{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T20:18:13Z","timestamp":1773433093231,"version":"3.50.1"},"publisher-location":"Cham","reference-count":66,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031200700","type":"print"},{"value":"9783031200717","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-20071-7_30","type":"book-chapter","created":{"date-parts":[[2022,11,12]],"date-time":"2022-11-12T05:15:09Z","timestamp":1668230109000},"page":"504-521","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Learning Phase Mask for\u00a0Privacy-Preserving Passive Depth Estimation"],"prefix":"10.1007","author":[{"given":"Zaid","family":"Tasneem","sequence":"first","affiliation":[]},{"given":"Giovanni","family":"Milione","sequence":"additional","affiliation":[]},{"given":"Yi-Hsuan","family":"Tsai","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Ashok","family":"Veeraraghavan","sequence":"additional","affiliation":[]},{"given":"Manmohan","family":"Chandraker","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Pittaluga","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,13]]},"reference":[{"key":"30_CR1","unstructured":"Alhashim, I., Wonka, P.: High quality monocular depth estimation via transfer learning. arXiv preprint arXiv:1812.11941 (2018)"},{"key":"30_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1007\/978-3-030-11009-3_34","volume-title":"Computer Vision \u2013 ECCV 2018 Workshops","author":"M Alvi","year":"2019","unstructured":"Alvi, M., Zisserman, A., Nell\u00e5ker, C.: Turning a blind eye: explicit removal of biases and variation from deep neural network embeddings. In: Leal-Taix\u00e9, L., Roth, S. (eds.) ECCV 2018. LNCS, vol. 11129, pp. 556\u2013572. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-11009-3_34"},{"issue":"1","key":"30_CR3","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1525840.1525846","volume":"2","author":"S Beach","year":"2009","unstructured":"Beach, S., Schulz, R., Downs, J., Matthews, J., Barron, B., Seelman, K.: Disability, age, and informational privacy attitudes in quality of life technology applications: results from a national web survey. ACM Trans. Access. Comput. 2(1), 5 (2009)","journal-title":"ACM Trans. Access. Comput."},{"issue":"7","key":"30_CR4","doi-asserted-by":"publisher","first-page":"1618","DOI":"10.1109\/TPAMI.2020.2987489","volume":"42","author":"V Boominathan","year":"2020","unstructured":"Boominathan, V., Adams, J.K., Robinson, J.T., Veeraraghavan, A.: PhlatCam: designed phase-mask based thin lensless camera. IEEE Trans. Pattern Anal. Mach. Intell. 42(7), 1618\u20131629 (2020)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Cao, Q., Shen, L., Xie, W., Parkhi, O.M., Zisserman, A.: Vggface2: a dataset for recognising faces across pose and age. In: 2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018), pp. 67\u201374 (2018)","DOI":"10.1109\/FG.2018.00020"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Carreira, J., Zisserman, A.: Quo vadis, action recognition? A new model and the kinetics dataset. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 6299\u20136308 (2017)","DOI":"10.1109\/CVPR.2017.502"},{"key":"30_CR7","unstructured":"Chakrabarti, A.: Learning sensor multiplexing design through back-propagation. In: 30th Conference on Advances in Neural Information Processing Systems, pp. 3081\u20133089 (2016)"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Chang, J., Wetzstein, G.: Deep optics for monocular depth estimation and 3D object detection. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 10193\u201310202 (2019)","DOI":"10.1109\/ICCV.2019.01029"},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"Chen, J., Konrad, J., Ishwar, P.: VGAN-based image representation learning for privacy-preserving facial expression recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 1570\u20131579 (2018)","DOI":"10.1109\/CVPRW.2018.00207"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Chhabra, S., Singh, R., Vatsa, M., Gupta, G.: Anonymizing k-facial attributes via adversarial perturbations. arXiv preprint arXiv:1805.09380 (2018)","DOI":"10.24963\/ijcai.2018\/91"},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"Dai, J., Wu, J., Saghafi, B., Konrad, J., Ishwar, P.: Towards privacy-preserving activity recognition using extremely low temporal and spatial resolution cameras. