Privacy Intelligence: A Survey on Image Privacy in Online Social Networks
暂无分享,去创建一个
[1] Tianqing Zhu,et al. Privacy Data Diffusion Modeling and Preserving in Online Social Network , 2023, IEEE Transactions on Knowledge and Data Engineering.
[2] K. Palaniappan,et al. “Do You Know You Are Tracked by Photos That You Didn’t Take”: Large-Scale Location-Aware Multi-Party Image Privacy Protection , 2023, IEEE Transactions on Dependable and Secure Computing.
[3] Yonghe Liu,et al. Gender-Adversarial Networks for Face Privacy Preserving , 2022, IEEE Internet of Things Journal.
[4] M. Dong,et al. BPT: A Blockchain-Based Privacy Information Preserving System for Trust Data Collection Over Distributed Mobile-Edge Network , 2022, IEEE Internet of Things Journal.
[5] Tianqing Zhu,et al. Making DeepFakes More Spurious: Evading Deep Face Forgery Detection via Trace Removal Attack , 2022, IEEE Transactions on Dependable and Secure Computing.
[6] Xirong Li,et al. DRAG: Dynamic Region-Aware GCN for Privacy-Leaking Image Detection , 2022, AAAI.
[7] Wanlei Zhou,et al. Visual privacy attacks and defenses in deep learning: a survey , 2022, Artificial Intelligence Review.
[8] M. He,et al. A Label Uncertainty-Guided Multi-Stream Model for Disease Screening , 2022, 2022 IEEE 19th International Symposium on Biomedical Imaging (ISBI).
[9] E. D. Val,et al. A Review of Privacy Decision-making Mechanisms in Online Social Networks , 2022, ACM Computing Surveys.
[10] Christoph Meinel,et al. Enabling Co-owned Image Privacy on Social Media via Agent Negotiation , 2021, iiWAS.
[11] Yu Zheng,et al. Learning multi-level and multi-scale deep representations for privacy image classification , 2021, Multim. Tools Appl..
[12] Yonggang Huang,et al. Learning multi-level and multi-scale deep representations for privacy image classification , 2021, Multimedia Tools and Applications.
[13] Jinpeng Chen,et al. Automatic Tagging by Leveraging Visual and Annotated Features in Social Media , 2021, IEEE Transactions on Multimedia.
[14] Micah Goldblum,et al. LowKey: Leveraging Adversarial Attacks to Protect Social Media Users from Facial Recognition , 2021, ICLR.
[15] Jian Weng,et al. A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing , 2021, IEEE Transactions on Network Science and Engineering.
[16] Yu Wang,et al. GAN-Based Differential Private Image Privacy Protection Framework for the Internet of Multimedia Things , 2020, Sensors.
[17] Abdurrahman Can Kurtan,et al. Assisting humans in privacy management: an agent-based approach , 2020, Autonomous Agents and Multi-Agent Systems.
[18] Jintao Li,et al. Graph-based neural networks for explainable image privacy inference , 2020, Pattern Recognit..
[19] Philip S. Yu,et al. More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence , 2020, IEEE Transactions on Knowledge and Data Engineering.
[20] Apu Kapadia,et al. Privacy Norms and Preferences for Photos Posted Online , 2020, ACM Trans. Comput. Hum. Interact..
[21] Laurence T. Yang,et al. An Extended Framework of Privacy-Preserving Computation With Flexible Access Control , 2020, IEEE Transactions on Network and Service Management.
[22] Mario Fritz,et al. Automatically Detecting Bystanders in Photos to Reduce Privacy Risks , 2020, 2020 IEEE Symposium on Security and Privacy (SP).
[23] Yisroel Mirsky,et al. The Creation and Detection of Deepfakes , 2020, ACM Comput. Surv..
[24] Florian Alt,et al. The Role of Eye Gaze in Security and Privacy Applications: Survey and Future HCI Research Directions , 2020, CHI.
[25] Dorothea Kolossa,et al. Leveraging Frequency Analysis for Deep Fake Image Recognition , 2020, ICML.
[26] Jun Zhu,et al. Towards Face Encryption by Generating Adversarial Identity Masks , 2020, 2021 IEEE/CVF International Conference on Computer Vision (ICCV).
