{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T22:59:50Z","timestamp":1772233190133,"version":"3.50.1"},"reference-count":147,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2017,4,4]],"date-time":"2017-04-04T00:00:00Z","timestamp":1491264000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2018,1,31]]},"abstract":"<jats:p>With the rapid development of information storage and networking technologies, quintillion bytes of data are generated every day from social networks, business transactions, sensors, and many other domains. The increasing data volumes impose significant challenges to traditional data analysis tools in storing, processing, and analyzing these extremely large-scale data. For decades, hashing has been one of the most effective tools commonly used to compress data for fast access and analysis, as well as information integrity verification. Hashing techniques have also evolved from simple randomization approaches to advanced adaptive methods considering locality, structure, label information, and data security, for effective hashing. This survey reviews and categorizes existing hashing techniques as a taxonomy, in order to provide a comprehensive view of mainstream hashing techniques for different types of data and applications. The taxonomy also studies the uniqueness of each method and therefore can serve as technique references in understanding the niche of different hashing mechanisms for future development.<\/jats:p>","DOI":"10.1145\/3047307","type":"journal-article","created":{"date-parts":[[2017,4,5]],"date-time":"2017-04-05T12:46:38Z","timestamp":1491396398000},"page":"1-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":139,"title":["Hashing Techniques"],"prefix":"10.1145","volume":"50","author":[{"given":"Lianhua","family":"Chi","sequence":"first","affiliation":[{"name":"IBM Research, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4129-9611","authenticated-orcid":false,"given":"Xingquan","family":"Zhu","sequence":"additional","affiliation":[{"name":"Florida Atlantic University, Boca Raton, FL; Fudan University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2017,4,4]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Austin Appleby. 2008. Murmurhash 2.0.  Austin Appleby. 2008. Murmurhash 2.0."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2003.1211500"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11554868_6"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34931-7_28"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_8"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11502760_3"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(98)00127-5"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_14"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2013.11.039"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02776078"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5539852"},{"key":"e_1_2_1_13_1","volume-title":"Proceedings of the International Conference on Digital Forensics and Cyber Crime. Springer, 167--182","author":"Breitinger Frank","year":"2012"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-168"},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of Compression and Complexity of Sequences","author":"Broder Andrei Z.","year":"1997"},{"key":"e_1_2_1_16_1","volume-title":"ECOH: The elliptic curve only hash. Submission to NIST","author":"Brown Daniel R. L.","year":"2008"},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the 9th Annual ACM Symposium on Theory of Computing. ACM, 106--112","author":"Lawrence Carter J."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/509907.509965"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37453-1_19"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973440.12"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2018618"},{"key":"e_1_2_1_22_1","first-page":"812","article-title":"Near duplicate image detection: Min-hash and tf-idf weighting","volume":"810","author":"Chum Ondrej","year":"2008","journal-title":"BMVC"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/997817.997857"},{"key":"e_1_2_1_24_1","volume-title":"Annual Intl. Cryptology Conf. Springer, 194--203","author":"Boer Bert Den","year":"1991"},{"key":"e_1_2_1_25_1","first-page":"426","article-title":"The art of computer programming","volume":"3","author":"Donald E. Knuth","year":"1999","journal-title":"Sorting and Searching"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2179"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/223784.223812"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00288933"},{"key":"e_1_2_1_29_1","first-page":"45","article-title":"180-1. secure hash standard","volume":"17","author":"PUB","year":"1995","journal-title":"National Institute of Standards and Tech"},{"key":"e_1_2_1_30_1","unstructured":"G. Fowler. 1991. Fowler\/Noll\/Vo (FNV) hash. Retrieved from http:\/\/isthe. com\/chongo\/tech\/comp\/fnv.  G. Fowler. 1991. Fowler\/Noll\/Vo (FNV) hash. Retrieved from http:\/\/isthe. com\/chongo\/tech\/comp\/fnv."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2013.05.033"},{"key":"e_1_2_1_32_1","first-page":"518","article-title":"Similarity search in high dimensions via hashing","volume":"99","author":"Gionis Aristides","year":"1999","journal-title":"VLDB"},{"key":"e_1_2_1_33_1","unstructured":"Yunchao Gong Sanjiv Kumar Vishal Verma and Svetlana Lazebnik. 2012. Angular quantization-based binary codes for fast similarity search. In Advances in Neural Info Processing Systems. 1196--1204.  Yunchao Gong Sanjiv Kumar Vishal Verma and Svetlana Lazebnik. 2012. Angular quantization-based binary codes for fast similarity search. In Advances in Neural Info Processing Systems. 1196--1204."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995432"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_3"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835946"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.378"},{"key":"e_1_2_1_38_1","volume-title":"Proceedings of the 2012 IEEE Conference Computer Vision and Pattern Recognition (CVPR\u201912)","author":"Heo Jae-Pil","year":"2012"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2003.1195989"},{"key":"e_1_2_1_40_1","unstructured":"Paul Hsieh. 