{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T19:12:28Z","timestamp":1775243548635,"version":"3.50.1"},"publisher-location":"Cham","reference-count":68,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030012694","type":"print"},{"value":"9783030012700","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01270-0_37","type":"book-chapter","created":{"date-parts":[[2018,10,5]],"date-time":"2018-10-05T18:07:51Z","timestamp":1538762871000},"page":"627-645","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":100,"title":["Towards Privacy-Preserving Visual Recognition via Adversarial Training: A Pilot Study"],"prefix":"10.1007","author":[{"given":"Zhenyu","family":"Wu","sequence":"first","affiliation":[]},{"given":"Zhangyang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhaowen","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hailin","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,6]]},"reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. In:: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 308\u2013318. ACM (2016)","DOI":"10.1145\/2976749.2978318"},{"key":"37_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-642-25446-8_4","volume-title":"Human Behavior Understanding","author":"M Baccouche","year":"2011","unstructured":"Baccouche, M., Mamalet, F., Wolf, C., Garcia, C., Baskurt, A.: Sequential deep learning for human action recognition. In: Salah, A.A., Lepri, B. (eds.) HBU 2011. LNCS, vol. 7065, pp. 29\u201339. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-25446-8_4"},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"Butler, D.J., Huang, J., Roesner, F., Cakmak, M.\": The privacy-utility tradeoff for remotely teleoperated robots. In: Proceedings of the Tenth Annual ACM\/IEEE International Conference on Human-Robot Interaction, pp. 27\u201334. ACM (2015)","DOI":"10.1145\/2696454.2696484"},{"key":"37_CR4","doi-asserted-by":"crossref","unstructured":"Chattopadhyay, A., Boult, T.E.: Privacycam: a privacy preserving camera using uclinux on the blackfin dsp. In: IEEE Conference on Computer Vision and Pattern Recognition, 2007, CVPR 2007, pp. 1\u20138. IEEE (2007)","DOI":"10.1109\/CVPR.2007.383413"},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Chen Chen, Roozbeh Jafari, and Nasser Kehtarnavaz. Action recognition from depth sequences using depth motion maps-based local binary patterns. In: 2015 IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 1092\u20131099. IEEE (2015)","DOI":"10.1109\/WACV.2015.150"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Chen, J., Wu, J., Konrad, J., Ishwar, P.: Semi-coupled two-stream fusion convnets for action recognition at extremely low resolutions. arXiv preprint arXiv:1610.03898 (2016)","DOI":"10.1109\/WACV.2017.23"},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"Cheng, B., et al.: Robust emotion recognition from low quality and low bit rate video: a deep learning approach. In: 2017 Seventh International Conference on Affective Computing and Intelligent Interaction (ACII), pp. 65\u201370. IEEE (2017)","DOI":"10.1109\/ACII.2017.8273580"},{"key":"37_CR8","doi-asserted-by":"crossref","unstructured":"Cormode, G.: Individual privacy vs population privacy: learning to attack anonymization. arXiv preprint arXiv:1011.2511 (2010)","DOI":"10.1145\/2020408.2020598"},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Dai, J., Saghafi, B., Wu, J., Konrad, J., Ishwar, P.: Towards privacy-preserving recognition of human activities. In: 2015 IEEE International Conference on Image Processing (ICIP), pp. 4238\u20134242. IEEE (2015)","DOI":"10.1109\/ICIP.2015.7351605"},{"key":"37_CR10","unstructured":"Desjardins, G., Courville, A., Bengio, Y.: Disentangling factors of variation via generative entangling. arXiv preprint arXiv:1210.5474 (2012)"},{"key":"37_CR11","doi-asserted-by":"crossref","unstructured":"Du, Y., Wang, W., Wang, L.: Hierarchical recurrent neural network for skeleton based action recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1110\u20131118 (2015)","DOI":"10.1109\/CVPR.2015.7298714"},{"key":"37_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C Dwork","year":"2008","unstructured":"Dwork, C.: Differential Privacy: A Survey of Results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1\u201319. