{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:21:42Z","timestamp":1740100902498,"version":"3.37.3"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62106010,61976010,62176011"],"award-info":[{"award-number":["62106010,61976010,62176011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1109\/icme52920.2022.9859788","type":"proceedings-article","created":{"date-parts":[[2022,8,26]],"date-time":"2022-08-26T19:45:18Z","timestamp":1661543118000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Boundary-Guided Probability Hashing"],"prefix":"10.1109","author":[{"given":"Wenjin","family":"Hu","sequence":"first","affiliation":[{"name":"Beijing University of Technology,Faculty of Information Technology,Beijing,China"}]},{"given":"Yukun","family":"Chen","sequence":"additional","affiliation":[{"name":"Beijing University of Technology,Faculty of Information Technology,Beijing,China"}]},{"given":"Lifang","family":"Wu","sequence":"additional","affiliation":[{"name":"Beijing University of Technology,Faculty of Information Technology,Beijing,China"}]},{"given":"Ge","family":"Shi","sequence":"additional","affiliation":[{"name":"Beijing University of Technology,Faculty of Information Technology,Beijing,China"}]},{"given":"Meng","family":"Jian","sequence":"additional","affiliation":[{"name":"Beijing University of Technology,Faculty of Information Technology,Beijing,China"}]},{"given":"Sinuo","family":"Deng","sequence":"additional","affiliation":[{"name":"Beijing University of Technology,Faculty of Information Technology,Beijing,China"}]}],"member":"263","reference":[{"key":"ref10","first-page":"806","article-title":"Greedy hash: Towards fast optimization for accurate hash coding in cnn","author":"su","year":"2018","journal-title":"NeurIPS"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00315"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6248043"},{"key":"ref13","first-page":"1711","article-title":"Feature learning based deep supervised hashing with pairwise labels","author":"li","year":"2016","journal-title":"IJCAI"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.03.093"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2600428.2609600"},{"key":"ref16","first-page":"2479","article-title":"Deep supervised discrete hashing","author":"li","year":"2017","journal-title":"NeurIPS"},{"key":"ref17","first-page":"853","article-title":"Set and rebase: determining the semantic graph connectivity for unsupervised cross-modal hashing","author":"wang","year":"2021","journal-title":"IJCAI"},{"key":"ref18","first-page":"740","article-title":"Microsoft coco: Common objects in context","author":"lin","year":"2014","journal-title":"ECCV"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1646396.1646452"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449825"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01334"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00834"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00134"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10235"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475498"},{"key":"ref2","first-page":"1717","article-title":"Asynchronous teacher guided bit-wise hard mining for online hashing","volume":"35","author":"jin","year":"2021","journal-title":"AAAI"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33018722"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.598"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"ref21","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","volume":"25","author":"krizhevsky","year":"2012","journal-title":"NeurIPS"}],"event":{"name":"2022 IEEE International Conference on Multimedia and Expo (ICME)","start":{"date-parts":[[2022,7,18]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2022,7,22]]}},"container-title":["2022 IEEE International Conference on Multimedia and Expo (ICME)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9859562\/9858923\/09859788.pdf?arnumber=9859788","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T20:25:01Z","timestamp":1663619101000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9859788\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icme52920.2022.9859788","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]}}}