{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T07:10:20Z","timestamp":1768633820772,"version":"3.49.0"},"reference-count":51,"publisher":"Tsinghua University Press","issue":"4","license":[{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,8,17]],"date-time":"2024-08-17T00:00:00Z","timestamp":1723852800000},"content-version":"vor","delay-in-days":16,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comp. Visual. Med."],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s41095-024-0428-y","type":"journal-article","created":{"date-parts":[[2024,8,17]],"date-time":"2024-08-17T10:02:20Z","timestamp":1723888940000},"page":"725-740","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Central similarity consistency hashing for asymmetric image retrieval"],"prefix":"10.26599","volume":"10","author":[{"given":"Zhaofeng","family":"Xuan","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100085, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China; Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100085, China"}]},{"given":"Dayan","family":"Wu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100085, China"}]},{"given":"Wanqian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100085, China"}]},{"given":"Qinghang","family":"Su","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100085, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China; Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100085, China"}]},{"given":"Bo","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100085, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China; Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100085, China"}]},{"given":"Weiping","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100085, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China"}]}],"member":"11138","reference":[{"key":"428_CR1","doi-asserted-by":"publisher","first-page":"1522","DOI":"10.1145\/3123266.3123345","volume-title":"Proceedings of the 25th ACM International Conference on Multimedia","author":"F Shen","year":"2017","unstructured":"Shen, F.; Gao, X.; Liu, L.; Yang, Y.; Shen, H. T. Deep asymmetric pairwise hashing. In: Proceedings of the 25th ACM International Conference on Multimedia, 1522\u20131530, 2017."},{"key":"428_CR2","first-page":"3342","volume-title":"Proceedings of the 32nd AAAI Conference on Artificial Intelligence","author":"Q-Y Jiang","year":"2018","unstructured":"Jiang, Q.-Y.; Li, W.-J. Asymmetric deep supervised hashing. In: Proceedings of the 32nd AAAI Conference on Artificial Intelligence, 3342\u20133349, 2018."},{"key":"428_CR3","first-page":"9061","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"D Wu","year":"2019","unstructured":"Wu, D.; Dai, Q.; Liu, J.; Li, B.; Wang, W. Deep incremental hashing network for efficient image retrieval. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 9061\u20139069, 2019."},{"key":"428_CR4","first-page":"2156","volume-title":"Proceedings of the 28th AAAI Conference on Artificial Intelligence","author":"R Xia","year":"2014","unstructured":"Xia, R.; Pan, Y.; Lai, H.; Liu, C.; Yan, S. Supervised hashing for image retrieval via image representation learning. In: Proceedings of the 28th AAAI Conference on Artificial Intelligence, 2156\u20132162, 2014."},{"key":"428_CR5","first-page":"24286","volume-title":"Proceedings of the International Conference on Neural Information Processing Systems","author":"J T Hoe","year":"2021","unstructured":"Hoe, J. T.; Ng, K. W.; Zhang, T.; Chan, C. S.; Song, Y.-Z.; Xiang, T. One loss for all: Deep hashing with a single cosine similarity based learning objective. In: Proceedings of the International Conference on Neural Information Processing Systems, 24286\u201324298, 2021."},{"key":"428_CR6","first-page":"3080","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"L Yuan","year":"2020","unstructured":"Yuan, L.; Wang, T.; Zhang, X.; Tay, F. E.; Jie, Z.; Liu, W.; Feng, J. Central similarity quantization for efficient image and video retrieval. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 3080\u20133089, 2020."},{"issue":"6","key":"428_CR7","doi-asserted-by":"publisher","first-page":"1209","DOI":"10.1109\/TMM.2016.2645404","volume":"19","author":"V E Liong","year":"2017","unstructured":"Liong, V. E.; Lu, J.; Tan, Y.