{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2017:VAIQFAMELVWTOICTTWLKECXN2H","short_pith_number":"pith:VAIQFAME","canonical_record":{"source":{"id":"1711.06016","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2017-11-16T10:45:39Z","cross_cats_sorted":[],"title_canon_sha256":"fb477f01f61c794745c7c84634256b33b16d12e007bc3e97200bfb26441dcecf","abstract_canon_sha256":"e507b9a9875263226330aa8c500b2164511d5b246dd211d73a3badcca188979a"},"schema_version":"1.0"},"canonical_sha256":"a8110281845d6d3720539d96a20aedd1dafda5f053ce1805d029163aa853e165","source":{"kind":"arxiv","id":"1711.06016","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1711.06016","created_at":"2026-05-18T00:30:23Z"},{"alias_kind":"arxiv_version","alias_value":"1711.06016v1","created_at":"2026-05-18T00:30:23Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1711.06016","created_at":"2026-05-18T00:30:23Z"},{"alias_kind":"pith_short_12","alias_value":"VAIQFAMELVWT","created_at":"2026-05-18T12:31:49Z"},{"alias_kind":"pith_short_16","alias_value":"VAIQFAMELVWTOICT","created_at":"2026-05-18T12:31:49Z"},{"alias_kind":"pith_short_8","alias_value":"VAIQFAME","created_at":"2026-05-18T12:31:49Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2017:VAIQFAMELVWTOICTTWLKECXN2H","target":"record","payload":{"canonical_record":{"source":{"id":"1711.06016","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2017-11-16T10:45:39Z","cross_cats_sorted":[],"title_canon_sha256":"fb477f01f61c794745c7c84634256b33b16d12e007bc3e97200bfb26441dcecf","abstract_canon_sha256":"e507b9a9875263226330aa8c500b2164511d5b246dd211d73a3badcca188979a"},"schema_version":"1.0"},"canonical_sha256":"a8110281845d6d3720539d96a20aedd1dafda5f053ce1805d029163aa853e165","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:30:23.560418Z","signature_b64":"Rj2/cuE5m4s1ZUrb+Ar4F67M6ULqmDOUp/uvF9tHD/7jrd1yE7rhmHCKg3eChvnCNKOw82BItiQijVTF5NDPAg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"a8110281845d6d3720539d96a20aedd1dafda5f053ce1805d029163aa853e165","last_reissued_at":"2026-05-18T00:30:23.559800Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:30:23.559800Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1711.06016","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:30:23Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"0yoWAfkotXnK4wSR4RynohIDVC3UBRdCQ7ZTEe+dEqfQSzTSrGMLgQJwbfRP+yUWhDgG1RKm5Hv5jV+UICI9Bw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T06:42:41.093591Z"},"content_sha256":"a9c97e5f4629509572c78c95bbf7a48f2d302416fb85594eb68d66916802b0b2","schema_version":"1.0","event_id":"sha256:a9c97e5f4629509572c78c95bbf7a48f2d302416fb85594eb68d66916802b0b2"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2017:VAIQFAMELVWTOICTTWLKECXN2H","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"A Revisit on Deep Hashings for Large-scale Content Based Image Retrieval","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CV","authors_text":"Chaoqi Wang, Deng Cai, Xiuye Gu","submitted_at":"2017-11-16T10:45:39Z","abstract_excerpt":"There is a growing trend in studying deep hashing methods for content-based image retrieval (CBIR), where hash functions and binary codes are learnt using deep convolutional neural networks and then the binary codes can be used to do approximate nearest neighbor (ANN) search. All the existing deep hashing papers report their methods' superior performance over the traditional hashing methods according to their experimental results. However, there are serious flaws in the evaluations of existing deep hashing papers: (1) The datasets they used are too small and simple to simulate the real CBIR si"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1711.06016","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:30:23Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"vCyhC/CR0zKzgIgdtv/E+tLdllmFAsp1LIrPx6O8BarrLfCfNP/vORtcOwCVXRY6ziZ022EzveVratAklXTsBg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T06:42:41.093947Z"},"content_sha256":"edb2436eb731382d4795035058164d44f08128f9e38f61443390f94b0dc7e5a6","schema_version":"1.0","event_id":"sha256:edb2436eb731382d4795035058164d44f08128f9e38f61443390f94b0dc7e5a6"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/VAIQFAMELVWTOICTTWLKECXN2H/bundle.json","state_url":"https://pith.science