{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T23:48:15Z","timestamp":1776469695403,"version":"3.51.2"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T00:00:00Z","timestamp":1741651200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T00:00:00Z","timestamp":1741651200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"DOI":"10.1007\/s11227-025-07134-9","type":"journal-article","created":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T15:14:07Z","timestamp":1741706047000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Controllable face soft-biometric privacy enhancement based on attribute disentanglement"],"prefix":"10.1007","volume":"81","author":[{"given":"Weidi","family":"Huang","sequence":"first","affiliation":[]},{"given":"Zhiqiang","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Biao","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Zheyu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,11]]},"reference":[{"issue":"11s","key":"7134_CR1","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/3510579","volume":"54","author":"P Delgado-Santos","year":"2022","unstructured":"Delgado-Santos P, Stragapede G, Tolosana R, Guest RM, Deravi F, Vera-Rodr\u00edguez R (2022) A survey of privacy vulnerabilities of mobile device sensors. ACM Comput Surv 54(11s):224\u2013122430. https:\/\/doi.org\/10.1145\/3510579","journal-title":"ACM Comput Surv"},{"issue":"3","key":"7134_CR2","doi-asserted-by":"publisher","first-page":"1252","DOI":"10.3390\/S23031252","volume":"23","author":"E Rodr\u00edguez","year":"2023","unstructured":"Rodr\u00edguez E, Otero B, Canal R (2023) A survey of machine and deep learning methods for privacy protection in the internet of things. Sensors 23(3):1252. https:\/\/doi.org\/10.3390\/S23031252","journal-title":"Sensors"},{"issue":"25","key":"7134_CR3","doi-asserted-by":"publisher","first-page":"66223","DOI":"10.1007\/S11042-023-17944-9","volume":"83","author":"T Zhang","year":"2024","unstructured":"Zhang T, Tan Z (2024) Survey of deep emotion recognition in dynamic data using facial, speech and textual cues. Multim Tools Appl 83(25):66223\u201366262. https:\/\/doi.org\/10.1007\/S11042-023-17944-9","journal-title":"Multim Tools Appl"},{"key":"7134_CR4","doi-asserted-by":"publisher","unstructured":"Raj R, Balakrishna S, Shruthi ML, Kulal DH, Singh S (2022) A survey on machine learning-based facial recognition algorithm. In: 2022 International Conference on Smart Technologies and Systems for Next Generation Computing (ICSTSN). pp. 1\u20137. https:\/\/doi.org\/10.1109\/ICSTSN53084.2022.9761288","DOI":"10.1109\/ICSTSN53084.2022.9761288"},{"issue":"3","key":"7134_CR5","doi-asserted-by":"publisher","first-page":"1179","DOI":"10.1007\/S10796-022-10271-8","volume":"25","author":"S Gupta","year":"2023","unstructured":"Gupta S, Modgil S, Lee C, Sivarajah U (2023) The future is yesterday: use of AI-driven facial recognition to enhance value in the travel and tourism industry. Inf Syst Front 25(3):1179\u20131195. https:\/\/doi.org\/10.1007\/S10796-022-10271-8","journal-title":"Inf Syst Front"},{"key":"7134_CR6","doi-asserted-by":"publisher","unstructured":"Greiffenhagen C, Xu X, Reeves S (2023) The work to make facial recognition work. In: Proceedings of the ACM on Human-Computer Interaction, vol 7, no CSCW1. https:\/\/doi.org\/10.1145\/3579531","DOI":"10.1145\/3579531"},{"key":"7134_CR7","doi-asserted-by":"publisher","first-page":"34390","DOI":"10.1109\/ACCESS.2024.3370437","volume":"12","author":"I Deandres-Tame","year":"2024","unstructured":"Deandres-Tame I, Tolosana R, Vera-Rodriguez R, Morales A, Fierrez J, Ortega-Garcia J (2024) How good is ChatGPT at face biometrics? A first look into recognition, soft biometrics, and explainability. IEEE Access 12:34390\u201334401. https:\/\/doi.org\/10.1109\/ACCESS.2024.3370437","journal-title":"IEEE Access"},{"key":"7134_CR8","doi-asserted-by":"publisher","unstructured":"Melzi P, Rathgeb C, Tolosana R, Vera-Rodriguez R, Busch C (2024) An overview of privacy-enhancing technologies in biometric recognition. 