{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T19:35:53Z","timestamp":1730230553276,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1109\/icassp40776.2020.9054046","type":"proceedings-article","created":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T20:21:13Z","timestamp":1586463673000},"page":"2797-2801","source":"Crossref","is-referenced-by-count":7,"title":["Privacy-Preserving Image Sharing Via Sparsifying Layers on Convolutional Groups"],"prefix":"10.1109","author":[{"given":"Sohrab","family":"Ferdowsi","sequence":"first","affiliation":[]},{"given":"Behrooz","family":"Razeghi","sequence":"additional","affiliation":[]},{"given":"Taras","family":"Holotyak","sequence":"additional","affiliation":[]},{"given":"Flavio P.","family":"Calmon","sequence":"additional","affiliation":[]},{"given":"Slava","family":"Voloshynovskiy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2017.8267664"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8803734"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2881677"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178165"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7025694"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2004.1421853"},{"article-title":"End-to-end optimized image compression","year":"2016","author":"ball\u00e9","key":"ref16"},{"article-title":"Generative adversarial networks for extreme learned image compression","year":"2018","author":"agustsson","key":"ref17"},{"key":"ref18","article-title":"Learning to compress and search visual data in large-scale systems","author":"ferdowsi","year":"2018","journal-title":"Ph D thesis"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8461862"},{"article-title":"Privacy-preserving adversarial networks","year":"2017","author":"tripathy","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/e19120656"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0047"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682422"},{"key":"ref8","first-page":"515","article-title":"P3: Toward privacy-preserving photo sharing","author":"ra","year":"2013","journal-title":"USENIX Symposium on Networked Systems Design and Implementation (NSDI)"},{"key":"ref7","article-title":"Face blurring: when footage requires anonymity","volume":"13","year":"2012","journal-title":"Blog (18 July 2012) Retrieved April"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"article-title":"Defeating image obfuscation with deep learning","year":"2016","author":"mcpherson","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2230219"},{"key":"ref20","first-page":"234","article-title":"U-net: Convolutional networks for biomedical image segmentation","author":"ronneberger","year":"2015","journal-title":"International Conference on Medical Image Computing and Computer-Assisted Intervention"},{"key":"ref22","first-page":"4340","article-title":"Maximal sparsity with deep networks?","author":"xin","year":"2016","journal-title":"Advances in neural information processing systems"},{"key":"ref21","first-page":"399","article-title":"Learning fast approximations of sparse coding","author":"gregor","year":"2010","journal-title":"Proceedings of the 27th International Conference on International Conference on Machine Learning"},{"key":"ref24","article-title":"Automatic differentiation in PyTorch","author":"paszke","year":"2017","journal-title":"Proc NIPS Autodiff Workshop"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"article-title":"Adam: A method for stochastic optimization","year":"2014","author":"kingma","key":"ref25"}],"event":{"name":"ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2020,5,4]]},"location":"Barcelona, Spain","end":{"date-parts":[[2020,5,8]]}},"container-title":["ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9040208\/9052899\/09054046.pdf?arnumber=9054046","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:25:26Z","timestamp":1656375926000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9054046\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icassp40776.2020.9054046","relation":{},"subject":[],"published":{"date-parts":[[2020,5]]}}}