{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:20:40Z","timestamp":1740133240698,"version":"3.37.3"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T00:00:00Z","timestamp":1501545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea within the Ministry of Science, ICT and Future Planning through the Korean Government","doi-asserted-by":"publisher","award":["NRF-2017R1A2A2A05001400"],"award-info":[{"award-number":["NRF-2017R1A2A2A05001400"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004083","name":"Research on Adaptive Machine Learning Technology Development for Intelligent Autonomous Digital Companion, ICT Research, Development Program","doi-asserted-by":"publisher","award":["MSIP\/IITP 2016-0-00563"],"award-info":[{"award-number":["MSIP\/IITP 2016-0-00563"]}],"id":[{"id":"10.13039\/501100004083","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National High Technology Research and Development Program of China","award":["2015AA042305"],"award-info":[{"award-number":["2015AA042305"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Image Process."],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/tip.2017.2695099","type":"journal-article","created":{"date-parts":[[2017,4,18]],"date-time":"2017-04-18T18:28:23Z","timestamp":1492540103000},"page":"3759-3774","source":"Crossref","is-referenced-by-count":1,"title":["Uncorrelated Component Analysis-Based Hashing"],"prefix":"10.1109","volume":"26","author":[{"given":"Sungryull","family":"Sohn","sequence":"first","affiliation":[]},{"given":"Hyunwoo","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7174-7932","authenticated-orcid":false,"given":"Junmo","family":"Kim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/1460096.1460104","article-title":"The MIR flickr retrieval evaluation","author":"huiskes","year":"2008","journal-title":"Proc ACM Int Conf Multimedia Inf Retrieval (MIR)"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"ref33","first-page":"2018","article-title":"Fast structural binary coding","author":"song","year":"2016","journal-title":"Proc Int Joint Conf Artif Intell"},{"key":"ref32","first-page":"3419","article-title":"Discrete graph hashing","author":"liu","year":"2014","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref31","first-page":"1","article-title":"Hashing with graphs","author":"liu","year":"2011","journal-title":"Proc 28th Int Conf Mach Learn (ICML)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.253"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2013.6607451"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2006.870353"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.48"},{"key":"ref34","first-page":"236","article-title":"Supervised hashing via uncorrelated component analysis","author":"sohn","year":"2016","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.553"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1141911.1141964"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2360856"},{"key":"ref12","first-page":"1061","article-title":"Hamming distance metric learning","author":"norouzi","year":"2012","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.223"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DCC.2015.85"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.379"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.378"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.57"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.274"},{"key":"ref19","first-page":"2957","article-title":"Spherical hashing","author":"heo","year":"2012","journal-title":"Proc IEEE Conf Comput Vis Pattern Recognit (CVPR)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835455"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.103"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2636870"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995432"},{"key":"ref6","first-page":"2874","article-title":"Locality preserving hashing","author":"zhao","year":"2014","journal-title":"Proc 28th AAAI Conf Artif Intell Montreal"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.317"},{"key":"ref5","first-page":"353","article-title":"Minimal loss hashing for compact binary codes","author":"norouzi","year":"2011","journal-title":"Proc 28th Int Conf Mach Learn (ICML-11)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2540990"},{"key":"ref7","first-page":"946","article-title":"Circulant binary embedding","volume":"6","author":"yu","year":"2014","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref2","first-page":"1753","article-title":"Spectral hashing","author":"weiss","year":"2008","journal-title":"Proc Adv Neural Inf Process Syst"},{"journal-title":"Compact Hyperplane Hashing With Bilinear Functions","year":"2012","author":"liu","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/276698.276876"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2474742"},{"key":"ref22","first-page":"64","article-title":"Adaptive binary quantization for fast nearest neighbor search","author":"li","year":"2009","journal-title":"Proc ECAI"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.388"},{"key":"ref42","first-page":"2058","article-title":"QsRank: Query-sensitive hash code ranking for efficient $\\epsilon $ -neighbor search","author":"zhang","year":"2012","journal-title":"Proc IEEE Conf Comput Vis Pattern Recognit (CVPR)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.219"},{"journal-title":"Very Deep Convolutional Networks for Large-scale Image Recognition","year":"2014","author":"simonyan","key":"ref41"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.09.033"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298598"},{"key":"ref43","first-page":"512","author":"eaton","year":"1983","journal-title":"Multivariate Statistics A Vector Space Approach"},{"key":"ref25","first-page":"2074","article-title":"Supervised hashing with kernels","author":"liu","year":"2012","journal-title":"Proc IEEE Conf Comput Vis Pattern Recognit (CVPR)"}],"container-title":["IEEE Transactions on Image Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/83\/7935144\/07903624.pdf?arnumber=7903624","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:14:38Z","timestamp":1642004078000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7903624\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":43,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tip.2017.2695099","relation":{},"ISSN":["1057-7149","1941-0042"],"issn-type":[{"type":"print","value":"1057-7149"},{"type":"electronic","value":"1941-0042"}],"subject":[],"published":{"date-parts":[[2017,8]]}}}