{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:23:46Z","timestamp":1773156226162,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":98,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T00:00:00Z","timestamp":1729468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202438"],"award-info":[{"award-number":["62202438"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Natural Science Foundation of China","award":["62176243"],"award-info":[{"award-number":["62176243"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,21]]},"DOI":"10.1145\/3627673.3679555","type":"proceedings-article","created":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T19:34:21Z","timestamp":1729452861000},"page":"175-186","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Hypergraph Hash Learning for Efficient Trajectory Similarity Computation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1445-8210","authenticated-orcid":false,"given":"Yuan","family":"Cao","sequence":"first","affiliation":[{"name":"Computer Science and Technology, Ocean University of China, Qingdao, Shandong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-1164-2129","authenticated-orcid":false,"given":"Lei","family":"Li","sequence":"additional","affiliation":[{"name":"Computer Science and Technology, Ocean University of China, Qingdao, Shandong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4993-9345","authenticated-orcid":false,"given":"Xiangru","family":"Chen","sequence":"additional","affiliation":[{"name":"Computer Science and Technology, Ocean University of China, Qingdao, Shandong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-9976-6157","authenticated-orcid":false,"given":"Xue","family":"Xu","sequence":"additional","affiliation":[{"name":"Computer Science and Technology, Ocean University of China, Qingdao, Shandong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6503-418X","authenticated-orcid":false,"given":"Zuojin","family":"Huang","sequence":"additional","affiliation":[{"name":"Computer Science and Technology, Ocean University of China, Qingdao, Shandong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5924-1410","authenticated-orcid":false,"given":"Yanwei","family":"Yu","sequence":"additional","affiliation":[{"name":"Computer Science and Technology, Ocean University of China, Qingdao, Shandong, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218195995000064"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2010.2048101"},{"key":"e_1_3_2_1_3_1","volume-title":"Jonas Geiping, Quentin Garrido, Pierre Fernandez, Amir Bar, Hamed Pirsiavash, Yann LeCun, and Micah Goldblum.","author":"Balestriero Randall","year":"2023","unstructured":"Randall Balestriero, Mark Ibrahim, Vlad Sobal, Ari S. Morcos, Shashank Shekhar, Tom Goldstein, Florian Bordes, Adrien Bardes, Gr\u00e9goire Mialon, Yuandong Tian, Avi Schwarzschild, Andrew Gordon Wilson, Jonas Geiping, Quentin Garrido, Pierre Fernandez, Amir Bar, Hamed Pirsiavash, Yann LeCun, and Micah Goldblum. 2023. A cookbook of self-supervised learning. arXiv:2304.12210 (2023)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE55515.2023.00224"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012088469-8.50070-X"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012088469-8.50070-X"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066213"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482293"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3107327"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE55515.2023.00069"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i8.28672"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the Advances in Neural Information Processing Systems.","author":"Coll-Vinent Didac Suris","year":"2022","unstructured":"Didac Suris Coll-Vinent and Carl Vondrick. 2022. Representing spatial trajectories as distributions. In Proceedings of the Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413876"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557308"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3035775"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the International Symposium on Computational Geometry. 37:1--37:16","author":"Driemel Anne","year":"2017","unstructured":"Anne Driemel and Francesco Silvestri. 2017. Locality-sensitive hashing of curves. In Proceedings of the International Symposium on Computational Geometry. 37:1--37:16."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the IEEE International Conference on Data Engineering. 696--707","author":"Fang Ziquan","year":"2021","unstructured":"Ziquan Fang, Yuntao Du, Lu Chen, Yujia Hu, Yunjun Gao, and Gang Chen. 2021. E 2 dtc: An end to end deep trajectory clustering framework via self-training. In Proceedings of the IEEE International Conference on Data Engineering. 696--707."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33013558"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3361741"},{"key":"e_1_3_2_1_20_1","volume-title":"LiGuo Huang, and Bin Luo.","author":"Ge Jidong","year":"2023","unstructured":"Jidong Ge, Yuxiang Liu, Jie Gui, Lanting Fang, Ming Lin, James Tin-Yau Kwok, LiGuo Huang, and Bin Luo. 2023. Learning the relation between similarity loss and clustering loss in self-supervised learning. IEEE Transactions on Image Processing (2023)."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the International Conference on Very Large Data Bases. 518--529","author":"Gionis A.","year":"1999","unstructured":"A. Gionis, Piotr Indyk, and Rajeev Motwani. 1999. Similarity search in high dimensions via hashing. In Proceedings of the International Conference on Very Large Data Bases. 518--529."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/604"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2023.3326881"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2024.3357987"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219955"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2678475"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2636870"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3130191"},{"key":"e_1_3_2_1_29_1","first-page":"1","article-title":"Encrypting hashing against localization","volume":"61","author":"Han Jingpeng","year":"2023","unstructured":"Jingpeng Han, Peng Li, Yimin Tao, and Peng Ren. 2023. Encrypting hashing against localization. IEEE Transactions on Geoscience and Remote Sensing 61 (2023), 1--14.","journal-title":"IEEE Transactions on Geoscience and Remote Sensing"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467337"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123266.3123403"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi12030117"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01187"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3347146.3359094"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE55515.2023.00070"},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the ACM International Conference on Information & Knowledge Management. 