{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T05:02:53Z","timestamp":1648616573970},"reference-count":24,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2017]]},"DOI":"10.1587\/transinf.2017edl8126","type":"journal-article","created":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T22:25:56Z","timestamp":1512080756000},"page":"3036-3040","source":"Crossref","is-referenced-by-count":3,"title":["Deep Discriminative Supervised Hashing via Siamese Network"],"prefix":"10.1587","volume":"E100.D","author":[{"given":"Yang","family":"LI","sequence":"first","affiliation":[{"name":"College of Command Information Systems, PLA University of Science and Technology (PLAUST)"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhuang","family":"MIAO","sequence":"additional","affiliation":[{"name":"College of Command Information Systems, PLA University of Science and Technology (PLAUST)"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiabao","family":"WANG","sequence":"additional","affiliation":[{"name":"College of Command Information Systems, PLA University of Science and Technology (PLAUST)"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yafei","family":"ZHANG","sequence":"additional","affiliation":[{"name":"College of Command Information Systems, PLA University of Science and Technology (PLAUST)"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hang","family":"LI","sequence":"additional","affiliation":[{"name":"College of Command Information Systems, PLA University of Science and Technology (PLAUST)"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] L. Zheng, Y. Yang, and Q. Tian, \u201cSIFT meets CNN: A decade survey of instance retrieval,\u201d CoRR, vol.abs\/1608.01807, 2016."},{"key":"2","unstructured":"[2] J. Wang, T. Zhang, J. Song, N. Sebe, and H.T. Shen, \u201cA survey on learning to hash,\u201d CoRR, vol.abs\/1606.00185, 2016."},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] A. Andoni and P. Indyk, \u201cNear-optimal hashing algorithms for approximate nearest neighbor in high dimensions,\u201d Proc. Found. Comput. Sci., pp.459-468, 2006. 10.1109\/focs.2006.49","DOI":"10.1109\/FOCS.2006.49"},{"key":"4","unstructured":"[4] M. Raginsky and S. Lazebnik, \u201cLocality-sensitive binary codes from shift-invariant kernels,\u201d Proc. Adv. Neural Inf. Process. Syst., pp.1509-1517, 2009."},{"key":"5","unstructured":"[5] Y. Weiss, A. Torralba, and R. Fergus, \u201cSpectral hashing,\u201d Proc. Adv. Neural Inf. Process. Syst., pp.1753-1760, 2008."},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] Y. Gong and S. Lazebnik, \u201cIterative quantization: A procrustean approach to learning binary codes,\u201d Proc. IEEE Conf. Comput. Vis. Pattern Recognit., pp.817-824, 2011. 10.1109\/cvpr.2011.5995432","DOI":"10.1109\/CVPR.2011.5995432"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] F. Shen, C. Shen, W. Liu, and H.T. Shen, \u201cSupervised discrete hashing,\u201d Proc. IEEE Conf. Comput. Vis. Pattern Recognit., pp.37-45, 2015. 10.1109\/cvpr.2015.7298598","DOI":"10.1109\/CVPR.2015.7298598"},{"key":"8","unstructured":"[8] J. Wang, S. Kumar, and S.F. Chang, \u201cSequential projection learning for hashing with compact codes,\u201d Proc. Int. Conf. Mach. Learn., pp.1127-1134, 2010."},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] P. Zhang, W. Zhang, W.-J. Li, and M. Guo, \u201cSupervised hashing with latent factor models,\u201d The 37th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp.173-182, 2014. 10.1145\/2600428.2609600","DOI":"10.1145\/2600428.2609600"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] W. Liu, J. Wang, R. Ji, Y.-G. Jiang, and S.-F. Chang, \u201cSupervised hashing with kernels,\u201d Proc. IEEE Conf. Comput. Vis. Pattern Recognit., pp.2074-2081, 2012. 10.1109\/cvpr.2012.6247912","DOI":"10.1109\/CVPR.2012.6247912"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] G. Lin, C. Shen, Q. Shi, A. van den Hengel, and D. Suter, \u201cFast supervised hashing with decision trees for high-dimensional data,\u201d Proc. IEEE Conf. Comput. Vis. Pattern Recognit., pp.1971-1978, 2014. 