{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:29:35Z","timestamp":1772119775126,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,14]],"date-time":"2018-10-14T00:00:00Z","timestamp":1539475200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,14]]},"DOI":"10.1145\/3239372.3239405","type":"proceedings-article","created":{"date-parts":[[2018,10,4]],"date-time":"2018-10-04T12:21:55Z","timestamp":1538655715000},"page":"312-322","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Robust Hashing for Models"],"prefix":"10.1145","author":[{"given":"Salvador","family":"Mart\u00ednez","sequence":"first","affiliation":[{"name":"CEA List, Paris-Saclay, France"}]},{"given":"S\u00e9bastien","family":"G\u00e9rard","sequence":"additional","affiliation":[{"name":"CEA List, Paris-Saclay, France"}]},{"given":"Jordi","family":"Cabot","sequence":"additional","affiliation":[{"name":"ICREA - UOC, Barcelona, Spain"}]}],"member":"320","published-online":{"date-parts":[[2018,10,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Davide Di Ruscio, Amleto Di Salle, Ludovico Iovino, and Alfonso Pierantonio.","author":"Basciani Francesco","year":"2014","unstructured":"Francesco Basciani , Juri Di Rocco , Davide Di Ruscio, Amleto Di Salle, Ludovico Iovino, and Alfonso Pierantonio. 2014 . MDEForge: an Extensible Web-Based Modeling Platform.. In Cloud-MDE@ MoDELS. 66--75. Francesco Basciani, Juri Di Rocco, Davide Di Ruscio, Amleto Di Salle, Ludovico Iovino, and Alfonso Pierantonio. 2014. MDEForge: an Extensible Web-Based Modeling Platform.. In Cloud-MDE@ MoDELS. 66--75."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-005-0079-0"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the OOPSLA\/GPCE: Best Practices for Model-Driven Software Development workshop, 19th Annual ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications.","author":"B\u00e9zivin Jean","year":"2004","unstructured":"Jean B\u00e9zivin , Fr\u00e9d\u00e9ric Jouault , and Patrick Valduriez . 2004 . On the need for megamodels . In Proceedings of the OOPSLA\/GPCE: Best Practices for Model-Driven Software Development workshop, 19th Annual ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications. Jean B\u00e9zivin, Fr\u00e9d\u00e9ric Jouault, and Patrick Valduriez. 2004. On the need for megamodels. In Proceedings of the OOPSLA\/GPCE: Best Practices for Model-Driven Software Development workshop, 19th Annual ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2050655.2050664"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings. IEEE, 21--29","author":"Broder Andrei Z","year":"1997","unstructured":"Andrei Z Broder . 1997 . On the resemblance and containment of documents. In Compression and Complexity of Sequences 1997 . Proceedings. IEEE, 21--29 . Andrei Z Broder. 1997. On the resemblance and containment of documents. In Compression and Complexity of Sequences 1997. Proceedings. IEEE, 21--29."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2006.27"},{"key":"e_1_3_2_1_7_1","first-page":"29","article-title":"Model differences in the eclipse modeling framework. UPGRADE","volume":"9","author":"Brun C\u00e9dric","year":"2008","unstructured":"C\u00e9dric Brun and Alfonso Pierantonio . 2008 . Model differences in the eclipse modeling framework. UPGRADE , The European Journal for the Informatics Professional 9 , 2 (2008), 29 -- 34 . C\u00e9dric Brun and Alfonso Pierantonio. 2008. Model differences in the eclipse modeling framework. UPGRADE, The European Journal for the Informatics Professional 9, 2 (2008), 29--34.","journal-title":"The European Journal for the Informatics Professional"},{"key":"e_1_3_2_1_8_1","volume-title":"d.}. EMF Diff\/Merge","author":"Constant O","year":"2012","unstructured":"O Constant . {n. d.}. EMF Diff\/Merge , 2012 . ({n. d.}). O Constant. {n. d.}. EMF Diff\/Merge, 2012. ({n. d.})."},{"key":"e_1_3_2_1_9_1","volume-title":"Signal Processing Conference","author":"Coskun Baris","year":"2004","unstructured":"Baris Coskun and Bulent Sankur . 2004 . Robust video hash extraction . In Signal Processing Conference , 2004 12th European. IEEE, 2295--2298. Baris Coskun and Bulent Sankur. 