{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:32:08Z","timestamp":1750221128612,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T00:00:00Z","timestamp":1559692800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the National Natural Science Foundation of China under Grants","award":["U1611264 U181126161602530 61772567 U1811262 U1711262 and U1"],"award-info":[{"award-number":["U1611264 U181126161602530 61772567 U1811262 U1711262 and U1"]}]},{"name":"the Research Foundation of Science and Technology Plan Project in Guangdong Province","award":["2017B030308007"],"award-info":[{"award-number":["2017B030308007"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,5]]},"DOI":"10.1145\/3323873.3325016","type":"proceedings-article","created":{"date-parts":[[2019,6,10]],"date-time":"2019-06-10T12:10:58Z","timestamp":1560168658000},"page":"123-131","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Deep Policy Hashing Network with Listwise Supervision"],"prefix":"10.1145","author":[{"given":"Shaoying","family":"Wang","sequence":"first","affiliation":[{"name":"Sun Yat-Sen University, Guangzhou, China"}]},{"given":"Hanjiang","family":"Lai","sequence":"additional","affiliation":[{"name":"Sun Yat-Sen University, Guangzhou, China"}]},{"given":"Yifan","family":"Yang","sequence":"additional","affiliation":[{"name":"Sun Yat-Sen University, Guangzhou, China"}]},{"given":"Jian","family":"Yin","sequence":"additional","affiliation":[{"name":"Sun Yat-Sen University, Guangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2019,6,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.598"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1646396.1646452"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298862"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/645925.671516"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.193"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2678475"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460096.1460104"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the Advances in neural information processing systems. 1042--1050","author":"Kulis Brian","year":"2009","unstructured":"Brian Kulis and Trevor Darrell . 2009 . Learning to hash with binary reconstructive embeddings . In Proceedings of the Advances in neural information processing systems. 1042--1050 . Brian Kulis and Trevor Darrell. 2009. Learning to hash with binary reconstructive embeddings. In Proceedings of the Advances in neural information processing systems. 1042--1050."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298947"},{"key":"e_1_3_2_1_10_1","volume-title":"Feature learning based deep supervised hashing with pairwise labels. arXiv preprint arXiv:1511.03855","author":"Li Wu-Jun","year":"2015","unstructured":"Wu-Jun Li , Sheng Wang , and Wang-Cheng Kang . 2015. Feature learning based deep supervised hashing with pairwise labels. arXiv preprint arXiv:1511.03855 ( 2015 ). Wu-Jun Li, Sheng Wang, and Wang-Cheng Kang. 2015. Feature learning based deep supervised hashing with pairwise labels. arXiv preprint arXiv:1511.03855 (2015)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.227"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. IEEE","author":"Liu Wei","year":"2012","unstructured":"Wei Liu , Jun Wang , Rongrong Ji , Yu-Gang Jiang , and Shih-Fu Chang . 2012 . Supervised hashing with kernels . In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. IEEE , 2074--2081. Wei Liu, Jun Wang, Rongrong Ji, Yu-Gang Jiang, and Shih-Fu Chang. 2012. Supervised hashing with kernels. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. IEEE, 2074--2081."},{"key":"e_1_3_2_1_13_1","volume-title":"International conference on machine learning. 1928--1937","author":"Mnih Volodymyr","year":"2016","unstructured":"Volodymyr Mnih , Adria Puigdomenech Badia , Mehdi Mirza , Alex Graves , Timothy Lillicrap , Tim Harley , David Silver , and Koray Kavukcuoglu . 2016 . Asynchronous methods for deep reinforcement learning . In International conference on machine learning. 1928--1937 . Volodymyr Mnih, Adria Puigdomenech Badia, Mehdi Mirza, Alex Graves, Timothy Lillicrap, Tim Harley, David Silver, and Koray Kavukcuoglu. 2016. Asynchronous methods for deep reinforcement learning. In International conference on machine learning. 1928--1937."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 28th international conference on machine learning. Citeseer, 353--360","author":"Norouzi Mohammad","year":"2011","unstructured":"Mohammad Norouzi and David M Blei . 