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 68\u201376 (2015)","DOI":"10.1109\/CVPRW.2015.7301356"},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: IEEE Conference on Computer Vision and Pattern Recognition, 2009. CVPR 2009, pp. 248\u2013255 (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"30_CR13","unstructured":"Dosovitskiy, A., Brox, T.: Generating images with perceptual similarity metrics based on deep networks. In: Advances in Neural Information Processing Systems, pp. 658\u2013666 (2016)"},{"key":"30_CR14","doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: International Conference on Theory and Applications of Models of Computation, pp. 1\u201319 (2008)","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"30_CR15","doi-asserted-by":"crossref","unstructured":"Erd\u00e9lyi, A., Bar\u00e1t, T., Valet, P., Winkler, T., Rinner, B.: Adaptive cartooning for privacy protection in camera networks. In: 2014 11th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), pp. 44\u201349 (2014)","DOI":"10.1109\/AVSS.2014.6918642"},{"key":"30_CR16","doi-asserted-by":"crossref","unstructured":"Fu, H., Gong, M., Wang, C., Batmanghelich, K., Tao, D.: Deep ordinal regression network for monocular depth estimation. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2002\u20132011 (2018)","DOI":"10.1109\/CVPR.2018.00214"},{"key":"30_CR17","unstructured":"Goodman, J.W.: Introduction to Fourier Optics. Roberts and Company Publishers, Englewood (2005)"},{"issue":"3","key":"30_CR18","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1109\/TCI.2018.2849326","volume":"4","author":"H Haim","year":"2018","unstructured":"Haim, H., Elmalem, S., Giryes, R., Bronstein, A.M., Marom, E.: Depth estimation from a single image using deep learned phase coded mask. IEEE Trans. Comput. Imag. 4(3), 298\u2013310 (2018)","journal-title":"IEEE Trans. Comput. Imag."},{"issue":"9","key":"30_CR19","doi-asserted-by":"publisher","first-page":"4676","DOI":"10.1109\/TIP.2018.2832296","volume":"27","author":"L He","year":"2018","unstructured":"He, L., Wang, G., Hu, Z.: Learning depth from single images with deep neural network embedding focal length. IEEE Trans. Image Process. 27(9), 4676\u20134689 (2018)","journal-title":"IEEE Trans. Image Process."},{"key":"30_CR20","unstructured":"Hinojosa, C., Niebles, J.C., Arguello, H.: Learning privacy-preserving optics for human pose estimation. In: Proceedings of the IEEE\/CVF International Conference"},{"key":"30_CR21","unstructured":"Hinojosa, C., Niebles, J.C., Arguello, H.: Learning privacy-preserving optics for human pose estimation. In: Proceedings of the IEEE\/CVF International Conference"},{"key":"30_CR22","unstructured":"Huang, G.B., Ramesh, M., Berg, T., Learned-Miller, E.: Labeled faces in the wild: a database for studying face recognition in unconstrained environments. Tech. Rep. 07\u201349, University of Massachusetts, Amherst, October 2007"},{"key":"30_CR23","first-page":"109430U","volume":"10943","author":"Y Jeong","year":"2019","unstructured":"Jeong, Y., Yoo, D.H., Cho, J., Lee, B.: Optic design and image processing considering angle of incidence via end-to-end optimization method. Ultra-High-Defi. Imag Syst. II 10943, 109430U (2019)","journal-title":"Ultra-High-Defi. Imag Syst. II"},{"key":"30_CR24","doi-asserted-by":"crossref","unstructured":"Jia, S., Lansdall-Welfare, T., Cristianini, N.: Right for the right reason: training agnostic networks. In: International Symposium on Intelligent Data Analysis, pp. 164\u2013174 (2018)","DOI":"10.1007\/978-3-030-01768-2_14"},{"key":"30_CR25","doi-asserted-by":"crossref","unstructured":"Kim, B., Kim, H., Kim, K., Kim, S., Kim, J.: Learning not to learn: training deep neural networks with biased data. