{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:24Z","timestamp":1750221264239,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,23]],"date-time":"2017-10-23T00:00:00Z","timestamp":1508716800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61671274"],"award-info":[{"award-number":["61671274"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,23]]},"DOI":"10.1145\/3132734.3132738","type":"proceedings-article","created":{"date-parts":[[2017,10,20]],"date-time":"2017-10-20T19:24:32Z","timestamp":1508527472000},"page":"17-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["UFvH"],"prefix":"10.1145","author":[{"given":"Xiushan","family":"Nie","sequence":"first","affiliation":[{"name":"Shandong University of Finance and Economics, Jinan, China"}]},{"given":"Xiaoyu","family":"Li","sequence":"additional","affiliation":[{"name":"Shandong University of Finance and Economics, Jinan, China"}]},{"given":"Jiande","family":"Sun","sequence":"additional","affiliation":[{"name":"Shandong Normal University, Jinan, China"}]},{"given":"Yilong","family":"Yin","sequence":"additional","affiliation":[{"name":"Shandong University, Jinan, China"}]}],"member":"320","published-online":{"date-parts":[[2017,10,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2006.49"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293348"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/361002.361007"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-012-1269-8"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2006.884614"},{"key":"e_1_3_2_1_6_1","unstructured":"Yunchao Gong Sanjiv Kumar Vishal Verma and Svetlana Lazebnik. 2012. Angular quantization-based binary codes for fast similarity search. In Advances in neural information processing systems. 1196--1204.   Yunchao Gong Sanjiv Kumar Vishal Verma and Svetlana Lazebnik. 2012. Angular quantization-based binary codes for fast similarity search. In Advances in neural information processing systems. 1196--1204."},{"key":"e_1_3_2_1_7_1","first-page":"194","article-title":"Comparison of sequence matching techniques for video copy detection","volume":"4676","author":"Hampapur Arun","year":"2002","unstructured":"Arun Hampapur , Kiho Hyun , and Ruud M. Bolle . 2002 . Comparison of sequence matching techniques for video copy detection . In Storage and Retrieval for Media Databases , Vol. 4676. 194 -- 201 . Arun Hampapur, Kiho Hyun, and Ruud M. Bolle. 2002. Comparison of sequence matching techniques for video copy detection. In Storage and Retrieval for Media Databases, Vol. 4676. 194--201.","journal-title":"Storage and Retrieval for Media Databases"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2610324"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.57"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2012.189"},{"key":"e_1_3_2_1_11_1","unstructured":"Qing-Yuan Jiang and Wu-Jun Li. 2015. Scalable Graph Hashing with Feature Transformation. In IJCAI. 2248--2254.   Qing-Yuan Jiang and Wu-Jun Li. 2015. Scalable Graph Hashing with Feature Transformation. In IJCAI. 2248--2254."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2006.886278"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2435740"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2004.836751(410) 1"},{"key":"e_1_3_2_1_15_1","first-page":"5","article-title":"Double-Bit Quantization for Hashing","volume":"1","author":"Kong Weihao","year":"2012","unstructured":"Weihao Kong and Wu-Jun Li . 2012 . Double-Bit Quantization for Hashing . In AAAI , Vol. 1. 5 . Weihao Kong and Wu-Jun Li. 2012. Double-Bit Quantization for Hashing. In AAAI, Vol. 1. 5.","journal-title":"AAAI"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.188"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.920739"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2206036"},{"key":"e_1_3_2_1_19_1","volume-title":"copy detection with visual-audio feature fusion and sequential pyramid matching. online www:nlpir.nist.gov\/projects\/tvpubs\/tv.pubs.org. html","author":"Li Yuanning","year":"2010","unstructured":"Yuanning Li , Luntian Mou , Menglin Jiang , Chi Su , Xiaoyu Fang , Mengren Qian , Yonghong Tian , Yaowei Wang , Tiejun Huang , and Wen Gao . 