2004. Robust video hash extraction. In Signal Processing Conference, 2004 12th European. IEEE, 2295--2298."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.855414"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87875-9_24"},{"key":"e_1_3_2_1_13_1","volume-title":"Cryptography and computer privacy. Scientific american 228, 5","author":"Feistel Horst","year":"1973","unstructured":"Horst Feistel . 1973. Cryptography and computer privacy. Scientific american 228, 5 ( 1973 ), 15--23. Horst Feistel. 1973. Cryptography and computer privacy. Scientific american 228, 5 (1973), 15--23."},{"key":"e_1_3_2_1_14_1","volume-title":"Information Technology: Coding and Computing, 2000. Proceedings. International Conference on. IEEE, 178--183","author":"Fridrich Jiri","year":"2000","unstructured":"Jiri Fridrich and Miroslav Goljan . 2000 . Robust hash functions for digital watermarking . In Information Technology: Coding and Computing, 2000. Proceedings. International Conference on. IEEE, 178--183 . Jiri Fridrich and Miroslav Goljan. 2000. Robust hash functions for digital watermarking. In Information Technology: Coding and Computing, 2000. Proceedings. International Conference on. IEEE, 178--183."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40064-016-3639-6"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02674-4_11"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2011.10.1.a11"},{"key":"e_1_3_2_1_19_1","volume-title":"Workshop on Intelligent Signal Processing","volume":"17","author":"Ledeczi Akos","year":"2001","unstructured":"Akos Ledeczi , Miklos Maroti , Arpad Bakay , Gabor Karsai , Jason Garrett , Charles Thomason , Greg Nordstrom , Jonathan Sprinkle , and Peter Volgyesi . 2001 . The generic modeling environment . In Workshop on Intelligent Signal Processing , Budapest, Hungary , Vol. 17 . 1. Akos Ledeczi, Miklos Maroti, Arpad Bakay, Gabor Karsai, Jason Garrett, Charles Thomason, Greg Nordstrom, Jonathan Sprinkle, and Peter Volgyesi. 2001. The generic modeling environment. In Workshop on Intelligent Signal Processing, Budapest, Hungary, Vol. 17. 1."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2012.04.015"},{"key":"e_1_3_2_1_21_1","volume-title":"Mining of massive datasets","author":"Leskovec Jure","unstructured":"Jure Leskovec , Anand Rajaraman , and Jeffrey David Ullman . 2014. Mining of massive datasets . Cambridge university press . Jure Leskovec, Anand Rajaraman, and Jeffrey David Ullman. 2014. Mining of massive datasets. Cambridge university press."},{"key":"e_1_3_2_1_22_1","first-page":"1072","article-title":"A robust image hashing algorithm resistant against geometrical attacks","volume":"22","author":"Liu YuLing","year":"2013","unstructured":"YuLing Liu and Yong Xiao . 2013 . A robust image hashing algorithm resistant against geometrical attacks . Radio Eng 22 , 4 (2013), 1072 -- 1081 . YuLing Liu and Yong Xiao. 2013. A robust image hashing algorithm resistant against geometrical attacks. Radio Eng 22, 4 (2013), 1072--1081.","journal-title":"Radio Eng"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2841020"},{"key":"e_1_3_2_1_24_1","volume-title":"A blockchain-based approach for data accountability and provenance tracking. arXiv preprint arXiv:1706.04507","author":"Neisse Ricardo","year":"2017","unstructured":"Ricardo Neisse , Gary Steri , and Igor Nai-Fovino . 2017. A blockchain-based approach for data accountability and provenance tracking. arXiv preprint arXiv:1706.04507 ( 2017 ). Ricardo Neisse, Gary Steri, and Igor Nai-Fovino. 2017. A blockchain-based approach for data accountability and provenance tracking. arXiv preprint arXiv:1706.04507 (2017)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41533-3_31"},{"key":"e_1_3_2_1_26_1","unstructured":"Fernando Gomes Papi Jomi Fred H\u00fcbner and Maiquel de Brito. {n. d.}. Instrumenting Accountability in MAS with Blockchain. Accountability and Responsibility in Multiagent Systems ({n.d.}) 20.  Fernando Gomes Papi Jomi Fred H\u00fcbner and Maiquel de Brito. {n. d.}. Instrumenting Accountability in MAS with Blockchain. Accountability and Responsibility in Multiagent Systems ({n.d.