{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:09:18Z","timestamp":1772042958587,"version":"3.50.1"},"reference-count":51,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T00:00:00Z","timestamp":1656547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T00:00:00Z","timestamp":1656547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,30]]},"DOI":"10.1109\/iscc55528.2022.9912465","type":"proceedings-article","created":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T21:47:40Z","timestamp":1667512060000},"page":"1-8","source":"Crossref","is-referenced-by-count":8,"title":["Privacy vs Accuracy Trade-Off in Privacy Aware Face Recognition in Smart Systems"],"prefix":"10.1109","author":[{"given":"Wisam","family":"Abbasi","sequence":"first","affiliation":[{"name":"IIT-CNR"}]},{"given":"Paolo","family":"Mori","sequence":"additional","affiliation":[{"name":"IIT-CNR"}]},{"given":"Andrea","family":"Saracino","sequence":"additional","affiliation":[{"name":"IIT-CNR"}]},{"given":"Valerio","family":"Frascolla","sequence":"additional","affiliation":[{"name":"Intel"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01246-5_38"},{"issue":"130","key":"ref2","volume-title":"Visual identification of people by computer","author":"Kelly","year":"1970"},{"key":"ref3","article-title":"Picture processing by computer complex and recognition of human faces","volume-title":"Kyoto University","author":"Kanade","year":"1973"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2005.10.002"},{"key":"ref5","article-title":"Face recognition: From traditional to deep learning methods","author":"Trigueros","year":"2018","journal-title":"arXiv preprint"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1364\/JOSAA.4.000519"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/34.41390"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1162\/jocn.1991.3.1.71"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/34.598228"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1364\/JOSAA.14.001724"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-72201-1_4"},{"key":"ref12","article-title":"Subspace linear discriminant analysis for face recognition","author":"Zhao","year":"1999","journal-title":"Citeseer"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.6241"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/AFGR.2000.840634"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.1994.323814"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(98)00076-4"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1008383"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/34.598235"},{"key":"ref19","first-page":"296","article-title":"Orientation histograms for hand gesture recognition","volume-title":"International workshop on automatic face and gesture recognition","volume":"12","author":"Freeman","year":"1995"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.1999.790410"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2004.1273927"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2002.999679"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2006.881485"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.220"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.202"},{"key":"ref27","article-title":"Learning deep face representation","author":"Fan","year":"2014","journal-title":"arXiv preprint"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/72.554196"},{"key":"ref29","author":"Kohonen","year":"1998","journal-title":"The self-organizing map. neurocomputing 21, 1e6"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/72.554195"},{"key":"ref31","article-title":"Deep learning face representation by joint identification-verification","volume":"27","author":"Sun","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2014.6918661"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.5244\/C.30.56"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.32"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8659.2012.03000.x"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.11233"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906412"},{"key":"ref38","first-page":"27","article-title":"The privacy-utility tradeoff for remotely teleoperated robots","volume-title":"Proceedings of the tenth annual ACM\/IEEE international conference on human-robot interaction. IEEE","author":"Butler","year":"2015"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1212\/wnl.90.15_supplement.p4.001"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref41","article-title":"Differentially private generative adversarial network","author":"Xie","year":"2018","journal-title":"arXiv preprint"},{"key":"ref42","author":"Pulfer","year":"2019","journal-title":"Different approaches to blurring digital images and their effect on facial detection"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2001.990517"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000013087.49260.fb"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2002.1038171"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1504"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICE2T.2014.7006273"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS.2019.8757511"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19309-5_55"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ASYU50717.2020.9259802"},{"key":"ref51","article-title":"Labeled faces in the wild: A database forstudying face recognition in unconstrained environments","volume-title":"Workshop on faces in\u2019Real-Life\u2019Images: detection, alignment, and recognition","author":"Huang","year":"2008"}],"event":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","location":"Rhodes, Greece","start":{"date-parts":[[2022,6,30]]},"end":{"date-parts":[[2022,7,3]]}},"container-title":["2022 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9912737\/9912463\/09912465.pdf?arnumber=9912465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:06:01Z","timestamp":1747803961000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9912465\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,30]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/iscc55528.2022.9912465","relation":{},"subject":[],"published":{"date-parts":[[2022,6,30]]}}}