[27] Ben Y. Zhao,et al. Fawkes: Protecting Privacy against Unauthorized Deep Learning Models , 2020, USENIX Security Symposium.
[28] John Wojewidka,et al. The deepfake threat to face biometrics , 2020 .
[29] Philip H. S. Torr,et al. Global Texture Enhancement for Fake Face Detection in the Wild , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[30] Chen Change Loy,et al. DeeperForensics-1.0: A Large-Scale Dataset for Real-World Face Forgery Detection , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[31] Arun Ross,et al. PrivacyNet: Semi-Adversarial Networks for Multi-Attribute Face Privacy , 2020, IEEE Transactions on Image Processing.
[32] A. Morales,et al. DeepFakes and Beyond: A Survey of Face Manipulation and Fake Detection , 2020, Inf. Fusion.
[33] Fang Wen,et al. Face X-Ray for More General Face Forgery Detection , 2019, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[34] Alexei A. Efros,et al. CNN-Generated Images Are Surprisingly Easy to Spot… for Now , 2019, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[35] Samuel Greengard,et al. Will deepfakes do deep damage? , 2019, Commun. ACM.
[36] Yevgeniy Vorobeychik,et al. Protecting Geolocation Privacy of Photo Collections , 2019, AAAI.
[37] H. B. McMahan,et al. Generative Models for Effective ML on Private, Decentralized Datasets , 2019, ICLR.
[38] Camille Marini,et al. Substra: a framework for privacy-preserving, traceable and collaborative Machine Learning , 2019, ArXiv.
[39] Cristian Canton-Ferrer,et al. The Deepfake Detection Challenge (DFDC) Preview Dataset , 2019, ArXiv.
[40] Yongkang Wong,et al. Human-imperceptible Privacy Protection Against Machines , 2019, ACM Multimedia.
[41] Kai Kunze,et al. Private Reader: Using Eye Tracking to Improve Reading Privacy in Public Spaces , 2019, MobileHCI.
[42] Siwei Lyu,et al. Celeb-DF: A Large-Scale Challenging Dataset for DeepFake Forensics , 2019, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[43] Saeid Nahavandi,et al. Deep Learning for Deepfakes Creation and Detection , 2019, ArXiv.
[44] Sunil Aryal,et al. Unsupervised Deep Features for Privacy Image Classification , 2019, PSIVT.
[45] Tao Mei,et al. Deep Collaborative Embedding for Social Image Understanding , 2019, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[46] Sudipta N. Sinha,et al. Privacy Preserving Image Queries for Camera Localization , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[47] Chuan Qin,et al. Effective reversible data hiding in encrypted image with adaptive encoding strategy , 2019, Inf. Sci..
[48] Di Niu,et al. FDML: A Collaborative Machine Learning Framework for Distributed Features , 2019, KDD.
[49] Liyue Fan,et al. Practical Image Obfuscation with Provable Privacy , 2019, 2019 IEEE International Conference on Multimedia and Expo (ICME).
[50] Chitta Baral,et al. Integrating Knowledge and Reasoning in Image Understanding , 2019, IJCAI.
[51] Chi Lin,et al. VizWiz-Priv: A Dataset for Recognizing the Presence and Purpose of Private Visual Information in Images Taken by Blind People , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[52] David J. Crandall,et al. Can Privacy Be Satisfying?: On Improving Viewer Satisfaction for Privacy-Enhanced Photos Using Aesthetic Transforms , 2019, CHI.
[53] Noboru Babaguchi,et al. Encryption-Free Framework of Privacy-Preserving Image Recognition for Photo-Based Information Services , 2019, IEEE Transactions on Information Forensics and Security.
[54] Xiao Liu,et al. STGAN: A Unified Selective Transfer Network for Arbitrary Image Attribute Editing , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[55] Tao Li,et al. AnonymousNet: Natural Face De-Identification With Measurable Privacy , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[56] Sing Bing Kang,et al. Revealing Scenes by Inverting Structure From Motion Reconstructions , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[57] Ang Li,et al. HideMe: Privacy-Preserving Photo Sharing on Social Networks , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.