56(12). https:\/\/doi.org\/10.1145\/3664596","DOI":"10.1145\/3664596"},{"issue":"7","key":"7134_CR9","doi-asserted-by":"publisher","first-page":"4957","DOI":"10.1109\/TPAMI.2024.3362821","volume":"46","author":"I Joshi","year":"2024","unstructured":"Joshi I, Grimmer M, Rathgeb C, Busch C, Bremond F, Dantcheva A (2024) Synthetic data in human analysis: a survey. IEEE Trans Pattern Anal Mach Intell 46(7):4957\u20134976. https:\/\/doi.org\/10.1109\/TPAMI.2024.3362821","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"5","key":"7134_CR10","doi-asserted-by":"publisher","first-page":"15151","DOI":"10.1007\/S11042-021-10622-8","volume":"83","author":"B Hassan","year":"2024","unstructured":"Hassan B, Izquierdo E, Piatrik T (2024) Soft biometrics: a survey. Multim Tools Appl 83(5):15151\u201315194. https:\/\/doi.org\/10.1007\/S11042-021-10622-8","journal-title":"Multim Tools Appl"},{"key":"7134_CR11","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. Adv Neural Inf Process Syst 27"},{"key":"7134_CR12","doi-asserted-by":"publisher","first-page":"9400","DOI":"10.1109\/TIP.2020.3024026","volume":"29","author":"V Mirjalili","year":"2020","unstructured":"Mirjalili V, Raschka S, Ross A (2020) PrivacyNet: semi-adversarial networks for multi-attribute face privacy. IEEE Trans Image Process 29:9400\u20139412. https:\/\/doi.org\/10.1109\/TIP.2020.3024026","journal-title":"IEEE Trans Image Process"},{"issue":"18","key":"7134_CR13","doi-asserted-by":"publisher","first-page":"17568","DOI":"10.1109\/JIOT.2022.3155878","volume":"9","author":"D Tang","year":"2022","unstructured":"Tang D, Zhou S, Jiang H, Chen H, Liu Y (2022) Gender-adversarial networks for face privacy preserving. IEEE Internet Things J 9(18):17568\u201317576. https:\/\/doi.org\/10.1109\/JIOT.2022.3155878","journal-title":"IEEE Internet Things J"},{"key":"7134_CR14","doi-asserted-by":"publisher","first-page":"3074","DOI":"10.1109\/TIFS.2023.3274359","volume":"18","author":"Y Zhang","year":"2023","unstructured":"Zhang Y, Wang T, Zhao R, Wen W, Zhu Y (2023) RAPP: reversible privacy preservation for various face attributes. IEEE Trans Inf Forensics Secur 18:3074\u20133087. https:\/\/doi.org\/10.1109\/TIFS.2023.3274359","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"7134_CR15","doi-asserted-by":"publisher","unstructured":"Terh\u00f6rst P, Damer N, Kirchbuchner F, Kuijper A (2019) Suppressing gender and age in face templates using incremental variable elimination. In: 2019 International Conference on Biometrics (ICB). pp 1\u20138. https:\/\/doi.org\/10.1109\/ICB45273.2019.8987331","DOI":"10.1109\/ICB45273.2019.8987331"},{"key":"7134_CR16","doi-asserted-by":"publisher","unstructured":"Melzi P, Shahreza HO, Rathgeb C, Tolosana R, Vera-Rodriguez R, Fierrez J, Marcel S, Busch C (2023) Multi-IVE: privacy enhancement of multiple soft-biometrics in face embeddings. In: 2023 IEEE\/CVF Winter Conference on Applications of Computer Vision Workshops (WACVW). pp 323\u2013331. https:\/\/doi.org\/10.1109\/WACVW58289.2023.00036","DOI":"10.1109\/WACVW58289.2023.00036"},{"key":"7134_CR17","doi-asserted-by":"publisher","unstructured":"Bortolato B, Ivanovska M, Rot P, Kriz\u030caj J, Terh\u00f6rst P, Damer N, Peer P, S\u030ctruc V (2020) Learning privacy-enhancing face representations through feature disentanglement. In: 2020 15th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2020). pp 495\u2013502. https:\/\/doi.org\/10.1109\/FG47880.2020.00007","DOI":"10.1109\/FG47880.2020.00007"},{"issue":"6","key":"7134_CR18","doi-asserted-by":"publisher","first-page":"2158","DOI":"10.1109\/TPAMI.2020.3015420","volume":"43","author":"A Morales","year":"2021","unstructured":"Morales A, Fierrez J, Vera-Rodriguez R, Tolosana R (2021) SensitiveNets: learning agnostic representations with application to face images. IEEE Trans Pattern Anal Mach Intell 43(6):2158\u20132164. https:\/\/doi.org\/10.1109\/TPAMI.2020.3015420","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"7134_CR19","doi-asserted-by":"publisher","first-page":"8786","DOI":"10.1109\/TIFS.2024.3424303","volume":"19","author":"Z Chen","year":"2024","unstructured":"Chen Z, Yao Z, Jin B, Lin M, Ning J (2024) FIBNet: privacy-enhancing approach for face biometrics based on the information bottleneck principle. IEEE Trans Inf Forensics