{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T13:55:30Z","timestamp":1770818130568,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/iwobi.2018.8464214","type":"proceedings-article","created":{"date-parts":[[2018,9,13]],"date-time":"2018-09-13T21:48:06Z","timestamp":1536875286000},"page":"1-7","source":"Crossref","is-referenced-by-count":6,"title":["Selective Face Deidentification with End-to-End Perceptual Loss Learning"],"prefix":"10.1109","author":[{"given":"Blaz","family":"Meden","sequence":"first","affiliation":[]},{"given":"Peter","family":"Peer","sequence":"additional","affiliation":[]},{"given":"Vitomir","family":"Struc","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","first-page":"1377","article-title":"Presentation and validation of the radboud faces database","volume":"24","author":"langner","year":"2010","journal-title":"Cognition"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"964","DOI":"10.1007\/3-540-44887-X_112","article-title":"Face verification competition on the xm2vts database","author":"messer","year":"2003","journal-title":"Proceedings of the 4th International Conference on Audio- and Video-based Biometric Person Authentication ser AVBPA'03"},{"key":"ref10","first-page":"1","article-title":"Towards real-world face de-identification","author":"gross","year":"2007","journal-title":"Biometrics Theory Applications and Systems 2007 BTAS 2007 First IEEE International Conference On IEEE"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2006.125"},{"key":"ref12","first-page":"227","article-title":"Integrating utility into face de-identification","author":"gross","year":"0","journal-title":"Proceedings of the 5th International Conference on Privacy Enhancing Technologies ser PET'05"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2015.7285019"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/e20010060"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4069-8"},{"key":"ref16","first-page":"682","article-title":"Privacy of facial soft biometrics: Suppressing gender but retaining identity","author":"othman","year":"0","journal-title":"Computer Vision - ECCV 2014 Workshops"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272743"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2016.7449690"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2017.0083"},{"key":"ref28","article-title":"Adversarial examples in the physical world","volume":"abs 1607 2533","author":"kurakin","year":"2016","journal-title":"CoRR"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"ref27","article-title":"One pixel attack for fooling deep neural networks","volume":"abs 1710 8864","author":"su","year":"2017","journal-title":"CoRR"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2017.0240"},{"key":"ref6","first-page":"1","article-title":"The effects of filtered video on awareness and privacy","author":"boyle","year":"2000","journal-title":"Proceedings of the 2000 ACM Conference on Computer Supported Cooperative Work ACM"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.5244\/C.29.41"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2016.05.020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-301-3_8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1143518.1143519"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272764"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.32"},{"key":"ref1","article-title":"U-net: Convolutional networks for biomedical image segmentation","volume":"abs 1505 4597","author":"ronneberger","year":"2015","journal-title":"CoRR"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1049\/iet-spr.2017.0049"},{"key":"ref22","article-title":"Face, hairstyle and clothing colour de-identification in video sequences","author":"brkic","year":"2017","journal-title":"IET Signal Processing"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2015.7418263"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"694","DOI":"10.1007\/978-3-319-46475-6_43","article-title":"Perceptual losses for real-time style transfer and super-resolution","author":"johnson","year":"2016","journal-title":"Computer Vision - ECCV 2016"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICB2018.2018.00023"},{"key":"ref26","author":"nguyen","year":"2015","journal-title":"Deep neural networks are easily fooled High confidence predictions for unrecognizable images"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-016-0933-2"}],"event":{"name":"2018 IEEE International Work Conference on Bioinspired Intelligence (IWOBI)","location":"San Carlos","start":{"date-parts":[[2018,7,18]]},"end":{"date-parts":[[2018,7,20]]}},"container-title":["2018 IEEE International Work Conference on Bioinspired Intelligence (IWOBI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8451008\/8464128\/08464214.pdf?arnumber=8464214","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T10:05:50Z","timestamp":1643191550000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8464214\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/iwobi.2018.8464214","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}