[58] Linke Guo,et al. If You Do Not Care About It, Sell It: Trading Location Privacy in Mobile Crowd Sensing , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.
[59] Dariu Gavrila,et al. Privacy Protection in Street-View Panoramas Using Depth and Multi-View Imagery , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[60] K. Balaji,et al. Towards privacy preserving content based image retrieval in cloud computing , 2019 .
[61] Marc Pollefeys,et al. Privacy Preserving Image-Based Localization , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[62] Jacob Whitehill,et al. Privacy-Preserving Annotation of Face Images Through Attribute-Preserving Face Synthesis , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[63] Yan Zhang,et al. Trust-Based Privacy-Preserving Photo Sharing in Online Social Networks , 2019, IEEE Transactions on Multimedia.
[64] Cornelia Caragea,et al. Dynamic Deep Multi-modal Fusion for Image Privacy Prediction , 2019, WWW.
[65] Tianjian Chen,et al. Federated Machine Learning: Concept and Applications , 2019 .
[66] Andreas Rössler,et al. FaceForensics++: Learning to Detect Manipulated Facial Images , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[67] Wei Xiong,et al. Foreground-Aware Image Inpainting , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[68] Sébastien Marcel,et al. DeepFakes: a New Threat to Face Recognition? Assessment and Detection , 2018, ArXiv.
[69] Osamah M. Al-Omair,et al. A Comparative Study on Detection Accuracy of Cloud-Based Emotion Recognition Services , 2018, SPML '18.
[70] Mario Fritz,et al. Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints , 2018, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[71] Veton Kepuska,et al. Automated Facial Expression and Speech Emotion Recognition App Development on Smart Phones using Cloud Computing , 2018, 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).
[72] Wai-tian Tan,et al. Learning Sensitive Images Using Generative Models , 2018, 2018 25th IEEE International Conference on Image Processing (ICIP).
[73] Zhenyu Wu,et al. Towards Privacy-Preserving Visual Recognition via Adversarial Training: A Pilot Study , 2018, ECCV.
[74] Cornelia Caragea,et al. Privacy-Aware Tag Recommendation for Image Sharing , 2018, HT.
[75] Pan Hui,et al. Cardea: context-aware visual privacy protection for photo taking and sharing , 2018, MMSys.
[76] Siwei Lyu,et al. In Ictu Oculi: Exposing AI Generated Fake Face Videos by Detecting Eye Blinking , 2018, ArXiv.
[77] Bernt Schiele,et al. Adversarial Scene Editing: Automatic Object Removal from Weak Supervision , 2018, NeurIPS.
[78] Mthulisi Velempini,et al. Privacy and user awareness on Facebook , 2018, South African Journal of Science.
[79] Richa Singh,et al. Anonymizing k-Facial Attributes via Adversarial Perturbations , 2018, IJCAI.
[80] Larry S. Davis,et al. Learning Rich Features for Image Manipulation Detection , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[81] Andrew Owens,et al. Fighting Fake News: Image Splice Detection via Learned Self-Consistency , 2018, ECCV.
[82] Jianping Fan,et al. Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image Sharing , 2018, IEEE Transactions on Information Forensics and Security.
[83] Cornelia Caragea,et al. On the Use of "Deep" Features for Online Image Sharing , 2018, WWW.
[84] David J. Crandall,et al. Viewer Experience of Obscuring Scene Elements in Photos to Enhance Privacy , 2018, CHI.
[85] Bernt Schiele,et al. A Hybrid Model for Identity Obfuscation by Face Replacement , 2018, ECCV.
[86] Yong Jae Lee,et al. Learning to Anonymize Faces for Privacy Preserving Action Detection , 2018, ECCV.
[87] M. Kosinski,et al. Deep Neural Networks Are More Accurate Than Humans at Detecting Sexual Orientation From Facial Images , 2018, Journal of personality and social psychology.
[88] Xiaofeng Chen,et al. Blockchain-based publicly verifiable data deletion scheme for cloud storage , 2018, J. Netw. Comput. Appl..
[89] Chuan Qin,et al. Visible watermark removal scheme based on reversible data hiding and image inpainting , 2018, Signal Process. Image Commun..