Secur 19:8786\u20138801. https:\/\/doi.org\/10.1109\/TIFS.2024.3424303","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"7134_CR20","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1109\/TBIOM.2024.3390586","volume":"6","author":"Z Rezgui","year":"2024","unstructured":"Rezgui Z, Strisciuglio N, Veldhuis R (2024) Gender privacy angular constraints for face recognition. IEEE Trans Biom Behav Identity Sci 6(3):352\u2013363. https:\/\/doi.org\/10.1109\/TBIOM.2024.3390586","journal-title":"IEEE Trans Biom Behav Identity Sci"},{"key":"7134_CR21","doi-asserted-by":"publisher","unstructured":"Mirjalili V, Raschka S, Namboodiri A, Ross A (2018) Semi-adversarial networks: convolutional autoencoders for imparting privacy to face images. In: 2018 International Conference on Biometrics (ICB). pp 82\u201389. https:\/\/doi.org\/10.1109\/ICB2018.2018.00023","DOI":"10.1109\/ICB2018.2018.00023"},{"key":"7134_CR22","doi-asserted-by":"publisher","first-page":"99735","DOI":"10.1109\/ACCESS.2019.2924619","volume":"7","author":"V Mirjalili","year":"2019","unstructured":"Mirjalili V, Raschka S, Ross A (2019) FlowSAN: privacy-enhancing semi-adversarial networks to confound arbitrary face-based gender classifiers. IEEE Access 7:99735\u201399745. https:\/\/doi.org\/10.1109\/ACCESS.2019.2924619","journal-title":"IEEE Access"},{"key":"7134_CR23","doi-asserted-by":"publisher","unstructured":"Choi Y, Uh Y, Yoo J, Ha J-W (2020) Stargan v2: diverse image synthesis for multiple domains. In: 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR). pp 8185\u20138194. https:\/\/doi.org\/10.1109\/CVPR42600.2020.00821","DOI":"10.1109\/CVPR42600.2020.00821"},{"issue":"11","key":"7134_CR24","doi-asserted-by":"publisher","first-page":"5464","DOI":"10.1109\/TIP.2019.2916751","volume":"28","author":"Z He","year":"2019","unstructured":"He Z, Zuo W, Kan M, Shan S, Chen X (2019) AttGAN: facial attribute editing by only changing what you want. IEEE Trans Image Process 28(11):5464\u20135478. https:\/\/doi.org\/10.1109\/TIP.2019.2916751","journal-title":"IEEE Trans Image Process"},{"key":"7134_CR25","doi-asserted-by":"publisher","unstructured":"Liu M, Ding Y, Xia M, Liu X, Ding E, Zuo W, Wen S (2019) STGAN: a unified selective transfer network for arbitrary image attribute editing. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR). pp 3668\u20133677. https:\/\/doi.org\/10.1109\/CVPR.2019.00379","DOI":"10.1109\/CVPR.2019.00379"},{"key":"7134_CR26","doi-asserted-by":"publisher","unstructured":"Karras T, Laine S, Aila T (2019) A style-based generator architecture for generative adversarial networks. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR). pp 4396\u20134405. https:\/\/doi.org\/10.1109\/CVPR.2019.00453","DOI":"10.1109\/CVPR.2019.00453"},{"key":"7134_CR27","doi-asserted-by":"crossref","unstructured":"Li X, Zhang S, Hu J, Cao L, Hong X, Mao X, Huang F, Wu Y, Ji R (2021) Image-to-image translation via hierarchical style disentanglement. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR). pp 8639\u20138648","DOI":"10.1109\/CVPR46437.2021.00853"},{"key":"7134_CR28","doi-asserted-by":"crossref","unstructured":"Yang G, Fei N, Ding M, Liu G, Lu Z, Xiang T (2021) L2M-GAN: learning to manipulate latent space semantics for facial attribute editing. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR). pp 2951\u20132960","DOI":"10.1109\/CVPR46437.2021.00297"},{"key":"7134_CR29","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-031-19787-1_9","volume-title":"Computer vision\u2014ECCV 2022","author":"Y Dalva","year":"2022","unstructured":"Dalva Y, Alt\u0131ndi\u015f SF, Dundar A (2022) VecGAN: image-to-image translation with interpretable latent directions. In: Avidan S, Brostow G, Ciss\u00e9 M, Farinella GM, Hassner T (eds) Computer vision\u2014ECCV 2022. Springer, Cham, pp 153\u2013169"},{"issue":"12","key":"7134_CR30","doi-asserted-by":"publisher","first-page":"14777","DOI":"10.1109\/TPAMI.2023.3308102","volume":"45","author":"Y Dalva","year":"2023","unstructured":"Dalva Y, Pehlivan H, Hatipoglu OI, Moran C, Dundar A (2023) Image-to-image translation with disentangled latent vectors for face editing. IEEE Trans Pattern Anal