2004. Hash functions.  Paul Hsieh. 2004. Hash functions."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/276698.276876"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.80"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.272"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39887-5_11"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(97)00014-8"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88682-2_24"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.57"},{"key":"e_1_2_1_48_1","unstructured":"Jianqiu Ji Jianmin Li Shuicheng Yan Bo Zhang and Qi Tian. 2012. Super-bit locality-sensitive hashing. In Advances in Neural Information Processing Systems. 108--116.  Jianqiu Ji Jianmin Li Shuicheng Yan Bo Zhang and Qi Tian. 2012. Super-bit locality-sensitive hashing. In Advances in Neural Information Processing Systems. 108--116."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2033221"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995709"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2004.1418846"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.24"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS.2012.25"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.128"},{"key":"e_1_2_1_56_1","volume-title":"The Art of Computer Programming: Sorting and Searching","author":"Knuth Donald Ervin"},{"key":"e_1_2_1_57_1","unstructured":"Weihao Kong and Wu-Jun Li. 2012. Isotropic hashing. In Advances in Neural Information Processing Systems. 1646--1654.  Weihao Kong and Wu-Jun Li. 2012. Isotropic hashing. In Advances in Neural Information Processing Systems. 1646--1654."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348293"},{"key":"e_1_2_1_59_1","volume-title":"Proceedings of the 35th International Convention. 1496--1501","author":"Kontak Vanja","year":"2012"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126421"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.06.015"},{"key":"e_1_2_1_62_1","volume-title":"HMAC: Keyed-hashing for message authentication. Informational","author":"Krawczyk Hugo","year":"1997"},{"key":"e_1_2_1_63_1","unstructured":"Brian Kulis and Trevor Darrell. 2009. Learning to hash with binary reconstructive embeddings. In Advances in Neural Information Processing Systems. 1042--1050.  Brian Kulis and Trevor Darrell. 2009. Learning to hash with binary reconstructive embeddings. In Advances in Neural Information Processing Systems. 1042--1050."},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2009.5459466"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.151"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.101"},{"key":"e_1_2_1_67_1","unstructured":"Ping Li Arnd Konig and Wenhao Gui. 2010. B-bit minwise hashing for estimating three-way similarities. In Advances in Neural Information Processing Systems. 1387--1395.  Ping Li Arnd Konig and Wenhao Gui. 2010. B-bit minwise hashing for estimating three-way similarities. In Advances in Neural Information Processing Systems. 1387--1395."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978542.1978566"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772759"},{"key":"e_1_2_1_70_1","volume-title":"Konig","author":"Li Ping","year":"2011"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2012.2199970"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.253"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.317"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.64"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6247912"},{"key":"e_1_2_1_76_1","volume-title":"Proceedings of the 28th International Conference on Machine Learning (ICML\u201911)","author":"Liu Wei","year":"2011"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393347.2396337"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261567"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.5090040104"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2006.302586"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095890.1095919"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2014949"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.225"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_10"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484028.2484162"},{"key":"e_1_2_1_88_1","unstructured":"Sean Moran Victor Lavrenko and Miles Osborne. 2013b. Variable bit quantisation for LSH. In ACL (2). 753--758.  Sean Moran Victor Lavrenko and Miles Osborne. 2013b. Variable bit quantisation for LSH. In ACL (2). 753--758."},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/362851.362882"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13735-012-0003-7"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5540024"},{"key":"e_1_2_1_92_1","volume-title":"Proceedings of the 28th International Conference on Machine Learning (ICML\u201911)","author":"Norouzi Mohammad"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011139631724"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487668"},{"key":"e_1_2_1_95_1","unstructured":"Arash Partow. 2013. General purpose hash function algorithms. Retrieved from http:\/\/www.partow.net\/programming\/hashfunctions.  Arash Partow. 2013. General purpose hash function algorithms. Retrieved from http:\/\/www.partow.net\/programming\/hashfunctions."},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.12.0130"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282280.1282334"},{"key":"e_1_2_1_98_1","unstructured":"Maxim Raginsky and Svetlana Lazebnik. 2009. Locality-sensitive binary codes from shift-invariant kernels. In Advances in Neural Information Processing Systems. 1509--1517.  Maxim Raginsky and Svetlana Lazebnik. 2009. Locality-sensitive binary codes from shift-invariant kernels. In Advances in Neural Information Processing Systems. 1509--1517."},{"key":"e_1_2_1_99_1","volume-title":"Proceedings of the 30th International Conference on Machine Learning. 