{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:35:02Z","timestamp":1761676502659,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319584683"},{"type":"electronic","value":"9783319584690"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58469-0_7","type":"book-chapter","created":{"date-parts":[[2017,5,3]],"date-time":"2017-05-03T11:34:53Z","timestamp":1493811293000},"page":"93-107","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Context-Dependent Privacy-Aware Photo Sharing Based on Machine Learning"],"prefix":"10.1007","author":[{"given":"Lin","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Jo\u00ebl","family":"Theytaz","sequence":"additional","affiliation":[]},{"given":"Touradj","family":"Ebrahimi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,4]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Ahern, S., Eckles, D., Good, N., King, S., Naaman, M., Nair, R.: Over-exposed? Privacy patterns and considerations in online and mobile photo sharing. In: CHI, pp. 357\u2013366. ACM (2007)","key":"7_CR1","DOI":"10.1145\/1240624.1240683"},{"doi-asserted-by":"crossref","unstructured":"Besmer, A., Richter Lipford, H.: Moving beyond untagging: photo privacy in a tagged world. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2010), pp. 1563\u20131572. ACM, New York (2010)","key":"7_CR2","DOI":"10.1145\/1753326.1753560"},{"doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 321\u2013334. IEEE Computer Society, Washington, DC (2007)","key":"7_CR3","DOI":"10.1109\/SP.2007.11"},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.pmcj.2015.01.006","volume":"25","author":"I Bilogrevic","year":"2016","unstructured":"Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., Gazaki, M., Hubaux, J.P.: A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Pervasive Mobile Comput. 25, 125\u2013142 (2016)","journal-title":"Pervasive Mobile Comput."},{"doi-asserted-by":"crossref","unstructured":"Castro, D., Hickson, S., Bettadapura, V., Thomaz, E., Abowd, G., Christensen, H., Essa, I.: Predicting daily activities from egocentric images using deep learning. In: ISWC (2015)","key":"7_CR5","DOI":"10.1145\/2802083.2808398"},{"doi-asserted-by":"crossref","unstructured":"Cutillo, L.A., Molva, R., \u00d6nen, M.: Privacy preserving picture sharing: enforcing usage control in distributed on-line social networks. In: 5th ACM Workshop on Social Network Systems, Bern, Switzerland, April 2012","key":"7_CR6","DOI":"10.1145\/2181176.2181182"},{"unstructured":"Elkan, C.: The foundations of cost-sensitive learning. In: Proceedings of the 17th International Joint Conference on Artificial Intelligence (IJCAI 2001), vol. 2, pp. 973\u2013978. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA (2001)","key":"7_CR7"},{"unstructured":"Friedland, G., Sommer, R.: Cybercasing the joint: on the privacy implications of geo-tagging. In: Proceedings of the 5th USENIX Conference on Hot Topics in Security (HotSec 2010), pp. 1\u20138. USENIX Association, Berkeley (2010)","key":"7_CR8"},{"issue":"1","key":"7_CR9","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: an update. SIGKDD Explor. Newsl. 11(1), 10\u201318 (2009)","journal-title":"SIGKDD Explor. Newsl."},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-319-08506-7_6","volume-title":"Privacy Enhancing Technologies","author":"H Harkous","year":"2014","unstructured":"Harkous, H., Rahman, R., Aberer, K.: C3P: context-aware crowdsourced cloud privacy. In: Cristofaro, E., Murdoch, S.J. (eds.) PETS 2014. LNCS, vol. 8555, pp. 102\u2013122. Springer, Cham (2014). doi:10.1007\/978-3-319-08506-7_6"},{"doi-asserted-by":"crossref","unstructured":"Hu, Y., Kambhampati, L.: What we Instagram: a first analysis of instagram photo content and user types. In: Proceedings of the 8th International Conference on Weblogs and Social Media (ICWSM 2014), pp. 595\u2013598. The AAAI Press (2014)","key":"7_CR11","DOI":"10.1609\/icwsm.v8i1.14578"},{"doi-asserted-by":"crossref","unstructured":"Klemperer, P., Liang, Y., Mazurek, M., Sleeper, M., Ur, B., Bauer, L., Cranor, L.F., Gupta, N., Reiter, M.: Tag, you can see it! Using tags for access control in photo sharing. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2012), pp. 377\u2013386. ACM, New York (2012)","key":"7_CR12","DOI":"10.1145\/2207676.2207728"},{"doi-asserted-by":"crossref","unstructured":"Pesce, J.a.P., Casas, D.L., Rauber, G., Almeida, V.: Privacy attacks in social media using photo tagging networks: a case study with facebook. In: Proceedings of the 1st Workshop on Privacy and Security in Online Social Media (PSOSM 2012), pp. 4:1\u20134:8, New York, NY, USA (2012)","key":"7_CR13","DOI":"10.1145\/2185354.2185358"},{"unstructured":"Ra, M.R., Govindan, R., Ortega, A.: P3: toward privacy-preserving photo sharing. In: Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation, pp. 515\u2013528. USENIX, Berkeley (2013)","key":"7_CR14"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/11428572_9","volume-title":"Pervasive Computing","author":"I Smith","year":"2005","unstructured":"Smith, I., et al.: Social disclosure of place: from location technology to communication practices. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) Pervasive 2005. LNCS, vol. 3468, pp. 134\u2013151. Springer, Heidelberg (2005). doi:10.1007\/11428572_9"},{"doi-asserted-by":"crossref","unstructured":"Tonge, A., Caragea, C.: Image privacy prediction using deep features. In: Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence (2016)","key":"7_CR16","DOI":"10.1609\/aaai.v30i1.9942"},{"doi-asserted-by":"crossref","unstructured":"Tran, L., Kong, D., Jin, H., Liu, J.: Privacy-CNH: a framework to detect photo privacy with convolutional neural network using hierarchical features. In: Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence (2016)","key":"7_CR17","DOI":"10.1609\/aaai.v30i1.10169"},{"issue":"5","key":"7_CR18","first-page":"360","volume":"37","author":"AJ Viera","year":"2005","unstructured":"Viera, A.J., Garrett, J.M., et al.: Understanding interobserver agreement: the kappa statistic. Fam. Med. 37(5), 360\u2013363 (2005)","journal-title":"Fam. Med."},{"doi-asserted-by":"crossref","unstructured":"Wiese, J., Kelley, P.G., Cranor, L.F., Dabbish, L., Hong, J.I., Zimmerman, J.: Are you close with me? Are you nearby? Investigating social groups, closeness, and willingness to share. In: Proceedings of the 13th International Conference on Ubiquitous Computing, pp. 197\u2013206. ACM (2011)","key":"7_CR19","DOI":"10.1145\/2030112.2030140"},{"doi-asserted-by":"crossref","unstructured":"Yuan, L., Korshunov, P., Ebrahimi, T.: Secure JPEG scrambling enabling privacy in photo sharing. In: 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), vol. 04, pp. 1\u20136, May 2015","key":"7_CR20","DOI":"10.1109\/FG.2015.7285022"},{"doi-asserted-by":"crossref","unstructured":"Yuan, L., Ebrahimi, T.: Image transmorphing with JPEG. In: 2015 IEEE International Conference on Image Processing (ICIP), pp. 3956\u20133960, September 2015","key":"7_CR21","DOI":"10.1109\/ICIP.2015.7351547"},{"doi-asserted-by":"crossref","unstructured":"Yuan, L., Korshunov, P., Ebrahimi, T.: Privacy-preserving photo sharing based on a secure JPEG. In: 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 185\u2013190. IEEE (2015)","key":"7_CR22","DOI":"10.1109\/INFCOMW.2015.7179382"},{"doi-asserted-by":"crossref","unstructured":"Yuan, L., McNally, D., Kupcu, A., Ebrahimi, T.: Privacy-preserving photo sharing based on a public key infrastructure. In: Proceedings of SPIE, vol. 9599 (2015)","key":"7_CR23","DOI":"10.1117\/12.2190458"},{"doi-asserted-by":"crossref","unstructured":"Zerr, S., Siersdorfer, S., Hare, J., Demidova, E.: Privacy-aware image classification and search. In: Proceedings of the 35th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2012), pp. 35\u201344, NY, USA. ACM, New York (2012)","key":"7_CR24","DOI":"10.1145\/2348283.2348292"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58469-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,23]],"date-time":"2023-08-23T11:38:00Z","timestamp":1692790680000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58469-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584683","9783319584690"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58469-0_7","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"4 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 May 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 May 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ifipsec.org\/2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}