2010. PKU-IDM@ TREC Vid 2010 : copy detection with visual-audio feature fusion and sequential pyramid matching. online www:nlpir.nist.gov\/projects\/tvpubs\/tv.pubs.org. html ( 2010 ). Yuanning Li, Luntian Mou, Menglin Jiang, Chi Su, Xiaoyu Fang, Mengren Qian, Yonghong Tian, Yaowei Wang, Tiejun Huang, and Wen Gao. 2010. PKU-IDM@ TRECVid 2010: copy detection with visual-audio feature fusion and sequential pyramid matching. online www:nlpir.nist.gov\/projects\/tvpubs\/tv.pubs.org. html (2010)."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 28th international conference on machine learning (ICML-11)","author":"Liu Wei","year":"2011","unstructured":"Wei Liu , Jun Wang , Sanjiv Kumar , and Shih-Fu Chang . 2011 . Hashing with graphs . In Proceedings of the 28th international conference on machine learning (ICML-11) . 1--8. Wei Liu, Jun Wang, Sanjiv Kumar, and Shih-Fu Chang. 2011. Hashing with graphs. In Proceedings of the 28th international conference on machine learning (ICML-11). 1--8."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2013.2287006"},{"key":"e_1_3_2_1_22_1","volume-title":"The proceedings of the seventh IEEE international conference on","volume":"2","author":"Lowe David G.","year":"1999","unstructured":"David G. Lowe . 1999 . Object recognition from local scaleinvariant features. In Computer vision, 1999 . The proceedings of the seventh IEEE international conference on , Vol. 2 . Ieee, 1150--1157. David G. Lowe. 1999. Object recognition from local scaleinvariant features. In Computer vision, 1999. The proceedings of the seventh IEEE international conference on, Vol. 2. Ieee, 1150--1157."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"e_1_3_2_1_24_1","unstructured":"Sean Moran Victor Lavrenko and Miles Osborne. 2013. Variable Bit Quantisation for LSH. In ACL (2). 753--758.  Sean Moran Victor Lavrenko and Miles Osborne. 2013. Variable Bit Quantisation for LSH. In ACL (2). 753--758."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2542205.2542208"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-016-5528-6"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-012-4760-y"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-012-1341-4"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.988962"},{"key":"e_1_3_2_1_30_1","volume-title":"Conference on Data Mining and Data Warehouses (SiKDD","author":"Rupnik Jan","year":"2010","unstructured":"Jan Rupnik and John Shawe-Taylor . 2010 . Multi-view canonical correlation analysis . In Conference on Data Mining and Data Warehouses (SiKDD 2010). 1--4. Jan Rupnik and John Shawe-Taylor. 2010. Multi-view canonical correlation analysis. In Conference on Data Mining and Data Warehouses (SiKDD 2010). 1--4."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1873951.1874021"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298598"},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 33rd international conference on Very large data bases. VLDB Endowment, 1374--1377","author":"Shen Heng Tao","year":"2007","unstructured":"Heng Tao Shen , Xiaofang Zhou , Zi Huang , Jie Shao , and Xiangmin Zhou . 2007 . UQLIPS: a real-time near-duplicate video clip detection system . In Proceedings of the 33rd international conference on Very large data bases. VLDB Endowment, 1374--1377 . Heng Tao Shen, Xiaofang Zhou, Zi Huang, Jie Shao, and Xiangmin Zhou. 2007. UQLIPS: a real-time near-duplicate video clip detection system. In Proceedings of the 33rd international conference on Very large data bases. VLDB Endowment, 1374--1377."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2013.2271746"},{"key":"e_1_3_2_1_35_1","volume-title":"Satisfying general proximity\/similarity queries with metric trees. Information processing letters 40, 4","author":"Uhlmann Jeffrey K.","year":"1991","unstructured":"Jeffrey K. Uhlmann . 1991. Satisfying general proximity\/similarity queries with metric trees. Information processing letters 40, 4 ( 1991 ), 175--179. Jeffrey K. Uhlmann. 