{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:31:38Z","timestamp":1776108698632,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/fg.2015.7285018","type":"proceedings-article","created":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T18:03:52Z","timestamp":1443722632000},"page":"1-8","source":"Crossref","is-referenced-by-count":6,"title":["Controllable Face Privacy"],"prefix":"10.1109","author":[{"given":"Terence","family":"Sim","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Li","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/11767831_15"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2008.4587369"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.55"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/NCVPRIPG.2011.48"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/978-3-540-39653-6_24","article-title":"The design of a context-aware home media space for balancing privacy and awareness","author":"neustaedter","year":"2003","journal-title":"UbiComp 2003 Ubiquitous Computing"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.32"},{"key":"ref17","article-title":"N.S.A. Collecting Millions of Faces From Web Images","author":"james","year":"2014"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2009.5459189"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1162\/jocn.1991.3.1.71"},{"key":"ref4","article-title":"Privacy mode for acquisition cameras and camcorders","author":"berger","year":"2000"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/34.598228"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/34.24792"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/311535.311556"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/34.927467"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1155\/2007\/75427"},{"key":"ref2","article-title":"Surveillance Cameras Sought by Citites After Boston Bombs","author":"atlas","year":"2013","journal-title":"Bloomberg News"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2011.2105551"},{"key":"ref9","article-title":"NYPD expands surveillance net to fight crime as well as terrorism","author":"francescani","year":"2013","journal-title":"Reuters News"},{"key":"ref20","article-title":"Spy Britain: six million CCTV cameras - and most are in private hands","year":"2013","journal-title":"London Evening Standard"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1186822.1073209"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1007\/3-540-47969-4_30","article-title":"Multilinear analysis of image ensembles: Tensorfaces","author":"vasilescu","year":"2002","journal-title":"Computer VisionECCV 2002"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2008.4712094"},{"key":"ref23","article-title":"In-Store Cameras: From Security Aids to Sales Tools","author":"williams","year":"2013","journal-title":"INSEAD Knowledge"}],"event":{"name":"2015 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG)","location":"Ljubljana","start":{"date-parts":[[2015,5,4]]},"end":{"date-parts":[[2015,5,8]]}},"container-title":["2015 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7147635\/7285013\/07285018.pdf?arnumber=7285018","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T16:37:24Z","timestamp":1498235844000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7285018\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/fg.2015.7285018","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}