905--914","author":"Jing Quanliang","year":"2022","unstructured":"Quanliang Jing, Shuo Liu, Xinxin Fan, Jingwei Li, Di Yao, Baoli Wang, and Jingping Bi. 2022. Can adversarial training benefit trajectory representation? An investigation on robustness for trajectory similarity computation. In Proceedings of the ACM International Conference on Information & Knowledge Management. 905--914."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9534341"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAI55435.2022.9773725"},{"key":"e_1_3_2_1_41_1","volume-title":"Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907","author":"Kipf Thomas N","year":"2016","unstructured":"Thomas N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE55515.2023.00053"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30637-2_26"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2023.05.033"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE48307.2020.00037"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2018.00062"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i3.16296"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i3.16299"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i7.20713"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.227"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557345"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i2.25269"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475598"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3532624"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/125"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/175"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557370"},{"key":"e_1_3_2_1_58_1","volume-title":"Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)."},{"key":"e_1_3_2_1_59_1","volume-title":"Leveraging future relationship reasoning for vehicle trajectory prediction. arXiv preprint arXiv:2305.14715","author":"Park Daehee","year":"2023","unstructured":"Daehee Park, Hobin Ryu, Yunseo Yang, Jegyeong Cho, Jiwon Kim, and Kuk-Jin Yoon. 2023. Leveraging future relationship reasoning for vehicle trajectory prediction. arXiv preprint arXiv:2305.14715 (2023)."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2023.3289765"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113351"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467238"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2008.2005605"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2008.2005605"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.12968"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2814344"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482284"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/479"},{"key":"e_1_3_2_1_69_1","volume-title":"Proceedings of the Advances in Neural Information Processing Systems.","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Lukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. In Proceedings of the Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_70_1","volume-title":"Proceedings of the International Conference on Learning Representations.","author":"Velickovic Petar","year":"2018","unstructured":"Petar Velickovic, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Lio, and Yoshua Bengio. 2018. Graph attention networks. In Proceedings of the International Conference on Learning Representations."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2002.994784"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1111\/tgis.12905"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.110035"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i3.20147"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330927"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3613440"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/430"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403043"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3131042"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2023.3248170"},{"key":"e_1_3_2_1_81_1","volume-title":"Proceedings of the ACM International Conference on Multimedia. 3173--3184","author":"Xu Chengyin","year":"2022","unstructured":"Chengyin Xu, Zenghao Chai, Zhengzhuo Xu, Chun Yuan, Yanbo Fan, and Jue Wang. 2022. HyP2 Loss: Beyond hypersphere metric space for multi-label image retrieval. In Proceedings of the ACM International Conference on Multimedia. 3173--3184."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539360"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2594136"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/148"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE53745.2022.00173"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00221"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00123"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539358"},{"key":"e_1_3_2_1_89_1","volume-title":"Proceedings of the IEEE International Conference on Data Engineering. 201--208","author":"Yi Byoung-Kee","year":"1998","unstructured":"Byoung-Kee Yi, Hosagrahar V Jagadish, and Christos Faloutsos. 1998. Efficient retrieval of similar time sequences under time warping. In Proceedings of the IEEE International Conference on Data Engineering. 201--208."},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/174"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020462"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869790.1869807"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00315"},{"key":"e_1_3_2_1_94_1","volume-title":"Recurrent neural network regularization. arXiv preprint arXiv:1409.2329","author":"Zaremba Wojciech","year":"2014","unstructured":"Wojciech Zaremba, Ilya Sutskever, and Oriol Vinyals. 2014. Recurrent neural network regularization. arXiv preprint arXiv:1409.2329 (2014)."},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/444"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3144352"},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i4.25624"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3218656"}],"event":{"name":"CIKM '24: The 33rd ACM International Conference on Information and Knowledge Management","location":"Boise ID USA","acronym":"CIKM '24","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 33rd ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627673.3679555","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3627673.3679555","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:58:22Z","timestamp":1750294702000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627673.3679555"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,21]]},"references-count":98,"alternative-id":["10.1145\/3627673.3679555","10.1145\/3627673"],"URL":"https:\/\/doi.org\/10.1145\/3627673.3679555","relation":{},"subject":[],"published":{"date-parts":[[2024,10,21]]},"assertion":[{"value":"2024-10-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}