2011 . Minimal loss hashing for compact binary codes . In Proceedings of the 28th international conference on machine learning. Citeseer, 353--360 . Mohammad Norouzi and David M Blei. 2011. Minimal loss hashing for compact binary codes. In Proceedings of the 28th international conference on machine learning. Citeseer, 353--360."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33783-3_63"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123266.3123345"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298598"},{"key":"e_1_3_2_1_19_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman . 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 ( 2014 ). Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)."},{"key":"e_1_3_2_1_20_1","unstructured":"Richard S Sutton and Andrew G Barto. 2011. Reinforcement learning: An introduction. (2011).   Richard S Sutton and Andrew G Barto. 2011. Reinforcement learning: An introduction. (2011)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3094243.3094257"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2487976"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.377"},{"key":"e_1_3_2_1_24_1","volume-title":"Heng Tao Shen, et almbox","author":"Wang Jingdong","year":"2017","unstructured":"Jingdong Wang , Ting Zhang , Nicu Sebe , Heng Tao Shen, et almbox . 2017 . A survey on learning to hash. IEEE Transactions on Pattern Analysis and Machine Intelligence ( 2017). Jingdong Wang, Ting Zhang, Nicu Sebe, Heng Tao Shen, et almbox. 2017. A survey on learning to hash. IEEE Transactions on Pattern Analysis and Machine Intelligence (2017)."},{"key":"e_1_3_2_1_25_1","unstructured":"Yair Weiss Antonio Torralba and Rob Fergus. 2009. Spectral hashing. In Advances in neural information processing systems. 1753--1760.   Yair Weiss Antonio Torralba and Rob Fergus. 2009. Spectral hashing. In Advances in neural information processing systems. 1753--1760."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992696"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00919"},{"key":"e_1_3_2_1_28_1","first-page":"2","article-title":"Supervised hashing for image retrieval via image representation learning","volume":"1","author":"Xia Rongkai","year":"2014","unstructured":"Rongkai Xia , Yan Pan , Hanjiang Lai , Cong Liu , and Shuicheng Yan . 2014 . Supervised hashing for image retrieval via image representation learning .. In Proceedings of the Association for the Advancement of Artificial Intelligence , Vol. 1. 2 . Rongkai Xia, Yan Pan, Hanjiang Lai, Cong Liu, and Shuicheng Yan. 2014. Supervised hashing for image retrieval via image representation learning.. In Proceedings of the Association for the Advancement of Artificial Intelligence, Vol. 1. 2.","journal-title":"Proceedings of the Association for the Advancement of Artificial Intelligence"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2666812"},{"key":"e_1_3_2_1_30_1","volume-title":"Deep Reinforcement Learning for Image Hashing. arXiv preprint arXiv:1802.02904","author":"Zhang Jian","year":"2018","unstructured":"Jian Zhang , Yuxin Peng , and Zhaoda Ye. 2018. Deep Reinforcement Learning for Image Hashing. arXiv preprint arXiv:1802.02904 ( 2018 ). Jian Zhang, Yuxin Peng, and Zhaoda Ye. 2018. Deep Reinforcement Learning for Image Hashing. arXiv preprint arXiv:1802.02904 (2018)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2502081.2502091"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01267-0_36"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10235"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.641"}],"event":{"name":"ICMR '19: International Conference on Multimedia Retrieval","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Ottawa ON Canada","acronym":"ICMR '19"},"container-title":["Proceedings of the 2019 on International Conference on Multimedia Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3323873.3325016","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3323873.3325016","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:22Z","timestamp":1750208542000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3323873.3325016"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,5]]},"references-count":34,"alternative-id":["10.1145\/3323873.3325016","10.1145\/3323873"],"URL":"https:\/\/doi.org\/10.1145\/3323873.3325016","relation":{},"subject":[],"published":{"date-parts":[[2019,6,5]]},"assertion":[{"value":"2019-06-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}