{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:41:42Z","timestamp":1767339702387,"version":"3.40.3"},"publisher-location":"Cham","reference-count":58,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031197710"},{"type":"electronic","value":"9783031197727"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-19772-7_19","type":"book-chapter","created":{"date-parts":[[2022,10,27]],"date-time":"2022-10-27T22:09:58Z","timestamp":1666908598000},"page":"314-332","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["PrivHAR: Recognizing Human Actions from\u00a0Privacy-Preserving Lens"],"prefix":"10.1007","author":[{"given":"Carlos","family":"Hinojosa","sequence":"first","affiliation":[]},{"given":"Miguel","family":"Marquez","sequence":"additional","affiliation":[]},{"given":"Henry","family":"Arguello","sequence":"additional","affiliation":[]},{"given":"Ehsan","family":"Adeli","sequence":"additional","affiliation":[]},{"given":"Li","family":"Fei-Fei","sequence":"additional","affiliation":[]},{"given":"Juan Carlos","family":"Niebles","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,28]]},"reference":[{"issue":"3","key":"19_CR1","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1109\/TCSVT.2011.2105551","volume":"21","author":"P Agrawal","year":"2011","unstructured":"Agrawal, P., Narayanan, P.: Person de-identification in videos. IEEE Trans. Circuits Syst. Video Technol. 21(3), 299\u2013310 (2011)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"doi-asserted-by":"crossref","unstructured":"Ahmad, Z., Illanko, K., Khan, N., Androutsos, D.: Human action recognition using convolutional neural network and depth sensor data. In: Proceedings of the 2019 International Conference on Information Technology and Computer Communications, pp. 1\u20135 (2019)","key":"19_CR2","DOI":"10.1145\/3355402.3355419"},{"unstructured":"Bommasani, R., et al.: On the opportunities and risks of foundation models. arXiv preprint arXiv:2108.07258 (2021)","key":"19_CR3"},{"unstructured":"Born, M., Wolf, E.: Principles of Optics: Electromagnetic Theory of Propagation, Interference and Diffraction of Light. Elsevier, Amsterdam (2013)","key":"19_CR4"},{"doi-asserted-by":"crossref","unstructured":"Brkic, K., Sikiric, I., Hrkac, T., Kalafatic, Z.: I know that person: generative full body and face de-identification of people in images. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 1319\u20131328. IEEE (2017)","key":"19_CR5","DOI":"10.1109\/CVPRW.2017.173"},{"issue":"1","key":"19_CR6","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1109\/TPAMI.2019.2929257","volume":"43","author":"Z Cao","year":"2019","unstructured":"Cao, Z., Hidalgo, G., Simon, T., Wei, S.E., Sheikh, Y.: OpenPose: realtime multi-person 2d pose estimation using part affinity fields. IEEE TPAMI 43(1), 172\u2013186 (2019)","journal-title":"IEEE TPAMI"},{"key":"19_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2007\/75427","volume":"2007","author":"D Chen","year":"2007","unstructured":"Chen, D., Chang, Y., Yan, R., Yang, J.: Tools for protecting the privacy of specific individuals in video. EURASIP J. Adv. Signal Process. 2007, 1\u20139 (2007)","journal-title":"EURASIP J. Adv. Signal Process."},{"doi-asserted-by":"crossref","unstructured":"Chollet, F.: Xception: deep learning with depthwise separable convolutions. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1251\u20131258 (2017)","key":"19_CR8","DOI":"10.1109\/CVPR.2017.195"},{"unstructured":"Christoph, R., Pinz, F.A.: Spatiotemporal residual networks for video action recognition. In: Advances in Neural Information Processing Systems, pp. 3468\u20133476 (2016)","key":"19_CR9"},{"doi-asserted-by":"crossref","unstructured":"Dave, I.R., Chen, C., Shah, M.: SPAct: self-supervised privacy preservation for action recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 20164\u201320173 (2022)","key":"19_CR10","DOI":"10.1109\/CVPR52688.2022.01953"},{"doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Xue, N., Zafeiriou, S.: ArcFace: additive angular margin loss for deep face recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4690\u20134699 (2019)","key":"19_CR11","DOI":"10.1109\/CVPR.2019.00482"},{"doi-asserted-by":"crossref","unstructured":"Dwibedi, D., Aytar, Y., Tompson, J., Sermanet, P., Zisserman, A.: Counting out time: class agnostic video repetition counting in the wild. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 10387\u201310396 (2020)","key":"19_CR12","DOI":"10.1109\/CVPR42600.2020.01040"},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/978-3-030-58529-7_30","volume-title":"Computer Vision \u2013 ECCV 2020","author":"L Fan","year":"2020","unstructured":"Fan, L., et al.: RubiksNet: learnable 3D-shift for efficient video action recognition. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12364, pp. 505\u2013521. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58529-7_30"},{"key":"19_CR14","volume-title":"Introduction to Fourier Optics","author":"JW Goodman","year":"2017","unstructured":"Goodman, J.W.: Introduction to Fourier Optics, 4th edn. Macmillan Learning, New York (2017)","edition":"4"},{"key":"19_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-319-46487-9_6","volume-title":"Computer Vision \u2013 ECCV 2016","author":"Y Guo","year":"2016","unstructured":"Guo, Y., Zhang, L., Hu, Y., He, X., Gao, J.: MS-Celeb-1M: a dataset and benchmark for large-scale face recognition. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9907, pp. 87\u2013102. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46487-9_6"},{"doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","key":"19_CR16","DOI":"10.1109\/CVPR.2016.90"},{"doi-asserted-by":"crossref","unstructured":"Hinojosa, C., Niebles, J.C., Arguello, H.: Learning privacy-preserving optics for human pose estimation. In: ICCV, pp. 2573\u20132582, October 2021","key":"19_CR17","DOI":"10.1109\/ICCV48922.2021.00257"},{"doi-asserted-by":"crossref","unstructured":"Hore, A., Ziou, D.: Image quality metrics: PSNR vs. SSIM. In: 2010 20th International Conference on Pattern Recognition, pp. 2366\u20132369. IEEE (2010)","key":"19_CR18","DOI":"10.1109\/ICPR.2010.579"},{"unstructured":"Huang, G.B., Mattar, M., Lee, H., Learned-Miller, E.: Learning to align from scratch. In: NIPS (2012)","key":"19_CR19"},{"key":"19_CR20","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.sigpro.2017.08.016","volume":"143","author":"X Ji","year":"2018","unstructured":"Ji, X., Cheng, J., Feng, W., Tao, D.: Skeleton embedded motion body partition for human action recognition using depth sequences. Signal Process. 143, 56\u201368 (2018)","journal-title":"Signal Process."},{"issue":"1","key":"19_CR21","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1109\/TPAMI.2010.68","volume":"33","author":"IN Junejo","year":"2010","unstructured":"Junejo, I.N., Dexter, E., Laptev, I., Perez, P.: View-independent action recognition from temporal self-similarities. IEEE Trans. Pattern Anal. Mach. Intell. 33(1), 172\u2013185 (2010)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"doi-asserted-by":"crossref","unstructured":"Karpathy, A., Toderici, G., Shetty, S., Leung, T., Sukthankar, R., Fei-Fei, L.: Large-scale video classification with convolutional neural networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1725\u20131732 (2014)","key":"19_CR22","DOI":"10.1109\/CVPR.2014.223"},{"doi-asserted-by":"crossref","unstructured":"Kopuklu, O., Kose, N., Gunduz, A., Rigoll, G.: Resource efficient 3d convolutional neural networks. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision Workshops (2019)","key":"19_CR23","DOI":"10.1109\/ICCVW.2019.00240"},{"key":"19_CR24","series-title":"Human\u2013Computer Interaction Series","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-030-82681-9_9","volume-title":"Artificial Intelligence for Human Computer Interaction: A Modern Approach","author":"R Krishna","year":"2021","unstructured":"Krishna, R., Gordon, M., Fei-Fei, L., Bernstein, M.: Visual intelligence through human interaction. In: Li, Y., Hilliges, O. (eds.) Artificial Intelligence for Human Computer Interaction: A Modern Approach. HIS, pp. 257\u2013314. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-82681-9_9"},{"doi-asserted-by":"crossref","unstructured":"Kuehne, H., Jhuang, H., Garrote, E., Poggio, T., Serre, T.: HMDB: a large video database for human motion recognition. In: 2011 International Conference on Computer Vision, pp. 2556\u20132563. IEEE (2011)","key":"19_CR25","DOI":"10.1109\/ICCV.2011.6126543"},{"doi-asserted-by":"crossref","unstructured":"Kupyn, O., Martyniuk, T., Wu, J., Wang, Z.: DeblurGAN-v2: deblurring (orders-of-magnitude) faster and better. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 8878\u20138887 (2019)","key":"19_CR26","DOI":"10.1109\/ICCV.2019.00897"},{"issue":"7","key":"19_CR27","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1080\/09500340.2011.554896","volume":"58","author":"V Lakshminarayanan","year":"2011","unstructured":"Lakshminarayanan, V., Fleck, A.: Zernike polynomials: a guide. J. Mod. Opt. 58(7), 545\u2013561 (2011)","journal-title":"J. Mod. Opt."},{"issue":"2","key":"19_CR28","doi-asserted-by":"publisher","first-page":"3485","DOI":"10.1109\/LRA.2020.2976305","volume":"5","author":"B Liu","year":"2020","unstructured":"Liu, B., et al.: Spatiotemporal relationship reasoning for pedestrian intent prediction. IEEE Robot. Autom. Lett. 5(2), 3485\u20133492 (2020)","journal-title":"IEEE Robot. Autom. Lett."},{"issue":"13","key":"19_CR29","doi-asserted-by":"publisher","first-page":"17795","DOI":"10.1364\/OE.27.017795","volume":"27","author":"M Marquez","year":"2019","unstructured":"Marquez, M., Meza, P., Arguello, H., Vera, E.: Compressive spectral imaging via deformable mirror and colored-mosaic detector. Opt. Express 27(13), 17795\u201317808 (2019)","journal-title":"Opt. Express"},{"issue":"6","key":"19_CR30","doi-asserted-by":"publisher","first-page":"8142","DOI":"10.1364\/OE.415664","volume":"29","author":"M Marquez","year":"2021","unstructured":"Marquez, M., Meza, P., Rojas, F., Arguello, H., Vera, E.: Snapshot compressive spectral depth imaging from coded aberrations. Opt. Express 29(6), 8142\u20138159 (2021)","journal-title":"Opt. Express"},{"doi-asserted-by":"crossref","unstructured":"Metzler, C.A., Ikoma, H., Peng, Y., Wetzstein, G.: Deep optics for single-shot high-dynamic-range imaging. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (2020)","key":"19_CR31","DOI":"10.1109\/CVPR42600.2020.00145"},{"doi-asserted-by":"crossref","unstructured":"Orekondy, T., Schiele, B., Fritz, M.: Towards a visual privacy advisor: understanding and predicting privacy risks in images. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 3686\u20133695 (2017)","key":"19_CR32","DOI":"10.1109\/ICCV.2017.398"},{"issue":"9","key":"19_CR33","doi-asserted-by":"publisher","first-page":"4177","DOI":"10.1016\/j.eswa.2015.01.041","volume":"42","author":"JR Padilla-L\u00f3pez","year":"2015","unstructured":"Padilla-L\u00f3pez, J.R., Chaaraoui, A.A., Fl\u00f3rez-Revuelta, F.: Visual privacy protection methods: a survey. Expert Syst. Appl. 42(9), 4177\u20134195 (2015)","journal-title":"Expert Syst. Appl."},{"doi-asserted-by":"crossref","unstructured":"Panagiotakis, C., Karvounas, G., Argyros, A.: Unsupervised detection of periodic segments in videos. In: 2018 25th IEEE International Conference on Image Processing (ICIP), pp. 923\u2013927. IEEE (2018)","key":"19_CR34","DOI":"10.1109\/ICIP.2018.8451336"},{"issue":"3","key":"19_CR35","doi-asserted-by":"publisher","first-page":"2259","DOI":"10.1007\/s10462-020-09904-8","volume":"54","author":"P Pareek","year":"2021","unstructured":"Pareek, P., Thakkar, A.: A survey on video-based human action recognition: recent updates, datasets, challenges, and applications. Artif. Intell. Rev. 54(3), 2259\u20132322 (2021)","journal-title":"Artif. Intell. Rev."