{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:43:55Z","timestamp":1772905435046,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/globalsip.2015.7418263","type":"proceedings-article","created":{"date-parts":[[2016,2,25]],"date-time":"2016-02-25T16:20:46Z","timestamp":1456417246000},"page":"586-590","source":"Crossref","is-referenced-by-count":18,"title":["Face de-identification using facial identity preserving features"],"prefix":"10.1109","author":[{"given":"Hehua","family":"Chi","sequence":"first","affiliation":[]},{"given":"Yu Hen","family":"Hu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"227","article-title":"Integrating utility into face de-identification","author":"ralph","year":"2006","journal-title":"Designing privacy enhancing technologies Springer Berlin Heidelberg"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2006.125"},{"key":"ref12","first-page":"1","article-title":"Semi-supervised learning of multi-factor models for face de-identification","author":"ralph","year":"2008","journal-title":"IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/AFGR.1998.670965"},{"key":"ref15","first-page":"1252","article-title":"Retaining expressions on de-identified faces","author":"lily","year":"2014","journal-title":"37th International Convention on Information and Communication Technology Electronics and Microelectronics (MIPRO)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6853651"},{"key":"ref17","first-page":"113","article-title":"Deep learning identity-preserving face space","author":"zhenyao","year":"2013","journal-title":"IEEE International Conference on Computer Vision (ICCV)"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"807","DOI":"10.1016\/j.imavis.2009.08.002","article-title":"Multi-pie","volume":"28","author":"ralph","year":"2010","journal-title":"Image and Vision Computing"},{"key":"ref19","first-page":"1279","article-title":"Tiled convolutional neural networks","author":"ngiam","year":"2010","journal-title":"Advances in neural information processing systems"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1145\/335191.335438","article-title":"Privacy-preserving data mining","volume":"29","author":"rakesh","year":"2000","journal-title":"ACM SIGMOD Record"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1698","DOI":"10.1109\/JPROC.2008.928765","article-title":"Smart camera based monitoring system and its application to assisted living","volume":"96","author":"sven","year":"2008","journal-title":"Proceedings of the IEEE"},{"key":"ref6","first-page":"1","article-title":"The aware home: A living laboratory for technologies for successful aging","author":"abowd","year":"2002","journal-title":"Proc of AAAI 02 Workshop &#x201C;Automation as Caregiver"},{"key":"ref5","first-page":"2373","article-title":"Large-scale privacy protection in google street view","author":"andrea","year":"2009","journal-title":"IEEE 12th International Conference on Computer Vision"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.32"},{"key":"ref7","first-page":"239","article-title":"Scifi-a system for secure face identification","author":"margarita","year":"2010","journal-title":"IEEE Symposium on Security and Privacy (SP)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.01.041"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2014.7035312"},{"key":"ref9","first-page":"39","article-title":"Face swapping: automatically replacing faces in photographs","volume":"27","author":"dmitri","year":"2008","journal-title":"ACM Transactions on Graphics (TOG)"},{"key":"ref20","first-page":"807","article-title":"Rectified linear units improve restricted boltzmann machines","author":"vinod","year":"2010","journal-title":"Proceedings of the 27th International Conference on Machine Learning (ICML-10)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126336"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2011.2160957"},{"key":"ref23","first-page":"448","article-title":"Deep boltzmann machines","author":"ruslan","year":"2009","journal-title":"International Conference on Artificial Intelligence and Statistics"}],"event":{"name":"2015 IEEE Global Conference on Signal and Information Processing (GlobalSIP)","location":"Orlando, FL, USA","start":{"date-parts":[[2015,12,14]]},"end":{"date-parts":[[2015,12,16]]}},"container-title":["2015 IEEE Global Conference on Signal and Information Processing (GlobalSIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7406206\/7416920\/07418263.pdf?arnumber=7418263","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T02:57:46Z","timestamp":1498273066000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7418263\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/globalsip.2015.7418263","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}