{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T10:28:37Z","timestamp":1761215317433,"version":"3.37.3"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&D Program of China","award":["2018YFB0803400"],"award-info":[{"award-number":["2018YFB0803400"]}]},{"DOI":"10.13039\/501100005153","name":"China National Funds for Distinguished Young Scientists","doi-asserted-by":"publisher","award":["61625205"],"award-info":[{"award-number":["61625205"]}],"id":[{"id":"10.13039\/501100005153","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"China National Natural Science Foundation","doi-asserted-by":"publisher","award":["61751211","61520106007"],"award-info":[{"award-number":["61751211","61520106007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002367","name":"Key Research Program of Frontier Sciences, CAS","doi-asserted-by":"publisher","award":["QYZDY-SSW-JSC002"],"award-info":[{"award-number":["QYZDY-SSW-JSC002"]}],"id":[{"id":"10.13039\/501100002367","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Science Funds CNS","award":["1526638"],"award-info":[{"award-number":["1526638"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Select. Areas Commun."],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/jsac.2020.2986665","type":"journal-article","created":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T20:55:47Z","timestamp":1586379347000},"page":"1252-1261","source":"Crossref","is-referenced-by-count":20,"title":["PatronuS: A System for Privacy-Preserving Cloud Video Surveillance"],"prefix":"10.1109","volume":"38","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8492-3990","authenticated-orcid":false,"given":"Haohua","family":"Du","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1016-1356","authenticated-orcid":false,"given":"Linlin","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2859-3632","authenticated-orcid":false,"given":"Jianwei","family":"Qian","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3340-8585","authenticated-orcid":false,"given":"Jiahui","family":"Hou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-0357","authenticated-orcid":false,"given":"Taeho","family":"Jung","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6070-6625","authenticated-orcid":false,"given":"Xiang-Yang","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23014"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15702-8_57"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/83.748897"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2007.4399122"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.33"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-013-0620-5"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.31"},{"key":"ref11","first-page":"415","article-title":"Enabling fine-grained permissions for augmented reality applications with recognizers","author":"jana","year":"2013","journal-title":"Proc USENIX Security07"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298990"},{"journal-title":"Speech & language processing","year":"2000","author":"jurafsky","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1133265.1133348"},{"key":"ref15","article-title":"ScreenAvoider: Protecting computer screens from ubiquitous cameras","author":"korayem","year":"2014","journal-title":"arXiv 1412 0008"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_47"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00220"},{"key":"ref18","first-page":"282","article-title":"Conditional random fields: Probabilistic models for segmenting and labeling sequence data","author":"lafferty","year":"2001","journal-title":"Proc 18th Int Conf Mach Learn (ICML)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2469651"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2010.5583334"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.28"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660319"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906412"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2502081.2502157"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/639649"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/429581"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3123266.3123312"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420975"},{"journal-title":"Face++ Home Page","year":"2020","key":"ref2"},{"key":"ref9","article-title":"What you see is what they get: Protecting users from unwanted use of microphones","author":"howell","year":"2010","journal-title":"WSPC Proc"},{"journal-title":"Caviar Dataset","year":"2018","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.32"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/347090.347103"},{"key":"ref21","first-page":"25","article-title":"DeepDive: Web-scale knowledge-base construction using statistical learning and inference","volume":"12","author":"niu","year":"2012","journal-title":"Proc VLDS"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.128"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2259819"},{"key":"ref26","first-page":"91","article-title":"Faster R-CNN: Towards real-time object detection with region proposal networks","author":"ren","year":"2015","journal-title":"Proc NIPS"},{"key":"ref25","first-page":"492","article-title":"A multi-pass sieve for coreference resolution","author":"raghunathan","year":"2010","journal-title":"Proc EMNLP"}],"container-title":["IEEE Journal on Selected Areas in Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/49\/9098108\/09061026.pdf?arnumber=9061026","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T14:22:56Z","timestamp":1651069376000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9061026\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":35,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/jsac.2020.2986665","relation":{},"ISSN":["0733-8716","1558-0008"],"issn-type":[{"type":"print","value":"0733-8716"},{"type":"electronic","value":"1558-0008"}],"subject":[],"published":{"date-parts":[[2020,6]]}}}