neural information processing systems, pp 1061\u20131069"},{"key":"13141_CR35","unstructured":"Odena A, Olah C, Shlens J (2017) Conditional image synthesis with auxiliary classifier gans. In: International conference on machine learning, PMLR, pp 2642\u20132651"},{"key":"13141_CR36","unstructured":"Radford A, Metz L, Chintala S (2020) Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv:1511.06434"},{"key":"13141_CR37","doi-asserted-by":"crossref","unstructured":"Shen F, Gao X, Liu L, Yang Y, Shen HT (2017) Deep asymmetric pairwise hashing. In: Proceedings of the 25th ACM international conference on Multimedia, pp 1522\u20131530","DOI":"10.1145\/3123266.3123345"},{"key":"13141_CR38","doi-asserted-by":"crossref","unstructured":"Shen F, Shen C, Liu W, Tao Shen H (2015) Supervised discrete hashing. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 37\u201345","DOI":"10.1109\/CVPR.2015.7298598"},{"issue":"9","key":"13141_CR39","doi-asserted-by":"publisher","first-page":"2022","DOI":"10.1109\/TMM.2017.2699863","volume":"19","author":"F Shen","year":"2017","unstructured":"Shen F, Yang Y, Liu L, Liu W, Tao D, Shen HT (2017) Asymmetric binary coding for image search. IEEE Transactions on Multimedia 19(9):2022\u20132032","journal-title":"IEEE Transactions on Multimedia"},{"key":"13141_CR40","doi-asserted-by":"crossref","unstructured":"Shi X, Xing F, Xu K, Sapkota M, Yang L (2017) Asymmetric discrete graph hashing. In: Thirty-first AAAI conference on artificial intelligence","DOI":"10.1609\/aaai.v31i1.10831"},{"key":"13141_CR41","unstructured":"Somasundaram A, Reddy US (2016) Data imbalance: Effects and solutions for classification of large and highly imbalanced data. In: International conference on research in engineering, computers and technology (ICRECT 2016), pp 1\u201316"},{"key":"13141_CR42","doi-asserted-by":"crossref","unstructured":"Song J, He T, Gao L, Xu X, Hanjalic A, Shen HT (2018) Binary generative adversarial networks for image retrieval. In: Thirty-second AAAI conference on artificial intelligence","DOI":"10.1609\/aaai.v32i1.11276"},{"issue":"04","key":"13141_CR43","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1142\/S0218001409007326","volume":"23","author":"Y Sun","year":"2009","unstructured":"Sun Y, Wong AK, Kamel MS (2009) Classification of imbalanced data: a review. Int J Pattern Recognit Artif Intell 23(04):687\u2013719","journal-title":"Int J Pattern Recognit Artif Intell"},{"issue":"12","key":"13141_CR44","doi-asserted-by":"publisher","first-page":"6154","DOI":"10.1109\/TNNLS.2018.2816743","volume":"29","author":"J Tang","year":"2018","unstructured":"Tang J, Lin J, Li Z, Yang J (2018) Discriminative deep quantization hashing for face image retrieval. IEEE transactions on neural networks and learning systems 29(12):6154\u20136162","journal-title":"IEEE transactions on neural networks and learning systems"},{"key":"13141_CR45","unstructured":"Weiss Y, Torralba A, Fergus R (2009) Spectral hashing. In: Advances in neural information processing systems, pp 1753\u20131760"},{"key":"13141_CR46","doi-asserted-by":"crossref","unstructured":"Xia R, Pan Y, Lai H, Liu C, Yan S (2014) Supervised hashing for image retrieval via image representation learning. In: Twenty-eighth AAAI conference on artificial intelligence","DOI":"10.1609\/aaai.v28i1.8952"},{"key":"13141_CR47","doi-asserted-by":"publisher","first-page":"3626","DOI":"10.1109\/TIP.2020.2963957","volume":"29","author":"D Xie","year":"2020","unstructured":"Xie D, Deng C, Li C, Liu X, Tao D (2020) Multi-task consistency-preserving adversarial hashing for cross-modal retrieval. IEEE Trans Image Process 29:3626\u20133637","journal-title":"IEEE Trans Image Process"},{"key":"13141_CR48","doi-asserted-by":"crossref","unstructured":"Xu R, Yang Y, Shen F, Xie N, Shen HT (2017) Efficient binary coding for subspace-based query-by-image video retrieval. In: Proceedings of the 25th ACM international conference on multimedia, pp 1354\u20131362","DOI":"10.1145\/3123266.3123392"},{"key":"13141_CR49","doi-asserted-by":"crossref","unstructured":"Zhang P, Zhang W, Li W-J, Guo M (2014) Supervised hashing with latent factor models. In: Proceedings of the 37th international ACM SIGIR conference on research & development in information retrieval, pp 173\u2013182","DOI":"10.1145\/2600428.2609600"},{"key":"13141_CR50","doi-asserted-by":"crossref","unstructured":"Zhang L, Zhang Y, Tang J, Lu K, Tian Q (2013) Binary code ranking with weighted hamming distance. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1586\u20131593","DOI":"10.1109\/CVPR.2013.208"},{"key":"13141_CR51","doi-asserted-by":"crossref","unstructured":"Zhu H, Long M, Wang J, Cao Y (2016) Deep hashing network for efficient similarity retrieval. In: Thirtieth AAAI conference on artificial intelligence","DOI":"10.1609\/aaai.v30i1.10235"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13141-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-13141-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13141-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T16:02:01Z","timestamp":1727366521000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-13141-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,7]]},"references-count":51,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["13141"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-13141-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,7]]},"assertion":[{"value":"14 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 May 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 June 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}