/pith/VAIQFAMELVWTOICTTWLKECXN2H/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/VAIQFAMELVWTOICTTWLKECXN2H/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T06:42:41Z","links":{"resolver":"https://pith.science/pith/VAIQFAMELVWTOICTTWLKECXN2H","bundle":"https://pith.science/pith/VAIQFAMELVWTOICTTWLKECXN2H/bundle.json","state":"https://pith.science/pith/VAIQFAMELVWTOICTTWLKECXN2H/state.json","well_known_bundle":"https://pith.science/.well-known/pith/VAIQFAMELVWTOICTTWLKECXN2H/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2017:VAIQFAMELVWTOICTTWLKECXN2H","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"e507b9a9875263226330aa8c500b2164511d5b246dd211d73a3badcca188979a","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2017-11-16T10:45:39Z","title_canon_sha256":"fb477f01f61c794745c7c84634256b33b16d12e007bc3e97200bfb26441dcecf"},"schema_version":"1.0","source":{"id":"1711.06016","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1711.06016","created_at":"2026-05-18T00:30:23Z"},{"alias_kind":"arxiv_version","alias_value":"1711.06016v1","created_at":"2026-05-18T00:30:23Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1711.06016","created_at":"2026-05-18T00:30:23Z"},{"alias_kind":"pith_short_12","alias_value":"VAIQFAMELVWT","created_at":"2026-05-18T12:31:49Z"},{"alias_kind":"pith_short_16","alias_value":"VAIQFAMELVWTOICT","created_at":"2026-05-18T12:31:49Z"},{"alias_kind":"pith_short_8","alias_value":"VAIQFAME","created_at":"2026-05-18T12:31:49Z"}],"graph_snapshots":[{"event_id":"sha256:edb2436eb731382d4795035058164d44f08128f9e38f61443390f94b0dc7e5a6","target":"graph","created_at":"2026-05-18T00:30:23Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"There is a growing trend in studying deep hashing methods for content-based image retrieval (CBIR), where hash functions and binary codes are learnt using deep convolutional neural networks and then the binary codes can be used to do approximate nearest neighbor (ANN) search. All the existing deep hashing papers report their methods' superior performance over the traditional hashing methods according to their experimental results. However, there are serious flaws in the evaluations of existing deep hashing papers: (1) The datasets they used are too small and simple to simulate the real CBIR si","authors_text":"Chaoqi Wang, Deng Cai, Xiuye Gu","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2017-11-16T10:45:39Z","title":"A Revisit on Deep Hashings for Large-scale Content Based Image Retrieval"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1711.06016","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:a9c97e5f4629509572c78c95bbf7a48f2d302416fb85594eb68d66916802b0b2","target":"record","created_at":"2026-05-18T00:30:23Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"e507b9a9875263226330aa8c500b2164511d5b246dd211d73a3badcca188979a","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2017-11-16T10:45:39Z","title_canon_sha256":"fb477f01f61c794745c7c84634256b33b16d12e007bc3e97200bfb26441dcecf"},"schema_version":"1.0","source":{"id":"1711.06016","kind":"arxiv","version":1}},"canonical_sha256":"a8110281845d6d3720539d96a20aedd1dafda5f053ce1805d029163aa853e165","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"a8110281845d6d3720539d96a20aedd1dafda5f053ce1805d029163aa853e165","first_computed_at":"2026-05-18T00:30:23.559800Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:30:23.559800Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"Rj2/cuE5m4s1ZUrb+Ar4F67M6ULqmDOUp/uvF9tHD/7jrd1yE7rhmHCKg3eChvnCNKOw82BItiQijVTF5NDPAg==","signature_status":"signed_v1","signed_at":"2026-05-18T00:30:23.560418Z","signed_message":"canonical_sha256_bytes"},"source_id":"1711.06016","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:a9c97e5f4629509572c78c95bbf7a48f2d302416fb85594eb68d66916802b0b2","sha256:edb2436eb731382d4795035058164d44f08128f9e38f61443390f94b0dc7e5a6"],"state_sha256":"c74a52a5ed0b4b799df1d1308cfa0963f20dd80abf7fdb43851fec6cd588a72b"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"h9i5vCdBJaPAwictWQC/1DG+A9m6NK3syPXbb4KKkga+WMLj9rhSEWp+5kQ3Qrpiat5DXELnHxQ+Ok/FsqE6Cw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T06:42:41.096609Z","bundle_sha256":"54bb49b6eaeaf4a6db1a515f756a768445ff740f5c1c83c0a0db4c4706e16f2f"}}