-P.; Zhou, J. Deep video hashing. IEEE Transactions on Multimedia Vol. 19, No. 6, 1209\u20131219, 2017.","journal-title":"IEEE Transactions on Multimedia"},{"key":"428_CR8","doi-asserted-by":"publisher","first-page":"7776","DOI":"10.1109\/TIP.2021.3109508","volume":"30","author":"C Zhao","year":"2021","unstructured":"Zhao, C.; Tu, Y.; Lai, Z.; Shen, F.; Shen, H. T.; Miao, D. Salience-guided iterative asymmetric mutual hashing for fast person re-identification. IEEE Transactions on Image Processing Vol. 30, 7776\u20137789, 2021.","journal-title":"IEEE Transactions on Image Processing"},{"key":"428_CR9","doi-asserted-by":"publisher","first-page":"6253","DOI":"10.1145\/3581783.3612294","volume-title":"Proceedings of the 31st ACM International Conference on Multimedia","author":"Z Yang","year":"2023","unstructured":"Yang, Z.; Wu, D.; Zhang, W.; Li, B.; Wang, W. Handling label uncertainty for camera incremental person re-identification. In: Proceedings of the 31st ACM International Conference on Multimedia, 6253\u20136263, 2023."},{"key":"428_CR10","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1145\/3503161.3547958","volume-title":"Proceedings of the 30th ACM International Conference on Multimedia","author":"L Wang","year":"2022","unstructured":"Wang, L.; Zhang, W.; Wu, D.; Zhu, F.; Li, B. Attack is the best defense: Towards preemptive-protection person re-identification. In: Proceedings of the 30th ACM International Conference on Multimedia, 550\u2013559, 2022."},{"issue":"12","key":"428_CR11","doi-asserted-by":"publisher","first-page":"4766","DOI":"10.1109\/TIP.2015.2467315","volume":"24","author":"R Zhang","year":"2015","unstructured":"Zhang, R.; Lin, L.; Zhang, R.; Zuo, W.; Zhang, L. Bit-scalable deep hashing with regularized similarity learning for image retrieval and person re-identification. IEEE Transactions on Image Processing Vol. 24, No. 12, 4766\u20134779, 2015.","journal-title":"IEEE Transactions on Image Processing"},{"key":"428_CR12","doi-asserted-by":"publisher","first-page":"1318","DOI":"10.1145\/3404835.3462896","volume-title":"Proceedings of the 44th International ACM SIGIR Conference on Research and Development in Information Retrieval","author":"W Zhang","year":"2021","unstructured":"Zhang, W.; Wu, D.; Zhou, Y.; Li, B.; Wang, W.; Meng, D. Binary neural network hashing for image retrieval. In: Proceedings of the 44th International ACM SIGIR Conference on Research and Development in Information Retrieval, 1318\u20131327, 2021."},{"key":"428_CR13","first-page":"1711","volume-title":"Proceedings of the International Joint Conference on Artificial Intelligence","author":"W-J Li","year":"2016","unstructured":"Li, W.-J.; Wang, S.; Kang, W.-C. Feature learning based deep supervised hashing with pairwise labels. In: Proceedings of the International Joint Conference on Artificial Intelligence, 1711\u20131717, 2016."},{"key":"428_CR14","first-page":"2064","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","author":"H Liu","year":"2016","unstructured":"Liu, H.; Wang, R.; Shan, S.; Chen, X. Deep supervised hashing for fast image retrieval. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2064\u20132072, 2016."},{"key":"428_CR15","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1145\/3394171.3414033","volume-title":"Proceedings of the 28th ACM International Conference on Multimedia","author":"S Zhao","year":"2020","unstructured":"Zhao, S.; Wu, D.; Zhang, W.; Zhou, Y.; Li, B.; Wang, W. Asymmetric deep hashing for efficient hash code compression. In: Proceedings of the 28th ACM International Conference on Multimedia, 763\u2013771, 2020."},{"key":"428_CR16","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1145\/3503161.3548015","volume-title":"Proceedings of the 30th ACM International Conference on Multimedia","author":"D Wu","year":"2022","unstructured":"Wu, D.; Su, Q.; Li, B.; Wang, W. Efficient hash code expansion by recycling old bits. In: Proceedings of the 30th ACM International Conference on Multimedia, 572\u2013580, 2022."},{"key":"428_CR17","first-page":"3270","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","author":"H Lai","year":"2015","unstructured":"Lai, H.; Pan, Y.; Ye, L.; Yan, S. Simultaneous feature learning and hash coding with deep neural networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 3270\u20133278, 2015."