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-79228-4_1"},{"key":"37_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-642-03168-7_14","volume-title":"Privacy Enhancing Technologies","author":"Z Erkin","year":"2009","unstructured":"Erkin, Z., Franz, M., Guajardo, J., Katzenbeisser, S., Lagendijk, I., Toft, T.: Privacy-preserving face recognition. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 235\u2013253. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03168-7_14"},{"key":"37_CR14","doi-asserted-by":"crossref","unstructured":"Farokhi, F., Sandberg, H.: Fisher information as a measure of privacy: preserving privacy of households with smart meters using batteries. IEEE Transactions on Smart Grid (2017)","DOI":"10.1109\/TSG.2017.2667702"},{"key":"37_CR15","doi-asserted-by":"crossref","unstructured":"Godard, C., Mac Aodha, O., Brostow, G..J.: Unsupervised monocular depth estimation with left-right consistency. In: CVPR, vol. 2, p. 7 (2017)","DOI":"10.1109\/CVPR.2017.699"},{"key":"37_CR16","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. In: Advances in Neural Information Processing Systems, pp. 2672\u20132680 (2014)"},{"key":"37_CR17","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"issue":"1","key":"37_CR18","first-page":"4704","volume":"18","author":"J Hamm","year":"2017","unstructured":"Hamm, J.: Minimax filter: learning to preserve privacy from inference attacks. J. Mach. Learn. Res. 18(1), 4704\u20134734 (2017)","journal-title":"J. Mach. Learn. Res."},{"key":"37_CR19","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. arXiv preprint arXiv:1512.03385 (2015)","DOI":"10.1109\/CVPR.2016.90"},{"key":"37_CR20","unstructured":"Higgins, I., et al.: Darla: Improving zero-shot transfer in reinforcement learning. arXiv:1707.08475 (2017)"},{"key":"37_CR21","unstructured":"Howard, A.G., et al.: Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861 (2017)"},{"issue":"1","key":"37_CR22","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TPAMI.2012.59","volume":"35","author":"S Ji","year":"2013","unstructured":"Ji, S., Wei, X., Yang, M., Kai, Y.: 3d convolutional neural networks for human action recognition. IEEE Trans. Pattern Anal. Mach. Intell. 35(1), 221\u2013231 (2013)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"1","key":"37_CR23","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1109\/TII.2013.2251892","volume":"10","author":"Li Jia","year":"2014","unstructured":"Jia, L., Radke, R..J.: Using time-of-flight measurements for privacy-preserving tracking in a smart room. IEEE Trans. Ind. Inf. 10(1), 689\u2013696 (2014)","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"37_CR24","doi-asserted-by":"crossref","unstructured":"Johnson, J., Alahi, A., Fei-Fei, L.: Perceptual losses for real-time style transfer and super-resolution. In: European Conference on Computer Vision (2016)","DOI":"10.1007\/978-3-319-46475-6_43"},{"key":"37_CR25","unstructured":"Li, J., Li, S.Z., Pan, Q., Yang, T.: Illumination and motion-based video enhancement for night surveillance. In: 2nd Joint IEEE International Workshop on Visual Surveillance and Performance Evaluation of Tracking and Surveillance, 2005, pp. 169\u2013175. IEEE (2005)"},{"key":"37_CR26","doi-asserted-by":"crossref","unstructured":"Li, Y., Vishwamitra, N., Knijnenburg, B.P., Hu, H., Caine, K.: Blur vs. block: Investigating the effectiveness of privacy-enhancing obfuscation for images. