{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:08:55Z","timestamp":1773511735315,"version":"3.50.1"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2017,5,1]],"date-time":"2017-05-01T00:00:00Z","timestamp":1493596800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,5,1]],"date-time":"2017-05-01T00:00:00Z","timestamp":1493596800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,5,1]],"date-time":"2017-05-01T00:00:00Z","timestamp":1493596800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,5,1]],"date-time":"2017-05-01T00:00:00Z","timestamp":1493596800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1651166-CNS"],"award-info":[{"award-number":["1651166-CNS"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1651455-CNS"],"award-info":[{"award-number":["1651455-CNS"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61622205"],"award-info":[{"award-number":["61622205"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Zhejiang Provincial Natural Science Foundation of China","doi-asserted-by":"publisher","award":["LR15F020002"],"award-info":[{"award-number":["LR15F020002"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/tifs.2016.2636090","type":"journal-article","created":{"date-parts":[[2016,12,6]],"date-time":"2016-12-06T19:15:54Z","timestamp":1481051754000},"page":"1005-1016","source":"Crossref","is-referenced-by-count":295,"title":["iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning"],"prefix":"10.1109","volume":"12","author":[{"given":"Jun","family":"Yu","sequence":"first","affiliation":[]},{"given":"Baopeng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhengzhong","family":"Kuang","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Lin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8768-8324","authenticated-orcid":false,"given":"Jianping","family":"Fan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240772"},{"key":"ref38","first-page":"163","article-title":"Label embedding trees for large multi-class tasks","author":"bengio","year":"2010","journal-title":"Proc NIPS"},{"key":"ref33","first-page":"1","article-title":"Towards an optimal stochastic alternating direction method of multipliers","author":"azadi","year":"2014","journal-title":"Proc ICML"},{"key":"ref32","first-page":"1929","article-title":"Dropout: A simple way to prevent neural networks from overfitting","volume":"15","author":"srivastava","year":"2014","journal-title":"J Mach Learn Res"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref30","first-page":"2094","article-title":"Discriminative transfer learning with tree-based priors","author":"srivastava","year":"2013","journal-title":"Proc NIPS"},{"key":"ref37","first-page":"1","article-title":"Regularization framework for large scale hierarchical classification","author":"gopal","year":"2012","journal-title":"Proc ECML"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7908-2604-3_16"},{"key":"ref35","first-page":"2595","article-title":"Parallelized stochastic gradient descent","author":"zinkevich","year":"2010","journal-title":"Proc NIPS"},{"key":"ref34","first-page":"1","article-title":"Stochastic alternating direction method of multipliers","author":"ouyang","year":"2013","journal-title":"Proc ICML"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-014-0767-8"},{"key":"ref27","article-title":"Shared roots: Regularizing neural networks through multitask learning","author":"teterwak","year":"2014"},{"key":"ref29","first-page":"2740","article-title":"HD-CNN: Hierarchical deep convolutional neural network for image classification","author":"yang","year":"2015","journal-title":"Proc IEEE CVPR"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1609\/icwsm.v3i1.13954","article-title":"Motivational, structural and tenure factors that impact online community photo sharing","author":"nov","year":"2009","journal-title":"Proc ICWSM"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2273797"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1198\/jasa.2009.tm08084"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.139"},{"key":"ref21","first-page":"615","article-title":"Learning multiple tasks with kernel methods","volume":"6","author":"evgeniou","year":"2005","journal-title":"J Mach Learn Res"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654889"},{"key":"ref23","first-page":"1097","article-title":"ImageNet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Proc NIPS"},{"key":"ref26","first-page":"94","article-title":"Facial landmark detection by deep multi-task learning","author":"zhang","year":"2014","journal-title":"Proc ECCV"},{"key":"ref25","first-page":"647","article-title":"DeCAF: A deep convolutional activation feature for generic visual recognition","author":"donahue","year":"2014","journal-title":"Proc ICML"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2911996.2912018"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.172"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2015.2457337"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.COLLABORATECOM2009.8340"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526780"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526757"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207728"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572587"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572569"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2009.45"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772727"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348292"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2012.250490"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015374"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2076444.2076448"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21473"},{"key":"ref6","first-page":"1","article-title":"Providing access control to online photo albums based on tags and linked data","author":"yeung","year":"2009","journal-title":"Proc AAAI Symp"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2009.5202725"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2012.10.004"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2185354.2185358"},{"key":"ref49","first-page":"4266","article-title":"Privacy prediction of images shared on social media sites using deep features","author":"tonge","year":"2015","journal-title":"Proc AAAI Symp"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367564"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298780"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298642"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298965"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.179"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1873951.1873958"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1459359.1459375"},{"key":"ref44","first-page":"1","article-title":"Semantic image segmentation with deep convolutional neural networks","author":"chen","year":"2015","journal-title":"Proc Int Conf Learn Represent"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1873951.1873956"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/ielaam\/10206\/7862329\/7775034-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/7862329\/07775034.pdf?arnumber=7775034","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T06:01:53Z","timestamp":1692597713000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7775034\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":52,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2016.2636090","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5]]}}}