}) 20."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070528"},{"key":"e_1_3_2_1_28_1","volume-title":"Aspect Oriented Modeling (AOM) Workshop.","author":"Reddy Raghu","year":"2005","unstructured":"Raghu Reddy , Robert France , Sudipto Ghosh , Franck Fleurey , and Benoit Baudry . 2005 . Model composition-a signature-based approach . In Aspect Oriented Modeling (AOM) Workshop. Raghu Reddy, Robert France, Sudipto Ghosh, Franck Fleurey, and Benoit Baudry. 2005. Model composition-a signature-based approach. In Aspect Oriented Modeling (AOM) Workshop."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Ronald Rivest. 1992. The MD5 message-digest algorithm. (1992).  Ronald Rivest. 1992. The MD5 message-digest algorithm. (1992).","DOI":"10.17487\/rfc1321"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487766.2487769"},{"key":"e_1_3_2_1_31_1","volume-title":"Locality-sensitive hashing for finding nearest neighbors {lecture notes}","author":"Slaney Malcolm","year":"2008","unstructured":"Malcolm Slaney and Michael Casey . 2008. Locality-sensitive hashing for finding nearest neighbors {lecture notes} . IEEE Signal processing magazine 25, 2 ( 2008 ), 128--131. Malcolm Slaney and Michael Casey. 2008. Locality-sensitive hashing for finding nearest neighbors {lecture notes}. IEEE Signal processing magazine 25, 2 (2008), 128--131."},{"key":"e_1_3_2_1_32_1","volume-title":"Robust hashing with local models for approximate similarity search","author":"Song Jingkuan","year":"2014","unstructured":"Jingkuan Song , Yi Yang , Xuelong Li , Zi Huang , and Yang Yang . 2014. Robust hashing with local models for approximate similarity search . IEEE transactions on cybernetics 44, 7 ( 2014 ), 1225--1236. Jingkuan Song, Yi Yang, Xuelong Li, Zi Huang, and Yang Yang. 2014. Robust hashing with local models for approximate similarity search. IEEE transactions on cybernetics 44, 7 (2014), 1225--1236."},{"key":"e_1_3_2_1_33_1","volume-title":"Merks","author":"Steinberg David","year":"2009","unstructured":"David Steinberg , Frank Budinsky , Marcelo Paternostro , and Ed Merks . 2009 . EMF : Eclipse Modeling Framework 2.0 ( 2 nd ed.). Addison-Wesley Professional . David Steinberg, Frank Budinsky, Marcelo Paternostro, and Ed Merks. 2009. EMF: Eclipse Modeling Framework 2.0 (2nd ed.). Addison-Wesley Professional.","edition":"2"},{"key":"e_1_3_2_1_34_1","volume-title":"Robust Hash Algorithms for Text","author":"Steinebach Martin","unstructured":"Martin Steinebach , Peter Kl\u00f6ckner , Nils Reimers , Dominik Wienand , and Patrick Wolf . 2013. Robust Hash Algorithms for Text . Springer Berlin Heidelberg , Berlin, Heidelberg , 135--144. Martin Steinebach, Peter Kl\u00f6ckner, Nils Reimers, Dominik Wienand, and Patrick Wolf. 2013. Robust Hash Algorithms for Text. Springer Berlin Heidelberg, Berlin, Heidelberg, 135--144."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-011-0217-9"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54804-8_4"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873601"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.12.062"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2000.899541"}],"event":{"name":"MODELS '18: ACM\/IEEE 21th International Conference on Model Driven Engineering Languages and Systems","location":"Copenhagen Denmark","acronym":"MODELS '18","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 21th ACM\/IEEE International Conference on Model Driven Engineering Languages and Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3239372.3239405","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3239372.3239405","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:19Z","timestamp":1750208899000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3239372.3239405"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,14]]},"references-count":38,"alternative-id":["10.1145\/3239372.3239405","10.1145\/3239372"],"URL":"https:\/\/doi.org\/10.1145\/3239372.3239405","relation":{},"subject":[],"published":{"date-parts":[[2018,10,14]]},"assertion":[{"value":"2018-10-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}