},{"key":"428_CR18","first-page":"1338","volume-title":"Proceedings of the 30th International Joint Conference on Artificial Intelligence","author":"S Zhao","year":"2021","unstructured":"Zhao, S.; Wu, D.; Zhou, Y.; Li, B.; Wang, W. Rescuing deep hashing from dead bits problem. In: Proceedings of the 30th International Joint Conference on Artificial Intelligence, 1338\u20131344, 2021."},{"key":"428_CR19","first-page":"518","volume-title":"Proceedings of International Conference on Very Large Data Bases","author":"A Gionis","year":"1999","unstructured":"Gionis, A.; Indyk, P.; Motwani, R. Similarity search in high dimensions via hashing. In: Proceedings of International Conference on Very Large Data Bases, 518\u2013529, 1999."},{"issue":"12","key":"428_CR20","doi-asserted-by":"publisher","first-page":"2916","DOI":"10.1109\/TPAMI.2012.193","volume":"35","author":"Y Gong","year":"2013","unstructured":"Gong, Y.; Lazebnik, S.; Gordo, A.; Perronnin, F. Iterative quantization: A procrustean approach to learning binary codes for large-scale image retrieval. IEEE Transactions on Pattern Analysis and Machine Intelligence Vol. 35, No. 12, 2916\u20132929, 2013.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"428_CR21","first-page":"1753","volume-title":"Proceedings of the International Conference on Neural Information Processing Systems","author":"Y Weiss","year":"2008","unstructured":"Weiss, Y.; Torralba, A.; Fergus, R. Spectral hashing. In: Proceedings of the International Conference on Neural Information Processing Systems, 1753\u20131760, 2008."},{"key":"428_CR22","first-page":"1106","volume-title":"Proceedings of the International Conference on Neural Information Processing Systems","author":"A Krizhevsky","year":"2012","unstructured":"Krizhevsky, A.; Sutskever, I.; Hinton, G. E. Imagenet classification with deep convolutional neural networks. In: Proceedings of the International Conference on Neural Information Processing Systems, 1106\u20131114, 2012."},{"key":"428_CR23","first-page":"770","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","author":"K He","year":"2016","unstructured":"He, K.; Zhang, X.; Ren, S.; Sun, J. Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 770\u2013778, 2016."},{"key":"428_CR24","first-page":"1314","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","author":"A Howard","year":"2019","unstructured":"Howard, A.; Sandler, M.; Chen, B.; Wang, W.; Chen, L. C.; Tan, M.; Chu, G.; Vasudevan, V.; Zhu, Y.; Pang, R.; et al. Searching for MobileNetV3. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, 1314\u20131324, 2019."},{"key":"428_CR25","first-page":"19220","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","author":"X Chen","year":"2023","unstructured":"Chen, X.; Zhou, Y.; Wu, D.; Yang, C.; Li, B.; Hu, Q.; Wang, W. AREA: Adaptive reweighting via effective area for long-tailed classification. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, 19220\u201319230, 2023."},{"key":"428_CR26","first-page":"6848","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"X Zhang","year":"2018","unstructured":"Zhang, X.; Zhou, X.; Lin, M.; Sun, J. ShuffleNet: An extremely efficient convolutional neural network for mobile devices. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 6848\u20136856, 2018."},{"key":"428_CR27","first-page":"1229","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Y Cao","year":"2018","unstructured":"Cao, Y.; Long, M.; Liu, B.; Wang, J. Deep cauchy hashing for hamming space retrieval. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 1229\u20131237, 2018."},{"key":"428_CR28","first-page":"2415","volume-title":"Proceedings of the 30th AAAI Conference on Artificial Intelligence","author":"H Zhu","year":"2016","unstructured":"Zhu, H.; Long, M.; Wang, J.; Cao, Y. Deep hashing network for efficient similarity retrieval. In: Proceedings of the 30th AAAI Conference on Artificial Intelligence, 2415\u20132421, 2016."},{"key":"428_CR29","first-page":"8224","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"M Budnik","year":"2021","unstructured":"Budnik, M.; Avrithis, Y. Asymmetric metric learning for knowledge transfer. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 8224\u20138234, 2021."},{"key":"428_CR30","first-page":"9479","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"H Wu","year":"2022","unstructured":"Wu, H.; Wang, M.; Zhou, W.; Li, H.; Tian, Q. Contextual similarity distillation for asymmetric image retrieval. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 9479\u20139488, 2022."},{"key":"428_CR31","first-page":"2654","volume-title":"Proceedings of the International Conference on Neural Information Processing Systems","author":"J Ba","year":"2014","unstructured":"Ba, J.; Caruana, R. Do deep nets really need to be deep? In: Proceedings of the International Conference on Neural Information Processing Systems, 2654\u20132662, 2014."},{"key":"428_CR32","unstructured":"Hinton, G. E.; Vinyals, O.; Dean, J. Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531, 2015."},{"key":"428_CR33","first-page":"11082","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"H Wu","year":"2023","unstructured":"Wu, H.; Wang, M.; Zhou, W.; Lu, Z.; Li, H. Asymmetric feature fusion for image retrieval. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 11082\u201311092, 2023."},{"key":"428_CR34","first-page":"825","volume-title":"Proceedings of the 29th International Joint Conference on Artificial Intelligence","author":"L Fan","year":"2020","unstructured":"Fan, L.; Ng, K. W.; Ju, C.; Zhang, T.; Chan, C. S. Deep polarized network for supervised learning of accurate binary hashing codes. In: Proceedings of the 29th International Joint Conference on Artificial Intelligence, 825\u2013831, 2020."},{"key":"428_CR35","first-page":"23455","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"L Wang","year":"2023","unstructured":"Wang, L.; Pan, Y.; Liu, C.; Lai, H.; Yin, J.; Liu, Y. Deep hashing with minimal-distance-separated hash centers. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 23455\u201323464, 2023."},{"key":"428_CR36","first-page":"3962","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"W Park","year":"2019","unstructured":"Park, W.; Kim, D.; Lu, Y.; Cho, M. Relational knowledge distillation. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 3962\u20133971, 2019."},{"key":"428_CR37","doi-asserted-by":"publisher","first-page":"1635","DOI":"10.1145\/3240508.3240519","volume-title":"Proceedings of the 26th ACM International Conference on Multimedia","author":"M Lin","year":"2018","unstructured":"Lin, M.; Ji, R.; Liu, H.; Wu, Y. Supervised online hashing via hadamard codebook learning. In: Proceedings of the 26th ACM International Conference on Multimedia, 1635\u20131643, 2018."},{"key":"428_CR38","first-page":"248","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","author":"J Deng","year":"2009","unstructured":"Deng, J.; Dong, W.; Socher, R.; Li, L. J.; Kai, L.; Li, F. F. ImageNet: A large-scale hierarchical image database. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 248\u2013255, 2009."},{"issue":"1\u20132","key":"428_CR39","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1002\/nav.3800020109","volume":"2","author":"H W Kuhn","year":"1955","unstructured":"Kuhn, H. W. The Hungarian method for the assignment problem. Naval Research Logistics Quarterly Vol. 2, Nos. 1\u20132, 83\u201397, 1955.","journal-title":"Naval Research Logistics Quarterly"},{"key":"428_CR40","first-page":"6908","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"T Li","year":"2022","unstructured":"Li, T.; Cao, P.; Yuan, Y.; Fan, L.; Yang, Y.; Feris, R.; Indyk, P.; Katabi, D. Targeted supervised contrastive learning for long-tailed recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 6908\u20136918, 2022."},{"key":"428_CR41","first-page":"4685","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"J Deng","year":"2019","unstructured":"Deng, J.; Guo, J.; Xue, N.; Zafeiriou, S. ArcFace: Additive angular margin loss for deep face recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 4685\u20134694, 2019."},{"key":"428_CR42","first-page":"5265","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"H Wang","year":"2018","unstructured":"Wang, H.; Wang, Y.; Zhou, Z.; Ji, X.; Gong, D.; Zhou, J.; Li, Z.; Liu, W. CosFace: Large margin cosine loss for deep face recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 5265\u20135274, 2018."},{"key":"428_CR43","first-page":"354","volume-title":"Computer Vision\u2013ECCV 2022. Lecture Notes in Computer Science, Vol. 13674","author":"Y K Jang","year":"2022","unstructured":"Jang, Y. K.; Gu, G.; Ko, B.; Kang, I.; Cho, N. I. Deep hash distillation for image retrieval. In: Computer Vision\u2013ECCV 2022. Lecture Notes in Computer Science, Vol. 13674. Avidan, S.; Brostow, G.; Ciss\u00e9, M.; Farinella, G. M.; Hassner, T. Eds. Springer Cham, 354\u2013371, 2022."