},{"doi-asserted-by":"crossref","unstructured":"Pittaluga, F., Koppal, S., Chakrabarti, A.: Learning privacy preserving encodings through adversarial training. In: 2019 IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 791\u2013799. IEEE (2019)","key":"19_CR36","DOI":"10.1109\/WACV.2019.00089"},{"doi-asserted-by":"crossref","unstructured":"Pittaluga, F., Koppal, S.J.: Privacy preserving optics for miniature vision sensors. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 314\u2013324 (2015)","key":"19_CR37","DOI":"10.1109\/CVPR.2015.7298628"},{"issue":"11","key":"19_CR38","doi-asserted-by":"publisher","first-page":"2215","DOI":"10.1109\/TPAMI.2016.2637354","volume":"39","author":"F Pittaluga","year":"2016","unstructured":"Pittaluga, F., Koppal, S.J.: Pre-capture privacy for small vision sensors. IEEE Trans. Pattern Anal. Mach. Intell. 39(11), 2215\u20132226 (2016)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"doi-asserted-by":"crossref","unstructured":"Purwanto, D., Renanda Adhi Pramono, R., Chen, Y.T., Fang, W.H.: Extreme low resolution action recognition with spatial-temporal multi-head self-attention and knowledge distillation. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision Workshops, p. 0 (2019)","key":"19_CR39","DOI":"10.1109\/ICCVW.2019.00125"},{"key":"19_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1007\/978-3-030-01246-5_38","volume-title":"Computer Vision \u2013 ECCV 2018","author":"Z Ren","year":"2018","unstructured":"Ren, Z., Lee, Y.J., Ryoo, M.S.: Learning to anonymize faces for privacy preserving action detection. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11205, pp. 639\u2013655. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01246-5_38"},{"doi-asserted-by":"crossref","unstructured":"Ryoo, M.S., Kim, K., Yang, H.J.: Extreme low resolution activity recognition with multi-Siamese embedding learning. In: Thirty-Second AAAI Conference on Artificial Intelligence (2018)","key":"19_CR41","DOI":"10.1609\/aaai.v32i1.12299"},{"doi-asserted-by":"crossref","unstructured":"Ryoo, M.S., Rothrock, B., Fleming, C., Yang, H.J.: Privacy-preserving human activity recognition from extreme low resolution. In: AAAI (2017)","key":"19_CR42","DOI":"10.1609\/aaai.v31i1.11233"},{"doi-asserted-by":"crossref","unstructured":"Sandler, M., Howard, A., Zhu, M., Zhmoginov, A., Chen, L.C.: MobileNetV 2: Inverted residuals and linear bottlenecks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4510\u20134520 (2018)","key":"19_CR43","DOI":"10.1109\/CVPR.2018.00474"},{"key":"19_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3197517.3201333","volume":"37","author":"V Sitzmann","year":"2018","unstructured":"Sitzmann, V., et al.: End-to-end optimization of optics and image processing for achromatic extended depth of field and super-resolution imaging. ACM TOG 37, 1\u201313 (2018)","journal-title":"ACM TOG"},{"issue":"8","key":"19_CR45","doi-asserted-by":"publisher","first-page":"2488","DOI":"10.1109\/TIP.2015.2424316","volume":"24","author":"C Sun","year":"2015","unstructured":"Sun, C., Junejo, I.N., Tappen, M., Foroosh, H.: Exploring sparseness and self-similarity for action recognition. IEEE Trans. Image Process. 24(8), 2488\u20132501 (2015)","journal-title":"IEEE Trans. Image Process."},{"doi-asserted-by":"crossref","unstructured":"Szegedy, C., et al.: Going deeper with convolutions. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1\u20139 (2015)","key":"19_CR46","DOI":"10.1109\/CVPR.2015.7298594"},{"doi-asserted-by":"crossref","unstructured":"Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z.: Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2818\u20132826 (2016)","key":"19_CR47","DOI":"10.1109\/CVPR.2016.308"},{"doi-asserted-by":"crossref","unstructured":"Tan, M., et al.: MnasNet: platform-aware neural architecture search for mobile. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2820\u20132828 (2019)","key":"19_CR48","DOI":"10.1109\/CVPR.2019.00293"},{"doi-asserted-by":"crossref","unstructured":"Tran, D., Bourdev, L., Fergus, R., Torresani, L., Paluri, M.: Learning spatiotemporal features with 3d convolutional networks. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 4489\u20134497 (2015)","key":"19_CR49","DOI":"10.1109\/ICCV.2015.510"},{"doi-asserted-by":"crossref","unstructured":"Tran, D., Wang, H., Torresani, L., Feiszli, M.: Video classification with channel-separated convolutional networks. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 5552\u20135561 (2019)","key":"19_CR50","DOI":"10.1109\/ICCV.2019.00565"},{"issue":"3","key":"19_CR51","doi-asserted-by":"publisher","first-page":"395","DOI":"10.2307\/2982890","volume":"155","author":"GJ Upton","year":"1992","unstructured":"Upton, G.J.: Fisher\u2019s exact test. J. R. Stat. Soc. A. Stat. Soc. 155(3), 395\u2013402 (1992)","journal-title":"J. R. Stat. Soc. A. Stat. Soc."},{"issue":"66\u201371","key":"19_CR52","first-page":"13","volume":"10","author":"L Van Der Maaten","year":"2009","unstructured":"Van Der Maaten, L., Postma, E., Van den Herik, J., et al.: Dimensionality reduction: a comparative. J. Mach. Learn. Res. 10(66\u201371), 13 (2009)","journal-title":"J. Mach. Learn. Res."},{"key":"19_CR53","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-319-46484-8_2","volume-title":"Computer Vision \u2013 ECCV 2016","author":"L Wang","year":"2016","unstructured":"Wang, L., et al.: Temporal segment networks: towards good practices for deep action recognition. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9912, pp. 20\u201336. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46484-8_2"},{"issue":"4","key":"19_CR54","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"doi-asserted-by":"crossref","unstructured":"Wang, Z.W., Vineet, V., Pittaluga, F., Sinha, S.N., Cossairt, O., Bing Kang, S.: Privacy-preserving action recognition using coded aperture videos. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops, p. 0 (2019)","key":"19_CR55","DOI":"10.1109\/CVPRW.2019.00007"},{"unstructured":"Wu, Z., Wang, H., Wang, Z., Jin, H., Wang, Z.: Privacy-preserving deep action recognition: an adversarial learning framework and a new dataset. IEEE Trans. Pattern Anal. Mach. Intell. (2020)","key":"19_CR56"},{"key":"19_CR57","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1007\/978-3-030-01270-0_37","volume-title":"Computer Vision \u2013 ECCV 2018","author":"Z Wu","year":"2018","unstructured":"Wu, Z., Wang, Z., Wang, Z., Jin, H.: Towards privacy-preserving visual recognition via adversarial training: a pilot study. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11220, pp. 627\u2013645. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01270-0_37"},{"doi-asserted-by":"crossref","unstructured":"Zagoruyko, S., Komodakis, N.: Wide residual networks. arXiv preprint arXiv:1605.07146 (2016)","key":"19_CR58","DOI":"10.5244\/C.30.87"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-19772-7_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T16:50:32Z","timestamp":1710262232000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-19772-7_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031197710","9783031197727"],"references-count":58,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-19772-7_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"28 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tel Aviv","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Israel","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2022.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5804","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1645","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.21","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.91","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}