10.1109\/cvpr.2014.253","DOI":"10.1109\/CVPR.2014.253"},{"key":"12","doi-asserted-by":"publisher","unstructured":"[12] D.G. Lowe, \u201cDistinctive image features from scale-invariant keypoints,\u201d Int. J. Comput. Vis., vol.60, no.2, pp.91-110, 2004. 10.1023\/b:visi.0000029664.99615.94","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"13","doi-asserted-by":"publisher","unstructured":"[13] A. Oliva and A. Torralba, \u201cModeling the shape of the scene: A holistic representation of the spatial envelope,\u201d Int. J. Comput. Vis., vol.42, no.3, pp.145-175, 2001. 10.1023\/a:1011139631724","DOI":"10.1023\/A:1011139631724"},{"key":"14","unstructured":"[14] R. Xia, Y. Pan, H. Lai, C. Liu, and S. Yan, \u201cSupervised hashing for image retrieval via image representation learning,\u201d Proc. Int. Conf. Artif. Intell., pp.2156-2162, 2014."},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] H. Lai, Y. Pan, Y. Liu, and S. Yan, \u201cSimultaneous feature learning and hash coding with deep neural networks,\u201d Proc. IEEE Conf. Comput. Vis. Pattern Recognit., pp.3270-3278, 2015. 10.1109\/cvpr.2015.7298947","DOI":"10.1109\/CVPR.2015.7298947"},{"key":"16","unstructured":"[16] F. Zhao, Y. Huang, L. Wang, and T. Tan, \u201cDeep semantic ranking based hashing for multi-label image retrieval,\u201d Proc. IEEE Conf. Comput. Vis. Pattern Recognit., pp.1556-1564, 2015. 10.1109\/cvpr.2015.7298763"},{"key":"17","doi-asserted-by":"publisher","unstructured":"[17] R. Zhang, L. Lin, R. Zhang, W. Zuo, and L. Zhang, \u201cBit-scalable deep hashing with regularized similarity learning for image retrieval and person re-identification,\u201d IEEE Trans. Image Process., vol.24, no.12, pp.4766-4779, 2015. 10.1109\/tip.2015.2467315","DOI":"10.1109\/TIP.2015.2467315"},{"key":"18","unstructured":"[18] W.J. Li, S. Wang, and W.C. Kang, \u201cFeature learning based deep supervised hashing with pairwise labels,\u201d Proc. Int. Jt. Conf. Artif. Intell., pp.1711-1717, 2016."},{"key":"19","unstructured":"[19] X. Wang, Y. Shi, and K.M. Kitani, \u201cDeep supervised hashing with triplet labels,\u201d CoRR, vol.abs\/1612.03900, 2016."},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] F. Schroff, D. Kalenichenko, and J. Philbin, \u201cFaceNet: A unified embedding for face recognition and clustering,\u201d Proc. IEEE Conf. Comput. Vis. Pattern Recognit., pp.815-823, 2015. 10.1109\/cvpr.2015.7298682","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] K. Chatfield, K. Simonyan, A. Vedaldi, and A. Zisserman, \u201cReturn of the devil in the details: Delving deep into convolutional nets,\u201d Proc. Brit. Mach. Vis. Conf., 2014. 10.5244\/c.28.6","DOI":"10.5244\/C.28.6"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich, \u201cGoing deeper with convolutions,\u201d Proc. IEEE Conf. Comput. Vis. Pattern Recognit., pp.1-9, 2015. 10.1109\/cvpr.2015.7298594","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] K. He, X. Zhang, S. Ren, and J. Sun, \u201cDeep residual learning for image recognition,\u201d Proc. IEEE Conf. Comput. Vis. Pattern Recognit., pp.770-778, 2016. 10.1109\/cvpr.2016.90","DOI":"10.1109\/CVPR.2016.90"},{"key":"24","doi-asserted-by":"crossref","unstructured":"[24] A. Vedaldi and K. Lenc, \u201cMatConvNet: Convolutional neural networks for MATLAB,\u201d Proc. Int. Conf. Multimed., pp.689-692, 2015. 10.1145\/2733373.2807412","DOI":"10.1145\/2733373.2807412"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E100.D\/12\/E100.D_2017EDL8126\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T05:49:25Z","timestamp":1570427365000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E100.D\/12\/E100.D_2017EDL8126\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":24,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2017]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2017edl8126","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}