{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:23:36Z","timestamp":1763018616790,"version":"3.37.3"},"reference-count":64,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"ARRS Research Program P2-0250"},{"name":"ARRS Research Program P2-0214"},{"name":"ARRS research project J2-1734"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1109\/tdsc.2023.3319500","type":"journal-article","created":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T17:58:20Z","timestamp":1695751100000},"page":"2869-2887","source":"Crossref","is-referenced-by-count":9,"title":["PrivacyProber: Assessment and Detection of Soft\u2013Biometric Privacy\u2013Enhancing Techniques"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4491-2744","authenticated-orcid":false,"given":"Peter","family":"Rot","sequence":"first","affiliation":[{"name":"University of Ljubljana, Ljubljana, Slovenia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3637-8182","authenticated-orcid":false,"given":"Klemen","family":"Grm","sequence":"additional","affiliation":[{"name":"University of Ljubljana, Ljubljana, Slovenia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9744-4035","authenticated-orcid":false,"given":"Peter","family":"Peer","sequence":"additional","affiliation":[{"name":"University of Ljubljana, Ljubljana, Slovenia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3385-5780","authenticated-orcid":false,"given":"Vitomir","family":"\u0160truc","sequence":"additional","affiliation":[{"name":"University of Ljubljana, Ljubljana, Slovenia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2480381"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00554"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.532"},{"key":"ref4","first-page":"849","article-title":"EMOPAIN challenge 2020: Multimodal pain evaluation from facial and bodily expressions","volume-title":"Proc. IEEE 15th Int. Conf. Autom. Face Gesture Recognit.","author":"Berthouze"},{"article-title":"Face recognition in low quality images: A survey","year":"2018","author":"Li","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TAFFC.2020.2969189"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0088-2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3430984.3431966"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924619"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/91"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3096024"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2020.3024026"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2994960"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/FG47880.2020.00007"},{"key":"ref15","first-page":"1589","article-title":"Fawkes: Protecting personal privacy against unauthorized deep learning models","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Shan"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1049\/iet-spr.2017.0049"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctvjghvnn"},{"year":"2008","key":"ref19","article-title":"740 ILCS\/14\/Biometric information privacy act"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3664596"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16181-5_52"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICB2018.2018.00023"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2017.10.024"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2545883"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.01.041"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8053"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2016.05.020"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-87664-7_18"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-019-01432-5"},{"key":"ref30","first-page":"215","article-title":"Privacy evaluation protocols for the evaluation of soft-biometric privacy-enhancing technologies","volume-title":"Proc. Int. Conf. Biometrics Special Int. Group","author":"Terh\u00f6rst"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.3015420"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987331"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272743"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"article-title":"Explaining and harnessing adversarial examples","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Goodfellow","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/FG47880.2020.00009"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.12.022"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106727"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-6351-1_14"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102092"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3010274"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.03.003"},{"article-title":"Adversarial attacks and defences: A survey","year":"2018","author":"Chakraborty","key":"ref43"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3027183"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2940533"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00681"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00191"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/WACV45572.2020.9093310"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.08.032"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8803803"},{"article-title":"Labeled faces in the wild: A database for studying face recognition in unconstrained environments","year":"2007","author":"Huang","key":"ref51"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2359646"},{"key":"ref53","article-title":"The MUCT landmarked face database","volume":"201","author":"Milborrow","year":"2010","journal-title":"Pattern Recognit. Assoc. South Afr."},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698605"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2018.00020"},{"key":"ref56","first-page":"331","article-title":"Image inpainting via generative multi-column convolutional neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Wang"},{"article-title":"Progressive growing of GANs for improved quality, stability, and variation","year":"2017","author":"Karras","key":"ref57"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8804295"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2016.2631888"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.160"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"article-title":"Rethinking atrous convolution for semantic image segmentation","year":"2017","author":"Chen","key":"ref62"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00559"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00741"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/10592103\/10264192.pdf?arnumber=10264192","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T04:48:18Z","timestamp":1721191698000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10264192\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":64,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2023.3319500","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2024,7]]}}}