{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:48Z","timestamp":1750309608338,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key R&D Program of China","award":["2022YFC3300803"],"award-info":[{"award-number":["2022YFC3300803"]}]},{"name":"Opening Project of Intelligent Policing Key Laboratory of Sichuan Province","award":["ZNJW2023KFMS008"],"award-info":[{"award-number":["ZNJW2023KFMS008"]}]},{"name":"Natural Science Foundation of China","award":["62172053"],"award-info":[{"award-number":["62172053"]}]},{"name":"Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data","award":["2018BDKFJJ019"],"award-info":[{"award-number":["2018BDKFJJ019"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,18]]},"DOI":"10.1145\/3711129.3711155","type":"proceedings-article","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T12:40:26Z","timestamp":1740055226000},"page":"138-145","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["CSClust: A Luxury Goods Image Authentication Algorithm Based on Contrastive Clustering"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-0378-0438","authenticated-orcid":false,"given":"Yaxin","family":"Chao","sequence":"first","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1544-956X","authenticated-orcid":false,"given":"Yu","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0727-2436","authenticated-orcid":false,"given":"Linna","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-2701-4288","authenticated-orcid":false,"given":"Jixin","family":"Zou","sequence":"additional","affiliation":[{"name":"Institude of Forensic Science of China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3582-8823","authenticated-orcid":false,"given":"Min","family":"Lei","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,2,20]]},"reference":[{"key":"e_1_3_3_1_1_2","volume-title":"Evolutionary under-sampling boosting for imbalanced classification of breast cancer malignancy","author":"KRAWCZYK B, GALAR M, JELE N L","year":"2016","unstructured":"KRAWCZYK B, GALAR M, JELE N L, et al. \u201cEvolutionary under-sampling boosting for imbalanced classification of breast cancer malignancy\u201d, 2016."},{"key":"e_1_3_3_1_2_2","volume-title":"Context-Aware Learning for Anomaly Detection with Imbalanced Log Data","author":"SUN P,YUE P E,LI","year":"2020","unstructured":"SUN P,YUE P E,LI T,et al. \u201cContext-Aware Learning for Anomaly Detection with Imbalanced Log Data\u201d, 2020."},{"doi-asserted-by":"publisher","key":"e_1_3_3_1_3_2","DOI":"10.1109\/CVPR42600.2020.00975"},{"key":"e_1_3_3_1_4_2","volume-title":"Improved baselines with momentum contrastive learning","author":"Chen Xinlei","year":"2020","unstructured":"Xinlei Chen, Haoqi Fan, Ross Girshick, and Kaiming He, \u201cImproved baselines with momentum contrastive learning,\u201d 2020."},{"key":"e_1_3_3_1_5_2","volume-title":"A simple framework for contrastive learning of visual representations","author":"Chen Ting","year":"2020","unstructured":"Ting Chen, Simon Kornblith, Mohammad Norouzi, and Geoffrey Hinton, \u201cA simple framework for contrastive learning of visual representations,\u201d 2020."},{"key":"e_1_3_3_1_6_2","volume-title":"Neural Information Processing Systems","author":"Chen Ting","year":"2020","unstructured":"Ting Chen, Simon Kornblith, Kevin Swersky, Mohammad Norouzi, and Geoffrey Hinton, \u201cBig selfsupervised models are strong semi-supervised learners,\u201d in Neural Information Processing Systems, 2020."},{"key":"e_1_3_3_1_7_2","volume-title":"Representation learning with contrastive predictive coding","author":"Den Oord Aaron Van","year":"2018","unstructured":"Aaron Van Den Oord, Yazhe Li, and Oriol Vinyals, \u201cRepresentation learning with contrastive predictive coding,\u201d 2018."},{"key":"e_1_3_3_1_8_2","volume-title":"Deep robust clustering by contrastive learning","author":"Zhong Huasong","year":"2020","unstructured":"Huasong Zhong, Chong Chen, Zhongming Jin, and Xian Sheng Hua, \u201cDeep robust clustering by contrastive learning,\u201d 2020."},{"key":"e_1_3_3_1_9_2","volume-title":"Contrastive clustering","author":"Li Yunfan","year":"2020","unstructured":"Yunfan Li, Peng Hu, Zitao Liu, Dezhong Peng, and Xi Peng, \u201cContrastive clustering,\u201d 2020."},{"key":"e_1_3_3_1_10_2","volume-title":"Multi-CC: A New Baseline for Faster and Better Deep Clustering","author":"G.","year":"2023","unstructured":"Yao, Y.; Yang, Y.; Zhou, L.; Guo, X.; Wang, G. \u201cMulti-CC: A New Baseline for Faster and Better Deep Clustering\u201d, 2023."},{"key":"e_1_3_3_1_11_2","volume-title":"C3: Crossinstance guided contrastive clustering","author":"Sadeghi Armanfard N","year":"2022","unstructured":"H.; Armanfard N Sadeghi, M.; Hojjati, \u201cC3: Crossinstance guided contrastive clustering,\u201d 2022."