[90] William Puech,et al. An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images , 2018, IEEE Transactions on Information Forensics and Security.
[91] Thomas S. Huang,et al. Generative Image Inpainting with Contextual Attention , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[92] Weiwei Sun,et al. Robust Privacy-Preserving Image Sharing over Online Social Networks (OSNs) , 2018, ACM Trans. Multim. Comput. Commun. Appl..
[93] Bo Wang,et al. Deep Regression Forests for Age Estimation , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[94] Hongxin Hu,et al. Effectiveness and Users' Experience of Obfuscation as a Privacy-Enhancing Technology for Sharing Photos , 2017, Proc. ACM Hum. Comput. Interact..
[95] Tribhuvanesh Orekondy,et al. Connecting Pixels to Privacy and Utility: Automatic Redaction of Private Information in Images , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[96] Jian Yang,et al. FSRNet: End-to-End Learning Face Super-Resolution with Facial Priors , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[97] G. Miklau,et al. A theory of pricing private data , 2017 .
[98] Luc Van Gool,et al. Natural and Effective Obfuscation by Head Inpainting , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[99] Chao Yang,et al. Contextual-Based Image Inpainting: Infer, Match, and Translate , 2017, ECCV.
[100] Landon P. Cox,et al. CamForensics: Understanding Visual Privacy Leaks in the Wild , 2017, SenSys.
[101] Junjun Jiang,et al. Noise Robust Face Image Super-Resolution Through Smooth Sparse Representation , 2017, IEEE Transactions on Cybernetics.
[102] Yao Lu,et al. An automatic visible watermark removal technique using image inpainting algorithms , 2017, 2017 4th International Conference on Systems and Informatics (ICSAI).
[103] Arun Ross,et al. Soft biometric privacy: Retaining biometric utility of face images while perturbing gender , 2017, 2017 IEEE International Joint Conference on Biometrics (IJCB).
[104] B. S. Manjunath,et al. Exploiting Spatial Structure for Localizing Manipulated Image Regions , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[105] Yutao Ma,et al. Privacy-Preserving Outsourced Feature Extractions in the Cloud: A Survey , 2017, IEEE Network.
[106] Torsten Sattler,et al. Efficient & Effective Prioritized Matching for Large-Scale Image-Based Localization , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[107] Christos Anagnostopoulos,et al. Leveraging Edge Computing through Collaborative Machine Learning , 2017, 2017 5th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW).
[108] Ming Dong,et al. Using Ranking-CNN for Age Estimation , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[109] Nina Narodytska,et al. Simple Black-Box Adversarial Attacks on Deep Neural Networks , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[110] Hiroshi Ishikawa,et al. Globally and locally consistent image completion , 2017, ACM Trans. Graph..
[111] Paolo Bestagini,et al. Tampering Detection and Localization Through Clustering of Camera-Based CNN Features , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[112] Meng Wang,et al. Facial Age Estimation With Age Difference , 2017, IEEE Transactions on Image Processing.
[113] Ashwin Machanavajjhala,et al. Protecting Visual Secrets Using Adversarial Nets , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[114] Hongxin Hu,et al. Blur vs. Block: Investigating the Effectiveness of Privacy-Enhancing Obfuscation for Images , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[115] Qingguo Zhou,et al. Intelligent monitor system based on cloud and convolutional neural networks , 2017, The Journal of Supercomputing.
[116] Lukasz Kaiser,et al. Attention is All you Need , 2017, NIPS.
[117] Jose M. Such,et al. Photo Privacy Conflicts in Social Media: A Large-scale Empirical Study , 2017, CHI.
[118] Naixue Xiong,et al. EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing , 2017, Inf. Sci..
[119] Jianping Fan,et al. iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning , 2017, IEEE Transactions on Information Forensics and Security.
[120] Muttukrishnan Rajarajan,et al. Efficient Privacy-Preserving Facial Expression Classification , 2017, IEEE Transactions on Dependable and Secure Computing.
[121] Shi-Jinn Horng,et al. Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs , 2017, IEEE Transactions on Vehicular Technology.