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 1343\u20131351. IEEE (2017)","DOI":"10.1109\/CVPRW.2017.176"},{"key":"37_CR27","unstructured":"Lin, M., Chen, Q., Yan, S.: Network in network. arXiv preprint arXiv:1312.4400 (2013)"},{"key":"37_CR28","unstructured":"Liu, D., Cheng, B., Wang, Z., Zhang, H., Huang, T.S.: Enhance visual recognition under adverse conditions via deep networks. arXiv preprint arXiv:1712.07732 (2017)"},{"key":"37_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-319-10593-2_11","volume-title":"Computer Vision \u2013 ECCV 2014","author":"P Liu","year":"2014","unstructured":"Liu, P., Zhou, J.T., Tsang, I.W.-H., Meng, Z., Han, S., Tong, Y.: Feature disentangling machine - a novel approach of feature selection and disentangling in facial expression analysis. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds.) ECCV 2014. LNCS, vol. 8692, pp. 151\u2013166. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10593-2_11"},{"key":"37_CR30","unstructured":"Mahasseni, B., Todorovic, S., Fern, A.: Budget-aware deep semantic video segmentation"},{"key":"37_CR31","doi-asserted-by":"crossref","unstructured":"Mahendran, A., Vedaldi, A.: Visualizing deep convolutional neural networks using natural pre-images. Int. J. Comput. Vis. (2016)","DOI":"10.1007\/s11263-016-0911-8"},{"key":"37_CR32","unstructured":"McPherson, R., Shokri, R., Shmatikov, V.: Defeating image obfuscation with deep learning. arXiv preprint arXiv:1609.00408 (2016)"},{"key":"37_CR33","doi-asserted-by":"crossref","unstructured":"Mislove, A., Viswanath, B., Gummadi, K.P., Druschel, P.: You are who you know: inferring user profiles in online social networks. In: Proceedings of the Third ACM International Conference on Web Search and Data Mining, pp. 251\u2013260. ACM (2010)","DOI":"10.1145\/1718487.1718519"},{"key":"37_CR34","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: 2009 30th IEEE Symposium on, Security and Privacy, pp. 173\u2013187. IEEE (2009)","DOI":"10.1109\/SP.2009.22"},{"key":"37_CR35","doi-asserted-by":"crossref","unstructured":"Nayar, S.K., Narasimhan, S.G.: Vision in bad weather. In: The Proceedings of the Seventh IEEE International Conference on Computer Vision, 1999, vol. 2, pp. 820\u2013827. IEEE (1999)","DOI":"10.1109\/ICCV.1999.790306"},{"key":"37_CR36","doi-asserted-by":"crossref","unstructured":"Nguyen, A., Yosinski, J., Clune, J.: Deep neural networks are easily fooled: High confidence predictions for unrecognizable images. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 427\u2013436 (2015)","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"37_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-319-46487-9_2","volume-title":"Computer Vision \u2013 ECCV 2016","author":"Seong Joon Oh","year":"2016","unstructured":"Oh, Seong Joon, Benenson, Rodrigo, Fritz, Mario, Schiele, Bernt: Faceless person recognition: privacy implications in social media. In: Leibe, Bastian, Matas, Jiri, Sebe, Nicu, Welling, Max (eds.) ECCV 2016. LNCS, vol. 9907, pp. 19\u201335. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46487-9_2"},{"key":"37_CR38","doi-asserted-by":"crossref","unstructured":"Oh, S.J., Fritz, M., Schiele, B.: Adversarial image perturbation for privacy protection-a game theory perspective. In: International Conference on Computer Vision (ICCV) (2017)","DOI":"10.1109\/ICCV.2017.165"},{"key":"37_CR39","doi-asserted-by":"crossref","unstructured":"Orekondy, T., Schiele, B., Fritz, M.: Towards a visual privacy advisor: understanding and predicting privacy risks in images. In: IEEE International Conference on Computer Vision (ICCV) (2017)","DOI":"10.1109\/ICCV.2017.398"},{"key":"37_CR40","doi-asserted-by":"crossref","unstructured":"Orekondy, T., Schiele, B., Fritz, M., Saarland Informatics Campus: Towards a visual privacy advisor: understanding and predicting privacy risks in images. arXiv preprint arXiv:1703.10660 (2017)","DOI":"10.1109\/ICCV.2017.398"},{"key":"37_CR41","doi-asserted-by":"crossref","unstructured":"Pittaluga, F., Koppal, S.J.: Privacy preserving optics for miniature vision sensors. