{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T17:45:31Z","timestamp":1777657531604,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T00:00:00Z","timestamp":1717027200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key R&D Program of China","award":["2022YFE0198900"],"award-info":[{"award-number":["2022YFE0198900"]}]},{"name":"Natural Science Foundation of China","award":["62176237, 61871445"],"award-info":[{"award-number":["62176237, 61871445"]}]},{"name":"Opening Project of Collaborative Innovation Center for Economics Crime Investigation and Prevention Technology of Jiangxi Province","award":["JXJZXTCX-016"],"award-info":[{"award-number":["JXJZXTCX-016"]}]},{"name":"Public Welfare Technology Application Research Plan Project of Zhejiang Province","award":["LGG18F030002"],"award-info":[{"award-number":["LGG18F030002"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,30]]},"DOI":"10.1145\/3652583.3658053","type":"proceedings-article","created":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T06:30:40Z","timestamp":1717741840000},"page":"83-91","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["HashNeck is a Boosting Tool for Deep Learning to Hashing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4078-3527","authenticated-orcid":false,"given":"Hua","family":"Gao","sequence":"first","affiliation":[{"name":"Zhejiang University of Technology, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5349-7962","authenticated-orcid":false,"given":"ChenChen","family":"Hu","sequence":"additional","affiliation":[{"name":"Zhejiang University of Technology, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4812-9180","authenticated-orcid":false,"given":"Guang","family":"Han","sequence":"additional","affiliation":[{"name":"Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2777-8803","authenticated-orcid":false,"given":"Jiafa","family":"Mao","sequence":"additional","affiliation":[{"name":"Zhejiang University of Technology, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6684-5642","authenticated-orcid":false,"given":"Wei","family":"Huang","sequence":"additional","affiliation":[{"name":"Zhejiang University of Technology, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3558-0914","authenticated-orcid":false,"given":"Kaiyuan","family":"Wan","sequence":"additional","affiliation":[{"name":"Zhejiang HOUDAR Intelligent Technology Co., Ltd., Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2024,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5845094"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3130528"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00134"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.598"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01246-5_22"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1646396.1646452"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2009.5206848"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2964284.2967225"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126543"},{"key":"e_1_3_2_1_12_1","volume-title":"Learning to hash with binary reconstructive embeddings. Advances in neural information processing systems 22","author":"Kulis Brian","year":"2009","unstructured":"Brian Kulis and Trevor Darrell. 2009. Learning to hash with binary reconstructive embeddings. Advances in neural information processing systems 22 (2009)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298947"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2927524"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2645404"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.227"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2354409.2355047"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11494-8"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107467"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107467"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2022.3161905"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2016.09.009"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298598"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","unstructured":"N. F. Shi C. Fu M. Tie W. C. Zhang X.W.Wang and C.W. Sham. 2023. Attentionbased deep supervised hashing for near duplicate video retrieval. Neural computing applications (2023). https:\/\/doi.org\/10.1007\/s00521-023-09342-x","DOI":"10.1007\/s00521-023-09342-x"},{"key":"e_1_3_2_1_27_1","volume-title":"Amir Roshan Zamir, and Mubarak Shah","author":"Soomro Khurram","year":"2012","unstructured":"Khurram Soomro, Amir Roshan Zamir, and Mubarak Shah. 2012. UCF101: A dataset of 101 human actions classes from videos in the wild. arXiv preprint arXiv:1212.0402 (2012). https:\/\/doi.org\/arXiv:1212.0402"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449825"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2699960"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01398"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","unstructured":"R. K.Wei Y. Liu J. K. Song Y. Z. Xie and K. Zhou. 2023. Deep debiased contrastive hashing. Pattern recognition 139 (2023). https:\/\/doi.org\/10.1016\/j.patcog.2023. 109483","DOI":"10.1016\/j.patcog.2023"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v28i1.8952"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","unstructured":"Y. Z. Xie Y. T.Wang R. K.Wei Y. Liu K. Zhou and L. S. Fan. 2023. A hash centroid construction method with Swin transformer for multi-label image retrieval. Neural computing applications (2023). https:\/\/doi.org\/10.1007\/s00521-023-08273-x","DOI":"10.1007\/s00521-023-08273-x"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.2975798"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00315"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","unstructured":"L. Yuan T. Wang X. P. Zhang F. E. H. Tay Z. Q. Jie Y. H. Tian W. Liu and J. S. Feng. 2023. Learnable Central Similarity Quantization for Efficient Image and Video Retrieval. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2023). https:\/\/doi.org\/10.1109\/TNNLS.2023.3321148","DOI":"10.1109\/TNNLS.2023.3321148"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10235"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3001583"}],"event":{"name":"ICMR '24: International Conference on Multimedia Retrieval","location":"Phuket Thailand","acronym":"ICMR '24","sponsor":["SIGMM ACM Special Interest Group on Multimedia","SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2024 International Conference on Multimedia Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652583.3658053","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3652583.3658053","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T08:50:24Z","timestamp":1755766224000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652583.3658053"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,30]]},"references-count":38,"alternative-id":["10.1145\/3652583.3658053","10.1145\/3652583"],"URL":"https:\/\/doi.org\/10.1145\/3652583.3658053","relation":{},"subject":[],"published":{"date-parts":[[2024,5,30]]},"assertion":[{"value":"2024-06-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}