[122] Patrick Pérez,et al. MoFA: Model-Based Deep Convolutional Face Autoencoder for Unsupervised Monocular Reconstruction , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[123] Tribhuvanesh Orekondy,et al. Towards a Visual Privacy Advisor: Understanding and Predicting Privacy Risks in Images , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[124] Seong Joon Oh,et al. Adversarial Image Perturbation for Privacy Protection A Game Theory Perspective , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[125] Hyunsoo Kim,et al. Learning to Discover Cross-Domain Relations with Generative Adversarial Networks , 2017, ICML.
[126] Yuguang Fang,et al. My Privacy My Decision: Control of Photo Sharing on Online Social Networks , 2017, IEEE Transactions on Dependable and Secure Computing.
[127] Wei-Ta Chu,et al. Predicting Occupation from Images by Combining Face and Body Context Information , 2016, ACM Trans. Multim. Comput. Commun. Appl..
[128] Alexander Gude,et al. Sampled Image Tagging and Retrieval Methods on User Generated Content , 2016, BMVC.
[129] Alexei A. Efros,et al. Image-to-Image Translation with Conditional Adversarial Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[130] Cong Wang,et al. SecSIFT: Secure Image SIFT Feature Extraction in Cloud Computing , 2016, ACM Trans. Multim. Comput. Commun. Appl..
[131] Dawn Xiaodong Song,et al. Delving into Transferable Adversarial Examples and Black-box Attacks , 2016, ICLR.
[132] Seyed-Mohsen Moosavi-Dezfooli,et al. Universal Adversarial Perturbations , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[133] Ahmed Ahmim,et al. Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey , 2016, IEEE Communications Surveys & Tutorials.
[134] Christian Ledig,et al. Photo-Realistic Single Image Super-Resolution Using a Generative Adversarial Network , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[135] Oisin Mac Aodha,et al. Unsupervised Monocular Depth Estimation with Left-Right Consistency , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[136] Vitaly Shmatikov,et al. Defeating Image Obfuscation with Deep Learning , 2016, ArXiv.
[137] Nikola Pavesic,et al. De-identification for privacy protection in multimedia content: A survey , 2016, Signal Process. Image Commun..
[138] Kien A. Hua,et al. Field Effect Deep Networks for Image Recognition with Incomplete Data , 2016, ACM Trans. Multim. Comput. Commun. Appl..
[139] Seong Joon Oh,et al. Faceless Person Recognition: Privacy Implications in Social Media , 2016, ECCV.
[140] Justus Thies,et al. Face2Face: Real-Time Face Capture and Reenactment of RGB Videos , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[141] Qinghua Li,et al. PrivacyCamera: Cooperative Privacy-Aware Photographing with Mobile Phones , 2016, 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
[142] Seong Joon Oh,et al. I-Pic: A Platform for Privacy-Compliant Image Capture , 2016, MobiSys.
[143] Ashwin Machanavajjhala,et al. What You Mark is What Apps See , 2016, MobiSys.
[144] Yiannis Kompatsiaris,et al. Personalized Privacy-aware Image Classification , 2016, ICMR.
[145] Bin Liu,et al. PUPPIES: Transformation-Supported Personalized Privacy Preserving Partial Image Sharing , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[146] Gang Hua,et al. Ordinal Regression with Multiple Output CNN for Age Estimation , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[147] Patrick D. McDaniel,et al. Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples , 2016, ArXiv.
[148] Heinrich Hußmann,et al. You Can't Watch This!: Privacy-Respectful Photo Browsing on Smartphones , 2016, CHI.
[149] Kirstie Hawkey,et al. Enhancing Mobile Content Privacy with Proxemics Aware Notifications and Protection , 2016, CHI.
[150] Alexei A. Efros,et al. Context Encoders: Feature Learning by Inpainting , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[151] Li Fei-Fei,et al. Perceptual Losses for Real-Time Style Transfer and Super-Resolution , 2016, ECCV.
[152] Gustavo Carneiro,et al. Unsupervised CNN for Single View Depth Estimation: Geometry to the Rescue , 2016, ECCV.