Mach Intell 45(12):14777\u201314788. https:\/\/doi.org\/10.1109\/TPAMI.2023.3308102","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"7134_CR31","unstructured":"Voynov A, Babenko A (2020) Unsupervised discovery of interpretable directions in the GAN latent space. In: International Conference on Machine Learning. PMLR, pp 9786\u20139796"},{"issue":"4","key":"7134_CR32","doi-asserted-by":"publisher","first-page":"2004","DOI":"10.1109\/TPAMI.2020.3034267","volume":"44","author":"Y Shen","year":"2022","unstructured":"Shen Y, Yang C, Tang X, Zhou B (2022) InterFaceGAN: interpreting the disentangled face representation learned by GANs. IEEE Trans Pattern Anal Mach Intell 44(4):2004\u20132018. https:\/\/doi.org\/10.1109\/TPAMI.2020.3034267","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"7134_CR33","doi-asserted-by":"crossref","unstructured":"Cao Q, Shen L, Xie W, Parkhi OM, Zisserman A (2018) VGGFace2: a dataset for recognising faces across pose and age. In: 2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018). IEEE, pp 67\u201374","DOI":"10.1109\/FG.2018.00020"},{"key":"7134_CR34","doi-asserted-by":"publisher","unstructured":"Zhu J-Y, Park T, Isola P, Efros AA (2017) Unpaired image-to-image translation using cycle-consistent adversarial networks. In: 2017 IEEE International Conference on Computer Vision (ICCV). pp 2242\u20132251. https:\/\/doi.org\/10.1109\/ICCV.2017.244","DOI":"10.1109\/ICCV.2017.244"},{"key":"7134_CR35","unstructured":"Karras T, Aila T, Laine S, Lehtinen J (2018) Progressive growing of GANs for improved quality, stability, and variation. In: International Conference on Learning Representations"},{"key":"7134_CR36","doi-asserted-by":"crossref","unstructured":"Liu Z, Luo P, Wang X, Tang X (2015) Deep learning face attributes in the wild. In: Proceedings of the IEEE International Conference on Computer Vision. pp 3730\u20133738","DOI":"10.1109\/ICCV.2015.425"},{"key":"7134_CR37","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2015) Delving deep into rectifiers: surpassing human-level performance on ImageNet classification. In: Proceedings of the IEEE International Conference on Computer Vision. pp 1026\u20131034","DOI":"10.1109\/ICCV.2015.123"},{"key":"7134_CR38","unstructured":"Kingma DP, Ba J (2015) Adam: A method for stochastic optimization. In: Bengio Y, LeCun Y (eds) 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7-9, 2015, Conference Track Proceedings. http:\/\/arxiv.org\/abs\/1412.6980"},{"key":"7134_CR39","doi-asserted-by":"crossref","unstructured":"Parkhi O, Vedaldi A, Zisserman A (2015) Deep face recognition. In: BMVC 2015-Proceedings of the British Machine Vision Conference 2015. British Machine Vision Association","DOI":"10.5244\/C.29.41"},{"key":"7134_CR40","doi-asserted-by":"crossref","unstructured":"Deng J, Guo J, Xue N, Zafeiriou S (2019) ArcFace: additive angular margin loss for deep face recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","DOI":"10.1109\/CVPR.2019.00482"},{"key":"7134_CR41","doi-asserted-by":"publisher","unstructured":"Schroff F, Kalenichenko D, Philbin J (2015) FaceNet: a unified embedding for face recognition and clustering. In: 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). pp 815\u2013823. https:\/\/doi.org\/10.1109\/CVPR.2015.7298682","DOI":"10.1109\/CVPR.2015.7298682"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07134-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-025-07134-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07134-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T15:14:14Z","timestamp":1741706054000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-025-07134-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,11]]},"references-count":41,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,3]]}},"alternative-id":["7134"],"URL":"https:\/\/doi.org\/10.1007\/s11227-025-07134-9","relation":{},"ISSN":["1573-0484"],"issn-type":[{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,11]]},"assertion":[{"value":"26 February 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This declaration is not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}}],"article-number":"604"}}