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 314\u2013324 (2015)","DOI":"10.1109\/CVPR.2015.7298628"},{"issue":"11","key":"37_CR42","doi-asserted-by":"publisher","first-page":"2215","DOI":"10.1109\/TPAMI.2016.2637354","volume":"39","author":"Francesco Pittaluga and Sanjeev Jagannatha Koppal","year":"2017","unstructured":"Francesco Pittaluga and Sanjeev Jagannatha Koppal: Pre-capture privacy for small vision sensors. IEEE Trans. Pattern Anal. Mach. Intell. 39(11), 2215\u20132226 (2017)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"37_CR43","doi-asserted-by":"crossref","unstructured":"Raval, N., Machanavajjhala, A., Cox, L.P.: Protecting visual secrets using adversarial nets. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 1329\u20131332. IEEE (2017)","DOI":"10.1109\/CVPRW.2017.174"},{"key":"37_CR44","doi-asserted-by":"crossref","unstructured":"Ryoo, M.S., Fuchs, T.J., Xia, L., Aggarwal, J.K., Matthies, L.: Robot-centric activity prediction from first-person videos: What will they do to me? In: ACM\/IEEE International Conference on Human-Robot Interaction (HRI), pp. 295\u2013302. Portland, OR (March 2015)","DOI":"10.1145\/2696454.2696462"},{"key":"37_CR45","doi-asserted-by":"crossref","unstructured":"Ryoo, M.S., Matthies, L.: First-person activity recognition: what are they doing to me? In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR). Portland, OR (June 2013)","DOI":"10.1109\/CVPR.2013.352"},{"key":"37_CR46","doi-asserted-by":"crossref","unstructured":"Ryoo, M.S., Kim, K., Yang, H.J.: Extreme low resolution activity recognition with multi-siamese embedding learning. arXiv preprint arXiv:1708.00999 (2017)","DOI":"10.1609\/aaai.v32i1.12299"},{"key":"37_CR47","doi-asserted-by":"crossref","unstructured":"Ryoo, M.S., Rothrock, B., Fleming, C., Yang, H.J.: Privacy-preserving human activity recognition from extreme low resolution (2017)","DOI":"10.1609\/aaai.v31i1.11233"},{"key":"37_CR48","unstructured":"Salimans, T., Goodfellow, I., Zaremba, W., Cheung, V., Radford, A., Chen, X.: Improved techniques for training gans. In: Advances in Neural Information Processing Systems, pp. 2234\u20132242 (2016)"},{"key":"37_CR49","doi-asserted-by":"crossref","unstructured":"Schuldt, C., Laptev, I., Caputo, B.: Recognizing human actions: a local svm approach. In: Proceedings of the 17th International Conference on Pattern Recognition, 2004, ICPR 2004, vol. 3, pp. 32\u201336. IEEE (2004)","DOI":"10.1109\/ICPR.2004.1334462"},{"key":"37_CR50","unstructured":"Sharma, S., Kiros, R., Salakhutdinov, R.: Action recognition using visual attention. arXiv preprint arXiv:1511.04119 (2015)"},{"key":"37_CR51","unstructured":"Siddharth, N., et al.: Learning disentangled representations in deep generative models (2016)"},{"key":"37_CR52","unstructured":"Simonyan, K., Zisserman, A.: Two-stream convolutional networks for action recognition in videos. In: Advances in Neural Information Processing Systems, pp. 568\u2013576 (2014)"},{"key":"37_CR53","unstructured":"Sokolic, J., Qiu, Q., Rodrigues, M.R.D., Sapiro, G.: Learning to succeed while teaching to fail: privacy in closed machine learning systems. arXiv preprint arXiv:1705.08197 (2017)"},{"key":"37_CR54","unstructured":"Soomro, K., Roshan Zamir, A., Shah, M.: Ucf101: a dataset of 101 human actions classes from videos in the wild. arXiv preprint arXiv:1212.0402 (2012)"},{"key":"37_CR55","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z.: Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2818\u20132826 (2016)","DOI":"10.1109\/CVPR.2016.308"},{"key":"37_CR56","unstructured":"Szegedy, C.: Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)"},{"key":"37_CR57","doi-asserted-by":"crossref","unstructured":"Taigman, Y., Yang, M., Ranzato, M.A., Wolf, L.: Deepface: closing the gap to human-level performance in face verification. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2014)","DOI":"10.1109\/CVPR.2014.220"},{"issue":"12","key":"37_CR58","doi-asserted-by":"publisher","first-page":"16920","DOI":"10.3390\/s121216920","volume":"12","author":"S Tao","year":"2012","unstructured":"Tao, S., Kudo, M., Nonaka, H.: Privacy-preserved behavior analysis and fall detection by an infrared ceiling sensor network. Sensors 12(12), 16920\u201316936 (2012)","journal-title":"Sensors"},{"key":"37_CR59","unstructured":"TechCrunch: Amazon\u2019s camera-equipped echo look raises new questions about smart home privacy. http:\/\/alturl.com\/7ewnu"},{"key":"37_CR60","doi-asserted-by":"crossref","unstructured":"Tran, D., Bourdev, L., Fergus, R., Torresani, L., Paluri, M.: Learning spatiotemporal features with 3d convolutional networks. In: 2015 IEEE International Conference on Computer Vision (ICCV), pp. 4489\u20134497. IEEE (2015)","DOI":"10.1109\/ICCV.2015.510"},{"key":"37_CR61","doi-asserted-by":"crossref","unstructured":"Wang, Z., Chang, S., Yang, Y., Liu, D., Huang, T.S.: Studying very low resolution recognition using deep networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2016)","DOI":"10.1109\/CVPR.2016.518"},{"issue":"2","key":"37_CR62","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.cviu.2006.07.013","volume":"104","author":"D Weinland","year":"2006","unstructured":"Weinland, D., Ronfard, R., Boyer, E.: Free viewpoint action recognition using motion history volumes. Comput. Vis. Image Underst. 104(2), 249\u2013257 (2006)","journal-title":"Comput. Vis. Image Underst."},{"key":"37_CR63","doi-asserted-by":"crossref","unstructured":"Winkler, T., Erd\u00e9lyi, A., Rinner, B.: Trusteye. m4: protecting the sensornot the camera. In: 2014 11th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), pp. 159\u2013164. IEEE (2014)","DOI":"10.1109\/AVSS.2014.6918661"},{"key":"37_CR64","unstructured":"Xiang, X., Tran, T.D.: Linear disentangled representation learning for facial actions. arXiv preprint arXiv:1701.03102 (2017)"},{"key":"37_CR65","doi-asserted-by":"crossref","unstructured":"Xie, Y., Xiao, J., Tillo, T., Wei, Y., Zhao, Y.: 3d video super-resolution using fully convolutional neural networks. In: 2016 IEEE International Conference on Multimedia and Expo (ICME), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/ICME.2016.7552931"},{"key":"37_CR66","doi-asserted-by":"crossref","unstructured":"Yonetani, R., Boddeti, V.N., Kitani, K.M., Sato, Y.: Privacy-preserving visual learning using doubly permuted homomorphic encryption. arXiv preprint arXiv:1704.02203 (2017)","DOI":"10.1109\/ICCV.2017.225"},{"key":"37_CR67","doi-asserted-by":"crossref","unstructured":"Yun, K., Honorio, J., Chattopadhyay, D., Berg, T.L., Samaras, D.: Two-person interaction detection using body-pose features and multiple instance learning. In: IEEE Computer Vision and Pattern Recognition Workshops (CVPRW) (2012)","DOI":"10.1109\/CVPRW.2012.6239234"},{"key":"37_CR68","doi-asserted-by":"crossref","unstructured":"Zoph, B., Vasudevan, V., Shlens, J., Le, Q.V.: Learning transferable architectures for scalable image recognition. arXiv preprint arXiv:1707.07012 (2017)","DOI":"10.1109\/CVPR.2018.00907"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2018"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01270-0_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T18:39:38Z","timestamp":1775241578000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-01270-0_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030012694","9783030012700"],"references-count":68,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01270-0_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"6 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Munich","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2018.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}