[153] Jemal H. Abawajy,et al. Privacy Preserving Social Network Data Publication , 2016, IEEE Communications Surveys & Tutorials.
[154] Vitaly Shmatikov,et al. Can we still avoid automatic face detection? , 2016, 2016 IEEE Winter Conference on Applications of Computer Vision (WACV).
[155] Hongxia Jin,et al. Privacy-CNH: A Framework to Detect Photo Privacy with Convolutional Neural Network using Hierarchical Features , 2016, AAAI.
[156] Qingming Huang,et al. Joint Multi-View Representation Learning and Image Tagging , 2016, AAAI.
[157] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[158] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[159] Torsten Sattler,et al. Camera Pose Voting for Large-Scale Image-Based Localization , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[160] Sotiris Ioannidis,et al. Face/Off: Preventing Privacy Leakage From Photos in Social Networks , 2015, CCS.
[161] Xian Wang,et al. An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks , 2015, Inf. Sci..
[162] In-So Kweon,et al. Accurate depth map estimation from a lenslet light field camera , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[163] Sanjeev J. Koppal,et al. Privacy preserving optics for miniature vision sensors , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[164] Kaiming He,et al. Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[165] Alexandros André Chaaraoui,et al. Visual privacy protection methods: A survey , 2015, Expert Syst. Appl..
[166] M. Shamim Hossain,et al. Cloud-Assisted Speech and Face Recognition Framework for Health Monitoring , 2015, Mobile Networks and Applications.
[167] Thomas Brox,et al. U-Net: Convolutional Networks for Biomedical Image Segmentation , 2015, MICCAI.
[168] Christopher Krügel,et al. Portrait of a Privacy Invasion , 2015, Proc. Priv. Enhancing Technol..
[169] H. Jin Kim,et al. Real-time monocular image-based 6-DoF localization , 2015, Int. J. Robotics Res..
[170] Agusti Solanas,et al. Privacy and Security for Multimedia Content shared on OSNs: Issues and Countermeasures , 2015, Comput. J..
[171] K. Ramanjaneyulu,et al. Literature Review on Digital Image Watermarking , 2015, ICARCSET '15.
[172] Joseph K. Liu,et al. Privacy Concerns for Photo Sharing in Online Social Networks , 2015, IEEE Internet Computing.
[173] Dacheng Tao,et al. A Comprehensive Survey on Pose-Invariant Face Recognition , 2015, ACM Trans. Intell. Syst. Technol..
[174] G. Loewenstein,et al. Privacy and human behavior in the age of information , 2015, Science.
[175] Xiaoou Tang,et al. Image Super-Resolution Using Deep Convolutional Networks , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[176] Rajeev Kumar Singh,et al. A Survey: Digital Image Watermarking Techniques , 2014 .
[177] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[178] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[179] Guosheng Lin,et al. Deep convolutional neural fields for depth estimation from a single image , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[180] Xiang-Yang Li,et al. Privacy.tag: privacy concern expressed and respected , 2014, SenSys.
[181] Dumitru Erhan,et al. Going deeper with convolutions , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[182] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[183] Cornelia Caragea,et al. Analyzing images' privacy for the modern web , 2014, HT.
[184] Frank Pallas,et al. Offlinetags: a novel privacy approach to online photo sharing , 2014, CHI Extended Abstracts.
[185] Jose M. Such,et al. BFF: A tool for eliciting tie strength and user communities in social networking services , 2013, Information Systems Frontiers.
[186] Xiaolei Dong,et al. Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..
[187] Ahmed N. Abdalla,et al. Robust Image Watermarking Theories and Techniques: A Review , 2014 .
[188] Sarah Spiekermann,et al. Oblivion on the Web: An Inquiry of User Needs and Technologies , 2014, ECIS.
[189] Alfred Kobsa,et al. Dimensionality of information disclosure behavior , 2013, Int. J. Hum. Comput. Stud..
[190] Jacob M. Victor. The EU General Data Protection Regulation: Toward a Property Regime for Protecting Data Privacy , 2013 .
[191] Lakshminarayanan Subramanian,et al. Cryptagram: photo privacy for online social media , 2013, COSN '13.