1328--1336","author":"Rastegari Mohammad","year":"2013"},{"key":"e_1_2_1_100_1","volume-title":"Lesk","author":"Ritchie Dennis M.","year":"1988"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1320"},{"key":"e_1_2_1_102_1","volume-title":"Asif Khan, Jayant Krishnamurthy, Yuncheng Lin, and Leo Reyzin.","author":"Rivest Ronald L.","year":"2008"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008220711840"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15506-2_15"},{"key":"e_1_2_1_105_1","volume-title":"Simhash: Hash-based similarity detection. www.googlecode.com\/sun\/trunk\/paper\/SimHashwithBib.pdf","author":"Sadowski Caitlin","year":"2007"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2008.11.006"},{"key":"e_1_2_1_107_1","volume-title":"Proceedings of the International Conference on Artificial Intelligence and Statistics. 412--419","author":"Salakhutdinov Ruslan","year":"2007"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007614523901"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1996.560425"},{"key":"e_1_2_1_110_1","unstructured":"Gregory Shakhnarovich. 2005. Learning Task-Specific Similarity. Thesis.  Gregory Shakhnarovich. 2005. Learning Task-Specific Similarity. Thesis."},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.5555\/1197919"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2003.1238424"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.205"},{"key":"e_1_2_1_114_1","volume-title":"Exact weighted minwise hashing in constant time. arXiv Preprint arXiv:1602.08393","author":"Shrivastava Anshumali","year":"2016"},{"key":"e_1_2_1_115_1","unstructured":"Anshumali Shrivastava and Ping Li. 2014a. Densifying one permutation hashing via rotation for fast near neighbor search. In ICML. 557--565.  Anshumali Shrivastava and Ping Li. 2014a. Densifying one permutation hashing via rotation for fast near neighbor search. In ICML. 557--565."},{"key":"e_1_2_1_116_1","volume-title":"Improved densification of one permutation hashing. arXiv Preprint arXiv:1406.4784","author":"Shrivastava Anshumali","year":"2014"},{"key":"e_1_2_1_117_1","unstructured":"Anshumali Shrivastava and Ping Li. 2014c. In defense of minhash over simhash. In AISTATS. 886--894.  Anshumali Shrivastava and Ping Li. 2014c. In defense of minhash over simhash. In AISTATS. 886--894."},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701386216"},{"key":"e_1_2_1_119_1","first-page":"123","article-title":"Biocom usp: Tweet sentiment analysis with adaptive boosting ensemble","volume":"2014","author":"Silva N\u00e1dia F. F.","year":"2014","journal-title":"SemEval"},{"key":"e_1_2_1_120_1","unstructured":"Jingkuan Song. 2015. Effective Hashing for Searching Large-scale Multimedia Databases. Thesis.  Jingkuan Song. 2015. Effective Hashing for Searching Large-scale Multimedia Databases. Thesis."},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.907856"},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.103"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2008.4587633"},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5539994"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.5555\/3104322.3104465"},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.48"},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1007\/s101150050009"},{"key":"e_1_2_1_128_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","volume":"2","author":"Wang X.-J.","year":"2006"},{"key":"e_1_2_1_129_1","first-page":"194","article-title":"A quantitative analysis and performance study for similarity-search methods in high-dimensional spaces","volume":"98","author":"Weber Roger","year":"1998","journal-title":"VLDB"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(81)90033-7"},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33715-4_25"},{"key":"e_1_2_1_132_1","unstructured":"Yair Weiss Antonio Torralba and Rob Fergus. 2009. Spectral hashing. In Advances in Neural Information Processing Systems. 1753--1760.  Yair Weiss Antonio Torralba and Rob Fergus. 2009. Spectral hashing. In Advances in Neural Information Processing Systems. 1753--1760."},{"key":"e_1_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.76"},{"key":"e_1_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126424"},{"key":"e_1_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2011.33"},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.142"},{"key":"e_1_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2008.ECP.120"},{"key":"e_1_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2013.66"},{"key":"e_1_2_1_139_1","volume-title":"Proceedings of the 2011 International Conference on Hand-Based Biometrics (ICHB\u201911)","author":"Yue Feng","year":"2011"},{"key":"e_1_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2253321"},{"key":"e_1_2_1_141_1","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence.","author":"Zhang Dongqing","year":"2014"},{"key":"e_1_2_1_142_1","doi-asserted-by":"crossref","volume-title":"Laplacian Co-Hashing of Terms and Documents","author":"Zhang Dell","DOI":"10.1007\/978-3-642-12275-0_51"},{"key":"e_1_2_1_143_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835455"},{"key":"e_1_2_1_144_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2014.2326010"},{"key":"e_1_2_1_145_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35728-2_38"},{"key":"e_1_2_1_146_1","doi-asserted-by":"publisher","DOI":"10.1145\/2600428.2609600"},{"key":"e_1_2_1_147_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339678"},{"key":"e_1_2_1_148_1","volume-title":"Proceedings of the International Workshop on the Theory and Application of Cryptographic Technology. Springer, 81--104","author":"Zheng Yuliang","year":"1992"},{"key":"e_1_2_1_149_1","doi-asserted-by":"publisher","DOI":"10.1145\/2457465.2457469"},{"key":"e_1_2_1_150_1","doi-asserted-by":"publisher","DOI":"10.1145\/2502081.2502107"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3047307","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3047307","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:25Z","timestamp":1750218625000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3047307"}},"subtitle":["A Survey and Taxonomy"],"short-title":[],"issued":{"date-parts":[[2017,4,4]]},"references-count":147,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1,31]]}},"alternative-id":["10.1145\/3047307"],"URL":"https:\/\/doi.org\/10.1145\/3047307","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,4]]},"assertion":[{"value":"2016-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-04-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}