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 9012\u20139020 (2019)","DOI":"10.1109\/CVPR.2019.00922"},{"key":"30_CR26","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"},{"key":"30_CR27","doi-asserted-by":"crossref","unstructured":"Ledig, C., et al.: Photo-realistic single image super-resolution using a generative adversarial network. In: CVPR, vol. 2 (2017)","DOI":"10.1109\/CVPR.2017.19"},{"key":"30_CR28","doi-asserted-by":"crossref","unstructured":"Liu, J., Shahroudy, A., Perez, M.L., Wang, G., Duan, L.Y., Chichung, A.K.: Ntu RGB+ D 120: a large-scale benchmark for 3D human activity understanding. IEEE Trans. Pattern Anal. Mach. Intell. (2019)","DOI":"10.1109\/TPAMI.2019.2916873"},{"key":"30_CR29","doi-asserted-by":"crossref","unstructured":"Long, J., Shelhamer, E., Darrell, T.: Fully convolutional networks for semantic segmentation. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2014)","DOI":"10.1109\/CVPR.2015.7298965"},{"key":"30_CR30","doi-asserted-by":"crossref","unstructured":"Metzler, C.A., Ikoma, H., Peng, Y., Wetzstein, G.: Deep optics for single-shot high-dynamic-range imaging. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 1375\u20131385 (2020)","DOI":"10.1109\/CVPR42600.2020.00145"},{"key":"30_CR31","doi-asserted-by":"crossref","unstructured":"Mirjalili, V., Raschka, S., Ross, A.: Gender privacy: an ensemble of semi adversarial networks for confounding arbitrary gender classifiers. In: 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1\u201310 (2018)","DOI":"10.1109\/BTAS.2018.8698605"},{"key":"30_CR32","doi-asserted-by":"publisher","first-page":"99735","DOI":"10.1109\/ACCESS.2019.2924619","volume":"7","author":"V Mirjalili","year":"2019","unstructured":"Mirjalili, V., Raschka, S., Ross, A.: Flowsan: privacy-enhancaing semi-adversarial networks to confound arbitrary face-based gender classifiers. IEEE Access 7, 99735\u201399745 (2019)","journal-title":"IEEE Access"},{"key":"30_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1007\/978-3-642-33715-4_54","volume-title":"Computer Vision \u2013 ECCV 2012","author":"N Silberman","year":"2012","unstructured":"Silberman, N., Hoiem, D., Kohli, P., Fergus, R.: Indoor segmentation and support inference from rgbd images. In: Fitzgibbon, A., Lazebnik, S., Perona, P., Sato, Y., Schmid, C. (eds.) ECCV 2012. LNCS, vol. 7576, pp. 746\u2013760. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33715-4_54"},{"key":"30_CR34","doi-asserted-by":"crossref","unstructured":"Nawaz, T., Rinner, B., Ferryman, J.: User-centric, embedded vision-based human monitoring: a concept and a healthcare use case. In: Proceedings of the 10th International Conference on Distributed Smart Camera, pp. 25\u201330 (2016)","DOI":"10.1145\/2967413.2967422"},{"key":"30_CR35","unstructured":"Neustaedter, C.G., Greenberg, S.: Balancing privacy and awareness in home media spaces. In: Citeseer (2003)"},{"key":"30_CR36","doi-asserted-by":"crossref","unstructured":"Nguyen Canh, T., Nagahara, H.: Deep compressive sensing for visual privacy protection in Flatcam imaging. In: Proceedings of the IEEE International Conference on Computer Vision Workshops, pp. 0\u20130 (2019)","DOI":"10.1109\/ICCVW.2019.00492"},{"issue":"9","key":"30_CR37","doi-asserted-by":"publisher","first-page":"4177","DOI":"10.1016\/j.eswa.2015.01.041","volume":"42","author":"JR Padilla-L\u00f3pez","year":"2015","unstructured":"Padilla-L\u00f3pez, J.R., Chaaraoui, A.A., Fl\u00f3rez-Revuelta, F.: Visual privacy protection methods: A survey. Expert Syst. Appl. 42(9), 4177\u20134195 (2015)","journal-title":"Expert Syst. Appl."},{"key":"30_CR38","doi-asserted-by":"crossref","unstructured":"Phan, B., Mannan, F., Heide, F.: Adversarial imaging pipelines. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 16051\u201316061 (2021)","DOI":"10.1109\/CVPR46437.2021.01579"},{"key":"30_CR39","doi-asserted-by":"crossref","unstructured":"Pittaluga, F., Koppal, S., Chakrabarti, A.: Learning privacy preserving encodings through adversarial training. In: 2019 IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 791\u2013799 (2019)","DOI":"10.1109\/WACV.2019.00089"},{"key":"30_CR40","doi-asserted-by":"crossref","unstructured":"Pittaluga, F., Koppal, S.J.: Privacy preserving optics for miniature vision sensors. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 314\u2013324 (2015)","DOI":"10.1109\/CVPR.2015.7298628"},{"issue":"11","key":"30_CR41","doi-asserted-by":"publisher","first-page":"2215","DOI":"10.1109\/TPAMI.2016.2637354","volume":"39","author":"F Pittaluga","year":"2016","unstructured":"Pittaluga, F., Koppal, S.J.: Pre-capture privacy for small vision sensors. IEEE Trans. Pattern Anal. Mach. Intell. 39(11), 2215\u20132226 (2016)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"30_CR42","doi-asserted-by":"crossref","unstructured":"Pittaluga, F., Zivkovic, A., Koppal, S.J.: Sensor-level privacy for thermal cameras. In: 2016 IEEE International Conference on Computational Photography (ICCP), pp. 1\u201312 (2016)","DOI":"10.1109\/ICCPHOT.2016.7492877"},{"key":"30_CR43","doi-asserted-by":"crossref","unstructured":"Ranftl, R., Bochkovskiy, A., Koltun, V.: Vision transformers for dense prediction. ArXiv preprint (2021)","DOI":"10.1109\/ICCV48922.2021.01196"},{"key":"30_CR44","doi-asserted-by":"crossref","unstructured":"Ranftl, R., Lasinger, K., Hafner, D., Schindler, K., Koltun, V.: Towards robust monocular depth estimation: mixing datasets for zero-shot cross-dataset transfer. IEEE Trans. Pattern Anal. Mach. Intell.44, 1623\u20131637 (2020)","DOI":"10.1109\/TPAMI.2020.3019967"},{"key":"30_CR45","unstructured":"Sattar, H., Krombholz, K., Pons-Moll, G., Fritz, M.: Shape evasion: Preventing body shape inference of multi-stage approaches. arXiv preprint arXiv:1905.11503 (2019)"},{"key":"30_CR46","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)"},{"issue":"4","key":"30_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3197517.3201333","volume":"37","author":"V Sitzmann","year":"2018","unstructured":"Sitzmann, V., et al.: End-to-end optimization of optics and image processing for achromatic extended depth of field and super-resolution imaging. ACM Trans. Graph. 37(4), 1\u201313 (2018)","journal-title":"ACM Trans. Graph."},{"key":"30_CR48","doi-asserted-by":"crossref","unstructured":"Sun, Q., Tseng, E., Fu, Q., Heidrich, W., Heide, F.: Learning rank-1 diffractive optics for single-shot high dynamic range imaging. In: Proceedings of the IEEE\/CVF conference on Computer Vision and Pattern Recognition, pp. 1386\u20131396 (2020)","DOI":"10.1109\/CVPR42600.2020.00146"},{"key":"30_CR49","doi-asserted-by":"crossref","unstructured":"Tan, J., et al.: Canopic: Pre-digital privacy-enhancing encodings for computer vision. In: 2020 IEEE International Conference on Multimedia and Expo (ICME), pp. 1\u20136 (2020)","DOI":"10.1109\/ICME46284.2020.9102956"},{"key":"30_CR50","unstructured":"Tan, M., Le, Q.: EfficientNet: rethinking model scaling for convolutional neural networks. In: International Conference on Machine Learning, pp. 6105\u20136114 (2019)"},{"issue":"2","key":"30_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3446791","volume":"40","author":"E Tseng","year":"2021","unstructured":"Tseng, E., et al.: Differentiable compound optics and processing pipeline optimization for end-to-end camera design. ACM Trans. Graph. 40(2), 1\u201319 (2021)","journal-title":"ACM Trans. Graph."},{"key":"30_CR52","doi-asserted-by":"crossref","unstructured":"Wang, H., et al.:Off-axis holography with uniform illumination via 3D printed diffractive optical elements. Adv. Opt. Mater.7(12), 1900068 (2019)","DOI":"10.1002\/adom.201900068"},{"key":"30_CR53","doi-asserted-by":"crossref","unstructured":"Wang, L., Zhang, J., Wang, O., Lin, Z., Lu, H.: SDC-depth: semantic divide-and-conquer network for monocular depth estimation. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 541\u2013550 (2020)","DOI":"10.1109\/CVPR42600.2020.00062"},{"issue":"4","key":"30_CR54","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"30_CR55","doi-asserted-by":"crossref","unstructured":"Wang, Z.W., Vineet, V., Pittaluga, F., Sinha, S.N., Cossairt, O., Bing Kang, S.: Privacy-preserving action recognition using coded aperture videos. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops (2019)","DOI":"10.1109\/CVPRW.2019.00007"},{"key":"30_CR56","doi-asserted-by":"crossref","unstructured":"Winkler, T., Erd\u00e9lyi, A., Rinner, B.: TrustEYE. M4: protecting the sensor-not the camera. In: 2014 11th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), pp. 159\u2013164 (2014)","DOI":"10.1109\/AVSS.2014.6918661"},{"key":"30_CR57","doi-asserted-by":"crossref","unstructured":"Wu, Y., Boominathan, V., Chen, H., Sankaranarayanan, A., Veeraraghavan, A.: Phasecam3d-learning phase masks for passive single view depth estimation. In: 2019 IEEE International Conference on Computational Photoagraphy (ICCP), pp. 1\u201312. IEEE (2019)","DOI":"10.1109\/ICCPHOT.2019.8747330"},{"key":"30_CR58","unstructured":"Wu, Y., Yang, F., Ling, H.: Privacy-protective-GAN for face de-identification. arXiv preprint arXiv:1806.08906 (2018)"},{"key":"30_CR59","doi-asserted-by":"crossref","unstructured":"Xia, Z., Sullivan, P., Chakrabarti, A.: Generating and exploiting probabilistic monocular depth estimates. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 65\u201374 (2020)","DOI":"10.1109\/CVPR42600.2020.00014"},{"key":"30_CR60","doi-asserted-by":"crossref","unstructured":"Xian, K., et al.: Monocular relative depth perception with web stereo data supervision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 311\u2013320 (2018)","DOI":"10.1109\/CVPR.2018.00040"},{"key":"30_CR61","doi-asserted-by":"crossref","unstructured":"Xiao, T., Tsai, Y.H., Sohn, K., Chandraker, M., Yang, M.H.: Adversarial learning of privacy-preserving and task-oriented representations. In: Proceedings of the AAAI Conference on Artificial Intelligence (2020)","DOI":"10.1609\/aaai.v34i07.6930"},{"key":"30_CR62","doi-asserted-by":"crossref","unstructured":"Xie, S., Girshick, R., Doll\u00e1r, P., Tu, Z., He, K.: Aggregated residual transformations for deep neural networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1492\u20131500 (2017)","DOI":"10.1109\/CVPR.2017.634"},{"issue":"2","key":"30_CR63","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3298981","volume":"10","author":"Q Yang","year":"2019","unstructured":"Yang, Q., Liu, Y., Chen, T., Tong, Y.: Federated machine learning: Concept and applications. ACM Trans. Intell. Syst. Technol. 10(2), 1\u201319 (2019)","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"30_CR64","doi-asserted-by":"crossref","unstructured":"Yin, W., Liu, Y., Shen, C., Yan, Y.: Enforcing geometric constraints of virtual normal for depth prediction. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 5684\u20135693 (2019)","DOI":"10.1109\/ICCV.2019.00578"},{"issue":"10","key":"30_CR65","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","volume":"23","author":"K Zhang","year":"2016","unstructured":"Zhang, K., Zhang, Z., Li, Z., Qiao, Y.: Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Proacess. Lett. 23(10), 1499\u20131503 (2016)","journal-title":"IEEE Signal Proacess. Lett."},{"issue":"11","key":"30_CR66","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1080\/15459620500324727","volume":"2","author":"Z Zhuang","year":"2005","unstructured":"Zhuang, Z., Bradtmiller, B.: Head-and-face anthropometric survey of us respirator users. J. Occup. Environ. Hyg. 2(11), 567\u2013576 (2005)","journal-title":"J. Occup. Environ. Hyg."}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-20071-7_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,12]],"date-time":"2022-11-12T05:26:14Z","timestamp":1668230774000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-20071-7_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031200700","9783031200717"],"references-count":66,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-20071-7_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"13 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tel Aviv","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Israel","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2022.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5804","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1645","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.21","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.91","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}