[192] Cheryl Brown,et al. An Empirical Investigation of Privacy Awareness and Concerns on Social Networking Sites , 2013 .
[193] Niklas Carlsson,et al. A peer-to-peer agent community for digital oblivion in online social networks , 2013, 2013 Eleventh Annual Conference on Privacy, Security and Trust.
[194] Catuscia Palamidessi,et al. Broadening the Scope of Differential Privacy Using Metrics , 2013, Privacy Enhancing Technologies.
[195] Matthew Smith,et al. Awareness about Photos on the Web and How Privacy-Privacy-Tradeoffs Could Help , 2013, Financial Cryptography Workshops.
[196] Yuval Elovici,et al. Online Social Networks: Threats and Solutions , 2013, IEEE Communications Surveys & Tutorials.
[197] Ramesh Govindan,et al. P3: Toward Privacy-Preserving Photo Sharing , 2013, NSDI.
[198] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[199] Jonathon S. Hare,et al. PicAlert!: a system for privacy-aware image classification and retrieval , 2012, CIKM.
[200] Jonathon S. Hare,et al. Privacy-aware image classification and search , 2012, SIGIR '12.
[201] Aaron Roth,et al. Buying private data at auction: the sensitive surveyor's problem , 2012, SECO.
[202] Blase Ur,et al. Tag, you can see it!: using tags for access control in photo sharing , 2012, CHI.
[203] João Paulo Pesce,et al. Privacy attacks in social media using photo tagging networks: a case study with Facebook , 2012, PSOSM '12.
[204] Michael Backes,et al. X-pire! - A digital expiration date for images in social networks , 2011, ArXiv.
[205] Yang Wang,et al. "I regretted the minute I pressed share": a qualitative study of regrets on Facebook , 2011, SOUPS.
[206] Josep Domingo-Ferrer,et al. Rational enforcement of digital oblivion , 2011, PAIS '11.
[207] Dan Feng,et al. SafeVanish: An Improved Data Self-Destruction for Protecting Data Privacy , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[208] Rui Li,et al. Survey on social tagging techniques , 2010, SKDD.
[209] Aaron Roth,et al. Selling privacy at auction , 2010, EC '11.
[210] Jennifer Neville,et al. Modeling relationship strength in online social networks , 2010, WWW '10.
[211] Heather Richter Lipford,et al. Moving beyond untagging: photo privacy in a tagged world , 2010, CHI.
[212] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[213] Evimaria Terzi,et al. A Framework for Computing the Privacy Scores of Users in Online Social Networks , 2009, 2009 Ninth IEEE International Conference on Data Mining.
[214] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[215] Helen Nissenbaum,et al. Privacy in Context , 2009 .
[216] Amit A. Levy,et al. Vanish: Increasing Data Privacy with Self-Destructing Data , 2009, USENIX Security Symposium.
[217] Nigel Shadbolt,et al. Providing Access Control to Online Photo Albums Based on Tags and Linked Data , 2009, AAAI Spring Symposium: Social Semantic Web: Where Web 2.0 Meets Web 3.0.
[218] Heather Richter Lipford,et al. Strategies and struggles with privacy in an online social networking community , 2008, BCS HCI.
[219] Saikat Guha,et al. NOYB: privacy in online social networks , 2008, WOSN '08.
[220] John G. Breslin,et al. The State of the Art in Tag Ontologies: A Semantic Model for Tagging and Folksonomies , 2008, Dublin Core Conference.
[221] Chris Hanson,et al. Using Dependency Tracking to Provide Explanations for Policy Management , 2008, 2008 IEEE Workshop on Policies for Distributed Systems and Networks.
[222] Heather Richter Lipford,et al. Understanding Privacy Settings in Facebook with an Audience View , 2008, UPSEC.
[223] Mo Chen,et al. Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.
[224] Deirdre K. Mulligan,et al. Respectful cameras: detecting visual markers in real-time to address privacy concerns , 2007, 2007 IEEE/RSJ International Conference on Intelligent Robots and Systems.
[225] Ankur Chattopadhyay,et al. PrivacyCam: a Privacy Preserving Camera Using uCLinux on the Blackfin DSP , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[226] Mor Naaman,et al. Over-exposed?: privacy patterns and considerations in online and mobile photo sharing , 2007, CHI.