},{"key":"428_CR44","volume-title":"Learning multiple layers of features from tiny images","author":"A Krizhevsky","year":"2009","unstructured":"Krizhevsky, A. Learning multiple layers of features from tiny images. 2009. Available at https:\/\/www.cs.toronto.edu\/~kriz\/learning-features-2009-TR.pdf"},{"key":"428_CR45","first-page":"740","volume-title":"Computer Vision\u2013ECCV 2014. Lecture Notes in Computer Science, Vol. 8693","author":"T-Y Lin","year":"2014","unstructured":"Lin, T.-Y.; Maire, M.; Belongie, S. J.; Hays, J.; Perona, P.; Ramanan, D.; Doll\u00e1r, P.; Zitnick, C. L. Microsoft COCO: Common objects in context. In: Computer Vision\u2013ECCV 2014. Lecture Notes in Computer Science, Vol. 8693. Fleet, D.; Pajdla, T.; Schiele, B.; Tuytelaars, T. Eds. Springer Cham, 740\u2013755, 2014."},{"key":"428_CR46","first-page":"5609","volume-title":"Proceedings of the IEEE International Conference on Computer Vision","author":"Z Cao","year":"2017","unstructured":"Cao, Z.; Long, M.; Wang, J.; Yu, P. S. HashNet: Deep learning to hash by continuation. In: Proceedings of the IEEE International Conference on Computer Vision, 5609\u20135618, 2017."},{"key":"428_CR47","volume-title":"Proceedings of the 9th International Conference on Learning Representations","author":"A Dosovitskiy","year":"2021","unstructured":"Dosovitskiy, A.; Beyer, L.; Kolesnikov, A.; Weissenborn, D.; Zhai, X.; Unterthiner, T.; Dehghani, M.; Minderer, M.; Heigold, G.; Gelly, S.; et al. An image is worth 16x16 words: Transformers for image recognition at scale. In: Proceedings of the 9th International Conference on Learning Representations, 2021."},{"key":"428_CR48","unstructured":"Mehta, S.; Rastegari, M. MobileViT: Light-weight, general-purpose, and mobile-friendly vision transformer. arXiv preprint arXiv:2110.02178, 2021."},{"key":"428_CR49","first-page":"8024","volume-title":"Proceedings of the International Conference on Neural Information Processing Systems","author":"A Paszke","year":"2019","unstructured":"Paszke, A.; Gross, S.; Massa, F.; Lerer, A.; Bradbury, J.; Chanan, G.; Killeen, T.; Lin, Z.; Gimelshein, N.; Antiga, L.; et al. Pytorch: An imperative style, highperformance deep learning library. In: Proceedings of the International Conference on Neural Information Processing Systems, 8024\u20138035, 2019."},{"key":"428_CR50","volume-title":"Proceedings of the 3rd International Conference on Learning Representations","author":"D P Kingma","year":"2015","unstructured":"Kingma, D. P.; Ba, J. Adam: A method for stochastic optimization. In: Proceedings of the 3rd International Conference on Learning Representations, 2015."},{"key":"428_CR51","first-page":"647","volume-title":"Proceedings of the 31th International Conference on Machine Learning","author":"J Donahue","year":"2014","unstructured":"Donahue, J.; Jia, Y.; Vinyals, O.; Hoffman, J.; Zhang, N.; Tzeng, E.; Darrell, T. DeCAF: A deep convolutional activation feature for generic visual recognition. In: Proceedings of the 31th International Conference on Machine Learning, 647\u2013655, 2014."}],"container-title":["Computational Visual Media"],"original-title":[],"link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41095-024-0428-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41095-024-0428-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41095-024-0428-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10750449\/10897710\/10897719.pdf?arnumber=10897719","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T18:38:54Z","timestamp":1762367934000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10897719\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8]]},"references-count":51,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1007\/s41095-024-0428-y","relation":{},"ISSN":["2096-0662","2096-0433"],"issn-type":[{"value":"2096-0662","type":"electronic"},{"value":"2096-0433","type":"print"}],"subject":[],"published":{"date-parts":[[2024,8]]},"assertion":[{"value":"2 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 March 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 August 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration of competing interest"}}]}}