{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T14:02:04Z","timestamp":1768312924198,"version":"3.49.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/cvpr.2015.7298654","type":"proceedings-article","created":{"date-parts":[[2015,10,15]],"date-time":"2015-10-15T18:42:06Z","timestamp":1444934526000},"page":"557-566","source":"Crossref","is-referenced-by-count":67,"title":["Hashing with binary autoencoders"],"prefix":"10.1109","author":[{"given":"Miguel A.","family":"Carreira-Perpinan","sequence":"first","affiliation":[]},{"given":"Ramin","family":"Raziperchikolaei","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835455"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2003.1238361"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.193"},{"key":"ref11","first-page":"2957","article-title":"Spherical hashing","author":"heo","year":"2012","journal-title":"Proc of the 2012 IEEE Computer Society Conf Computer Vision and Pattern Recognition (CVPR'12)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.57"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-006-0012-5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5725-8_3"},{"key":"ref15","article-title":"Learning multiple layers of features from tiny images","volume":"8","author":"krizhevsky","year":"2009"},{"key":"ref16","first-page":"1042","article-title":"Learning to hash with binary reconstructive embeddings","volume":"22","author":"kulis","year":"2009"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.219"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.253"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.317"},{"key":"ref28","first-page":"1753","article-title":"Spectral hashing","volume":"21","author":"weiss","year":"2009"},{"key":"ref4","article-title":"An ADMM algorithm for solving a proximal bound-constrained quadratic program","volume":"29","author":"carrcira-perpifian","year":"2014","journal-title":"arXiv 1412 8493 [math OC]"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2008.4587633"},{"key":"ref3","first-page":"167","article-title":"The elastic embedding algorithm for dimensionality reduction","author":"carreira-perpifian","year":"2010","journal-title":"Proc 27th Int Conf Mach Learn (ICML 2010)"},{"key":"ref6","first-page":"10","article-title":"Distributed optimization of deeply nested systems","author":"carreira-perpifian","year":"2014","journal-title":"Proc of the 17th Int Conf Artificial Intelligence and Statistics (AISTATS 2014)"},{"key":"ref29","first-page":"223","article-title":"On principal components and least square methods of factor analysis","volume":"36","author":"whittle","year":"1952","journal-title":"Skand Aktur Tidskr"},{"key":"ref5","article-title":"Distributed optimization of deeply nested systems","volume":"24","author":"carreira-perpifian","year":"2012","journal-title":"arXiv 1212 5921 [cs LG]"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/978-1-4419-9569-8_10","article-title":"Proximal splitting methods in signal processing","author":"combettes","year":"2011","journal-title":"Fixed-Point Algorithms For Inverse Problems in Science and Engineering"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1646396.1646452"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1137\/S1052623498336930"},{"key":"ref9","first-page":"1871","article-title":"LIB LINEAR: A library for large linear classification","volume":"9","author":"fan","year":"2008","journal-title":"J Machine Learning Research"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327494"},{"key":"ref20","first-page":"1","article-title":"Hashing with graphs","author":"liu","year":"2011","journal-title":"Proc 28th Int Conf Machine Learn (ICML-11)"},{"key":"ref22","article-title":"Numerical Optimization","author":"nocedal","year":"2006","journal-title":"Springer Series in Operations Research and Financial Engineering"},{"key":"ref21","first-page":"2823","article-title":"The power of asymmetry in binary hashing","volume":"26","author":"neyshabur","year":"2013","journal-title":"Advances in Neural Information Processing Systems (NIPS)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011139631724"},{"key":"ref23","article-title":"Minimal loss hashing for compact binary codes","author":"orouzi","year":"2011","journal-title":"Proc 28th Int Conf Machine Learn (ICML-11)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2008.11.006"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1137\/0314056"}],"event":{"name":"2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","location":"Boston, MA, USA","start":{"date-parts":[[2015,6,7]]},"end":{"date-parts":[[2015,6,12]]}},"container-title":["2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7293313\/7298593\/07298654.pdf?arnumber=7298654","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T17:24:31Z","timestamp":1498238671000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7298654\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/cvpr.2015.7298654","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}