{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:29:02Z","timestamp":1772908142321,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,7,19]],"date-time":"2018-07-19T00:00:00Z","timestamp":1531958400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation of China","award":["61572463"],"award-info":[{"award-number":["61572463"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,7,19]]},"DOI":"10.1145\/3219819.3219955","type":"proceedings-article","created":{"date-parts":[[2018,7,19]],"date-time":"2018-07-19T13:05:12Z","timestamp":1532005512000},"page":"1485-1493","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["R 2 SDH"],"prefix":"10.1145","author":[{"given":"Jie","family":"Gui","sequence":"first","affiliation":[{"name":"Rutgers University, Piscataway, NJ, USA"}]},{"given":"Ping","family":"Li","sequence":"additional","affiliation":[{"name":"Baidu Research, Bellevue, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,7,19]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1162\/089976603321780317"},{"key":"e_1_3_2_2_2_1","unstructured":"Andrei Z. Broder . 1997. On the Resemblance and Containment of Documents. In the Compression and Complexity of Sequences. Positano Italy 21--29.   Andrei Z. Broder . 1997. On the Resemblance and Containment of Documents. In the Compression and Complexity of Sequences. Positano Italy 21--29."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/276698.276781"},{"key":"e_1_3_2_2_4_1","volume-title":"WWW.","author":"Broder Andrei Z."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2015.2442256"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/509907.509965"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298862"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/227683.227684"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995432"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.193"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2636870"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"Ran He Tieniu Tan Liang Wang and Wei-Shi Zheng . 2012. $l_2 1$ Regularized correntropy for robust feature selection Conference on Computer Vision and Pattern Recognition. 2504--2511.   Ran He Tieniu Tan Liang Wang and Wei-Shi Zheng . 2012. $l_2 1$ Regularized correntropy for robust feature selection Conference on Computer Vision and Pattern Recognition. 2504--2511.","DOI":"10.1109\/CVPR.2012.6247966"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.80"},{"key":"e_1_3_2_2_14_1","unstructured":"Qing-Yuan Jiang and Wu-Jun Li . 2015. Scalable graph hashing with feature transformation International Joint Conference on Artificial Intelligence. 2248--2254.   Qing-Yuan Jiang and Wu-Jun Li . 2015. Scalable graph hashing with feature transformation International Joint Conference on Artificial Intelligence. 2248--2254."},{"key":"e_1_3_2_2_15_1","unstructured":"Brian Kulis and Trevor Darrell . 2009. Learning to hash with binary reconstructive embeddings Neural Information Processing Systems. 1042--1050.   Brian Kulis and Trevor Darrell . 2009. Learning to hash with binary reconstructive embeddings Neural Information Processing Systems. 1042--1050."},{"key":"e_1_3_2_2_16_1","unstructured":"Shaishav Kumar and Raghavendra Udupa . 2011. Learning hash functions for cross-view similarity search International Joint Conference on Artificial Intelligence. 1360--1365.   Shaishav Kumar and Raghavendra Udupa . 2011. Learning hash functions for cross-view similarity search International Joint Conference on Artificial Intelligence. 1360--1365."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783406"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098081"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772759"},{"key":"e_1_3_2_2_20_1","unstructured":"Ping Li Michael Mitzenmacher and Anshumali Shrivastava . 2014. Coding for Random Projections. In ICML.   Ping Li Michael Mitzenmacher and Anshumali Shrivastava . 2014. Coding for Random Projections. In ICML."},{"key":"e_1_3_2_2_21_1","volume-title":"Art B Owen, and Cun-Hui Zhang","author":"Li Ping","year":"2012"},{"key":"e_1_3_2_2_22_1","volume-title":"NIPS.","author":"Li Ping"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.253"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2404776"},{"key":"e_1_3_2_2_25_1","volume-title":"Deep Supervised Hashing for Fast Image Retrieval. In Conference on Computer Vision and Pattern Recognition. 2064--2072","author":"Liu Haomiao","year":"2016"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2007.896065"},{"key":"e_1_3_2_2_27_1","volume-title":"Conference on Computer Vision and Pattern Recognition. 2074--2081","author":"Liu Wei","year":"2012"},{"key":"e_1_3_2_2_28_1","volume-title":"International Conference on Machine Learning. 1--8.","author":"Liu Wei","year":"2011"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.02.034"},{"key":"e_1_3_2_2_30_1","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"van der Maaten Laurens","year":"2008","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_2_32_1","unstructured":"Feiping Nie Heng Huang Xiao Cai and Chris Ding . 2010. Efficient and robust feature selection via joint $l_2 1$-norms minimization Neural Information Processing Systems. 1813--1821.   Feiping Nie Heng Huang Xiao Cai and Chris Ding . 2010. Efficient and robust feature selection via joint $l_2 1$-norms minimization Neural Information Processing Systems. 1813--1821."},{"key":"e_1_3_2_2_33_1","unstructured":"Mohammad Norouzi David J Fleet and Ruslan R Salakhutdinov . 2012. Hamming distance metric learning. In Neural Information Processing Systems. 1061--1069.   Mohammad Norouzi David J Fleet and Ruslan R Salakhutdinov . 2012. Hamming distance metric learning. In Neural Information Processing Systems. 1061--1069."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011139631724"},{"key":"e_1_3_2_2_35_1","volume-title":"International Conference on Machine Learning. 1328--1336","author":"Rastegari Mohammad","year":"2013"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2008.11.006"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298598"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.205"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2072298.2072354"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098035"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.103"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.128"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.48"},{"key":"e_1_3_2_2_44_1","unstructured":"Yair Weiss Antonio Torralba and Rob Fergus . 2009. Spectral hashing. In Neural Information Processing Systems. 1753--1760.   Yair Weiss Antonio Torralba and Rob Fergus . 2009. Spectral hashing. In Neural Information Processing Systems. 1753--1760."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2009916.2009950"}],"event":{"name":"KDD '18: The 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","location":"London United Kingdom","acronym":"KDD '18","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3219819.3219955","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3219819.3219955","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:21Z","timestamp":1750212441000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3219819.3219955"}},"subtitle":["Robust Rotated Supervised Discrete Hashing"],"short-title":[],"issued":{"date-parts":[[2018,7,19]]},"references-count":44,"alternative-id":["10.1145\/3219819.3219955","10.1145\/3219819"],"URL":"https:\/\/doi.org\/10.1145\/3219819.3219955","relation":{},"subject":[],"published":{"date-parts":[[2018,7,19]]},"assertion":[{"value":"2018-07-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}