},{"doi-asserted-by":"publisher","key":"e_1_3_3_1_12_2","DOI":"10.1007\/s11263-022-01639-z"},{"doi-asserted-by":"publisher","key":"e_1_3_3_1_13_2","DOI":"10.1109\/CVPR.2019.00419"},{"doi-asserted-by":"publisher","key":"e_1_3_3_1_14_2","DOI":"10.1109\/TCSS.2019.2926450"},{"doi-asserted-by":"publisher","key":"e_1_3_3_1_15_2","DOI":"10.1109\/ICCV.2019.00654"},{"key":"e_1_3_3_1_16_2","volume-title":"An image is worth 16x16 words: Transformers for image recognition at scale","author":"Dosovitskiy Alexey","year":"2020","unstructured":"Alexey Dosovitskiy, Lucas Beyer, Alexander Kolesnikov, Dirk Weissenborn, and Neil Houlsby, \u201cAn image is worth 16x16 words: Transformers for image recognition at scale,\u201d 2020."},{"key":"e_1_3_3_1_17_2","volume-title":"Proceedings of the IEEE International Conference on Computer Vision (ICCV)","author":"Park J. Y.","year":"2017","unstructured":"Zhu, J. Y., Park, T., Isola, P., & Efros, A. A.. Unpaired Image-to-Image Translation using Cycle-Consistent Adversarial Networks. Proceedings of the IEEE International Conference on Computer Vision (ICCV), 2017."},{"doi-asserted-by":"publisher","key":"e_1_3_3_1_18_2","DOI":"10.1007\/s12530-016-9165-5"},{"doi-asserted-by":"publisher","key":"e_1_3_3_1_19_2","DOI":"10.1007\/BF01908075"},{"key":"e_1_3_3_1_20_2","volume-title":"NIPS","author":"Bengio Yoshua","year":"2006","unstructured":"Yoshua Bengio, Pascal Lamblin, Dan Popovici, and H. Larochelle. Greedy layer-wise training of deep networks. In NIPS, 2006."},{"doi-asserted-by":"publisher","key":"e_1_3_3_1_21_2","DOI":"10.5555\/1756006.1953039"},{"doi-asserted-by":"publisher","key":"e_1_3_3_1_22_2","DOI":"10.1109\/CVPR.2010.5539957"},{"key":"e_1_3_3_1_23_2","volume-title":"Kingma and Max Welling. Auto-encoding variational bayes. CoRR, abs\/1312.6114","author":"Diederik","year":"2013","unstructured":"Diederik P. Kingma and Max Welling. Auto-encoding variational bayes. CoRR, abs\/1312.6114, 2013."},{"key":"e_1_3_3_1_24_2","volume-title":"Unsupervised deep embedding for clustering analysis. ArXiv, abs\/1511.06335","author":"Xie Junyuan","year":"2015","unstructured":"Junyuan Xie, Ross B. Girshick, and Ali Farhadi. Unsupervised deep embedding for clustering analysis. ArXiv, abs\/1511.06335, 2015."},{"key":"e_1_3_3_1_25_2","volume-title":"Deep discriminative clustering analysis. ArXiv, abs\/1905.01681","author":"Chang Jianlong","year":"2019","unstructured":"Jianlong Chang, Yiwen Guo, Lingfeng Wang, Gaofeng Meng, Shiming Xiang, and Chunhong Pan. Deep discriminative clustering analysis. ArXiv, abs\/1905.01681, 2019."},{"key":"e_1_3_3_1_26_2","first-page":"9873","volume-title":"2019 IEEE\/CVF International Conference on Computer Vision (ICCV)","author":"Ji Xu","year":"2018","unstructured":"Xu Ji, Andrea Vedaldi, and Joao F. Henriques. Invariant information\u02dc clustering for unsupervised image classification and segmentation. 2019 IEEE\/CVF International Conference on Computer Vision (ICCV), pages 9864\u20139873, 2018."},{"doi-asserted-by":"publisher","key":"e_1_3_3_1_27_2","DOI":"10.1109\/CVPR42600.2020.00887"},{"key":"e_1_3_3_1_28_2","article-title":"Semantic Pseudo-Labeling for Image Clustering","author":"G.","year":"2021","unstructured":"Niu, C.; Shan, H.; Wang, G. SPICE: Semantic Pseudo-Labeling for Image Clustering. IEEE Trans. Image Process. 2021.","journal-title":"IEEE Trans. Image Process."},{"key":"e_1_3_3_1_29_2","volume-title":"Strongly augmented contrastive clustering. Pattern Recognit","author":"H.","year":"2023","unstructured":"Deng, X.; Huang, D.; Chen, D.H.; Wang, C.D.; Lai, J.H. Strongly augmented contrastive clustering. Pattern Recognit. 2023."}],"event":{"acronym":"EITCE 2024","name":"EITCE 2024: 2024 8th International Conference on Electronic Information Technology and Computer Engineering","location":"Haikou Guangdong China"},"container-title":["Proceedings of the 2024 8th International Conference on Electronic Information Technology and Computer Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711129.3711155","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711129.3711155","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:57:29Z","timestamp":1750298249000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711129.3711155"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,18]]},"references-count":29,"alternative-id":["10.1145\/3711129.3711155","10.1145\/3711129"],"URL":"https:\/\/doi.org\/10.1145\/3711129.3711155","relation":{},"subject":[],"published":{"date-parts":[[2024,10,18]]},"assertion":[{"value":"2025-02-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}