{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T05:42:07Z","timestamp":1760074927388,"version":"build-2065373602"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,17]]},"DOI":"10.1109\/acit65614.2025.11185684","type":"proceedings-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:50:58Z","timestamp":1760032258000},"page":"981-986","source":"Crossref","is-referenced-by-count":0,"title":["Hierarchical Channel Clustering with Bayesian-Optimized Pruning for High-Fidelity CNN Compression"],"prefix":"10.1109","author":[{"given":"Xiaoxin","family":"Liu","sequence":"first","affiliation":[{"name":"Beihang University,School of Instrumentation and Optoelectronic Engineering,Beijing,China"}]},{"given":"Xiong","family":"Pan","sequence":"additional","affiliation":[{"name":"Beihang University,School of Instrumentation and Optoelectronic Engineering,Beijing,China"}]},{"given":"Junhua","family":"Tong","sequence":"additional","affiliation":[{"name":"Zhejiang Sci-Tech University,School of Mechanical Engineering,Zhejiang,China"}]},{"given":"Jingchun","family":"Cheng","sequence":"additional","affiliation":[{"name":"Beihang University,School of Instrumentation and Optoelectronic Engineering,Beijing,China"}]},{"given":"Jiajie","family":"Song","sequence":"additional","affiliation":[{"name":"Beihang University,School of Instrumentation and Optoelectronic Engineering,Beijing,China"}]},{"given":"Luyue","family":"He","sequence":"additional","affiliation":[{"name":"Beihang University,School of Instrumentation and Optoelectronic Engineering,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.61173\/1xfrez14"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/icassp40776.2020.9053228"},{"article-title":"Inception-v4, Inception-ResNet and the impact of residual connections on learning","year":"2016","author":"Szegedy","key":"ref3"},{"article-title":"EfficientNet: Rethinking model scaling for convolutional neural networks","year":"2019","author":"Tan","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2024.3404112"},{"issue":"3","key":"ref6","first-page":"60","article-title":"Model compression for deep neural networks: A survey","volume-title":"Comput.","volume":"12","author":"Li","year":"2023"},{"article-title":"3D point cloud network pruning: When some weights do not matter","year":"2024","author":"Biswas","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/330"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/isspit.2018.8705095"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36708-4_15"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-020-00867-8"},{"article-title":"Deep compression: Compressing deep neural network with pruning, trained quantization and Huffman coding","year":"2015","author":"Han","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/iecon51785.2023.10311823"},{"article-title":"Iterative activation-based structured pruning","year":"2022","author":"Zhao","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-022-03508-1"},{"article-title":"Scalable neural network compression and pruning using hard clustering and L1 regularization","year":"2018","author":"Yang","key":"ref16"},{"article-title":"MPruner: Optimizing neural network size with CKA-based mutual information pruning","year":"2024","author":"Hu","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/icme51207.2021.9428286"},{"volume-title":"Learning multiple layers of features from tiny images","year":"2009","author":"Krizhevsky","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"article-title":"Learning structured sparsity in deep neural networks","year":"2016","author":"Wen","key":"ref21"},{"key":"ref22","article-title":"Structured Bayesian pruning via log-normal multiplicative noise","volume":"30","author":"Neklyudov","year":"2017","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00958"},{"issue":"2","key":"ref24","first-page":"339","article-title":"Variational automatic channel pruning algorithm based on structure optimization for convolutional neural networks","volume":"22","author":"Han","year":"2021","journal-title":"J. Internet Technol."},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00289"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00290"},{"article-title":"Gate Decorator: Global Filter Pruning Method for Accelerating Deep Convolutional Neural Networks","year":"2019","author":"You","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00160"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01203"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3106917"}],"event":{"name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","start":{"date-parts":[[2025,9,17]]},"location":"Sibenik, Croatia","end":{"date-parts":[[2025,9,19]]}},"container-title":["2025 15th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11185059\/11185456\/11185684.pdf?arnumber=11185684","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T05:04:26Z","timestamp":1760072666000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11185684\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,17]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/acit65614.2025.11185684","relation":{},"subject":[],"published":{"date-parts":[[2025,9,17]]}}}