1991. Satisfying general proximity\/similarity queries with metric trees. Information processing letters 40, 4 (1991), 175--179."},{"key":"e_1_3_2_1_36_1","volume-title":"Heng Tao Shen, and others","author":"Wang Jingdong","year":"2017","unstructured":"Jingdong Wang , Ting Zhang , Nicu Sebe , Heng Tao Shen, and others . 2017 . A survey on learning to hash. IEEE Transactions on Pattern Analysis and Machine Intelligence ( 2017). Jingdong Wang, Ting Zhang, Nicu Sebe, Heng Tao Shen, and others. 2017. A survey on learning to hash. IEEE Transactions on Pattern Analysis and Machine Intelligence (2017)."},{"key":"e_1_3_2_1_37_1","unstructured":"Zhe Wang Ling-Yu Duan Jie Lin Xiaofang Wang Tiejun Huang and Wen Gao. 2015. Hamming Compatible Quantization for Hashing. In IJCAI. 2298--2304.   Zhe Wang Ling-Yu Duan Jie Lin Xiaofang Wang Tiejun Huang and Wen Gao. 2015. Hamming Compatible Quantization for Hashing. In IJCAI. 2298--2304."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2011.2105554"},{"key":"e_1_3_2_1_39_1","unstructured":"Yair Weiss Antonio Torralba and Rob Fergus. 2009. Spectral hashing. In Advances in neural information processing systems. 1753--1760.   Yair Weiss Antonio Torralba and Rob Fergus. 2009. Spectral hashing. In Advances in neural information processing systems. 1753--1760."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1291233.1291280"},{"key":"e_1_3_2_1_41_1","volume-title":"A survey on multiview learning. arXiv preprint arXiv:1304.5634","author":"Xu Chang","year":"2013","unstructured":"Chang Xu , Dacheng Tao , and Chao Xu. 2013. A survey on multiview learning. arXiv preprint arXiv:1304.5634 ( 2013 ). Chang Xu, Dacheng Tao, and Chao Xu. 2013. A survey on multiview learning. arXiv preprint arXiv:1304.5634 (2013)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.11.004"},{"key":"e_1_3_2_1_43_1","first-page":"311","article-title":"Data structures and algorithms for nearest neighbor search in general metric spaces","volume":"93","author":"Yianilos Peter N.","year":"1993","unstructured":"Peter N. Yianilos . 1993 . Data structures and algorithms for nearest neighbor search in general metric spaces . In SODA , Vol. 93. 311 -- 321 . Peter N. Yianilos. 1993. Data structures and algorithms for nearest neighbor search in general metric spaces. In SODA, Vol. 93. 311--321.","journal-title":"SODA"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2671188.2749398"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2015.2431496"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2383389"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2562624"},{"key":"e_1_3_2_1_48_1","volume-title":"Unsupervised Topic Hypergraph Hashing for Efficient Mobile Image Retrieval","author":"Zhu Lei","year":"2016","unstructured":"Lei Zhu , Jialie Shen , Liang Xie , and Ran Zheng . 2016. Unsupervised Topic Hypergraph Hashing for Efficient Mobile Image Retrieval . IEEE Transactions on Cybernetics ( 2016 ), 1--14. Lei Zhu, Jialie Shen, Liang Xie, and Ran Zheng. 2016. Unsupervised Topic Hypergraph Hashing for Efficient Mobile Image Retrieval. IEEE Transactions on Cybernetics (2016), 1--14."}],"event":{"name":"MM '17: ACM Multimedia Conference","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Mountain View California USA","acronym":"MM '17"},"container-title":["Proceedings of the Workshop on Visual Analysis in Smart and Connected Communities"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132734.3132738","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3132734.3132738","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:10:56Z","timestamp":1750212656000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132734.3132738"}},"subtitle":["Unified Feature Video Hashing for Near-Duplicate Video Retrieval"],"short-title":[],"issued":{"date-parts":[[2017,10,23]]},"references-count":48,"alternative-id":["10.1145\/3132734.3132738","10.1145\/3132734"],"URL":"https:\/\/doi.org\/10.1145\/3132734.3132738","relation":{},"subject":[],"published":{"date-parts":[[2017,10,23]]},"assertion":[{"value":"2017-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}