[227] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[228] Ray Bernard,et al. Information Lifecycle Security Risk Assessment: A tool for closing security gaps , 2007, Comput. Secur..
[229] Drummond Reed,et al. OpenID 2.0: a platform for user-centric identity management , 2006, DIM '06.
[230] Miroslav Goljan,et al. Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.
[231] Nicholas R. Jennings,et al. An integrated trust and reputation model for open multi-agent systems , 2006, Autonomous Agents and Multi-Agent Systems.
[232] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[233] Alessandro Acquisti,et al. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.
[234] T.E. Boult,et al. PICO: Privacy through Invertible Cryptographic Obscuration , 2005, Computer Vision for Interactive and Intelligent Environment (CVIIE'05).
[235] Tom Petrocelli,et al. Data Protection and Information Lifecycle Management , 2005 .
[236] Ramarathnam Venkatesan,et al. Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[237] Peter Carey,et al. Data Protection: A Practical Guide to UK and EU Law , 2004 .
[238] Paul Dourish,et al. Unpacking "privacy" for a networked world , 2003, CHI '03.
[239] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[240] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[241] R. Gregory,et al. Knowledge in perception and illusion. , 1997, Philosophical transactions of the Royal Society of London. Series B, Biological sciences.
[242] I. Altman. Privacy Regulation: Culturally Universal or Culturally Specific? , 1977 .
[243] J. Neumann. Zur Theorie der Gesellschaftsspiele , 1928 .
[244] Noboru Babaguchi,et al. Unnoticeable synthetic face replacement for image privacy protection , 2021, Neurocomputing.
[245] Anna Cinzia Squicciarini,et al. REMIND: Risk Estimation Mechanism for Images in Network Distribution , 2020, IEEE Transactions on Information Forensics and Security.
[246] H. Jahankhani,et al. Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity , 2020 .
[247] Zifeng Xu,et al. Privacy-Preserving Image Retrieval and Sharing in Social Multimedia Applications , 2020, IEEE Access.
[248] Sheng Wen,et al. Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social Media , 2019, IEEE Access.
[249] Wu-chi Feng,et al. Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption , 2019, IACR Cryptol. ePrint Arch..
[250] Jose L. Hernandez-Ramos,et al. User-Centric Privacy , 2019, Internet of Things Security and Data Protection.
[251] Kelsey Farish. Do deepfakes pose a golden opportunity? Considering whether English law should adopt California's publicity right in the age of the deepfake , 2019, Journal of Intellectual Property Law & Practice.
[252] Cornelia Caragea,et al. A Group-Based Personalized Model for Image Privacy Classification and Labeling , 2017, IJCAI.
[253] Jinhui Tang,et al. Weakly Supervised Deep Matrix Factorization for Social Image Understanding , 2017, IEEE Transactions on Image Processing.
[254] Spyros Kokolakis,et al. Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon , 2017, Comput. Secur..
[255] Sanjay Kumar,et al. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites , 2016 .
[256] Dan Lin,et al. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites , 2015, IEEE Transactions on Knowledge and Data Engineering.
[257] Lynn M. Marvin,et al. Conducting U.S. Discovery in Asia: An Overview of E-Discovery and Asian Privacy Laws , 2015 .
[258] Ajith Abraham,et al. Computational Social Networks: Security and Privacy , 2012 .
[259] Shi-Jinn Horng,et al. A novel intrusion detection system based on hierarchical clustering and support vector machines , 2011, Expert Syst. Appl..
[260] Olli Pitkänen,et al. Users' Awareness of Privacy on Online Social Networking Sites - Case Facebook , 2009, Bled eConference.
[261] Lydia B. Chilton,et al. Tabulator: Exploring and Analyzing linked data on the Semantic Web , 2006 .
[262] R. Lagendijk,et al. Watermarking digital image and video data. A state-of-the-art overview , 2000, IEEE Signal Process. Mag..
[263] Dirk Fox,et al. Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.
[264] Matthew Turk,et al. A Morphable Model For The Synthesis Of 3D Faces , 1999, SIGGRAPH.