{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T16:53:55Z","timestamp":1776099235354,"version":"3.50.1"},"reference-count":71,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T00:00:00Z","timestamp":1525132800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T00:00:00Z","timestamp":1525132800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T00:00:00Z","timestamp":1525132800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T00:00:00Z","timestamp":1525132800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1651166-CNS"],"award-info":[{"award-number":["1651166-CNS"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1651455-CNS"],"award-info":[{"award-number":["1651455-CNS"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61772161"],"award-info":[{"award-number":["61772161"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61622205"],"award-info":[{"award-number":["61622205"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61472110"],"award-info":[{"award-number":["61472110"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/tifs.2017.2787986","type":"journal-article","created":{"date-parts":[[2018,1,8]],"date-time":"2018-01-08T19:21:24Z","timestamp":1515439284000},"page":"1317-1332","source":"Crossref","is-referenced-by-count":183,"title":["Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image Sharing"],"prefix":"10.1109","volume":"13","author":[{"given":"Jun","family":"Yu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8768-8324","authenticated-orcid":false,"given":"Zhenzhong","family":"Kuang","sequence":"additional","affiliation":[]},{"given":"Baopeng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3062-8240","authenticated-orcid":false,"given":"Dan","family":"Lin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4923-0910","authenticated-orcid":false,"given":"Jianping","family":"Fan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref71","author":"isola","year":"2016","journal-title":"Image-to-image translation with conditional adversarial networks"},{"key":"ref70","author":"goodfellow","year":"2014","journal-title":"Generative adversarial networks"},{"key":"ref39","first-page":"1097","article-title":"ImageNet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Proc NIPS"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2015EDP7378"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2636090"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2911996.2912018"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22668-2_33"},{"key":"ref30","author":"tonge","year":"2015","journal-title":"Privacy prediction of images shared on social media sites using deep features"},{"key":"ref37","first-page":"1","article-title":"Cybercasing the Joint: On the privacy implications of geo-tagging","author":"friedland","year":"2010","journal-title":"Proceedings of USENIX Hot Topics in Security (HotSec)"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2005.1530530"},{"key":"ref35","first-page":"515","article-title":"P3: Toward privacy-preserving photo sharing","author":"ra","year":"2013","journal-title":"Proc 10th USENIX Symp Netw Design Implement"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.928225"},{"key":"ref60","article-title":"I know what you did last summer: Risks of location data leakage in mobile and social computing","author":"jedrzejczyk","year":"2009"},{"key":"ref62","first-page":"1957","article-title":"Landmark classification in large-scale image collections","author":"li","year":"2009","journal-title":"Proc IEEE 12th Int Conf Comput Vis"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2502081.2502282"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2008.4562956"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2398735"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/1631272.1631468"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348292"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/AFGR.2008.4813471"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.5244\/C.29.41"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2631775.2631803"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1126\/science.1149656"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.220"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.278"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21473"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.21"},{"key":"ref20","first-page":"1","article-title":"Social circles: Tackling privacy in social networks","author":"adu-opong","year":"2008","journal-title":"Proc Symp Usable Privacy and Security (SOUPS ' 08"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1397735.1397744"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772727"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2457317.2457344"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1461469.1461470"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2808797.2809303"},{"key":"ref25","first-page":"539","article-title":"Learning to discover social circles in ego networks","author":"mcauley","year":"2012","journal-title":"Proc NIPDS"},{"key":"ref50","first-page":"282","article-title":"Conditional random fields: Probabilistic models for segmenting and labeling sequence data","author":"lafferty","year":"2001","journal-title":"Proc ICML"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref59","year":"2017","journal-title":"Walmart Wants to Monitor Shoppers&#x2019; Facial Expressions"},{"key":"ref58","first-page":"1","article-title":"Fully convolutional multi-class multiple instance learning","author":"pathak","year":"2015","journal-title":"Proc ICLR"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298968"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783380"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(96)00034-3"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.354"},{"key":"ref53","first-page":"1929","article-title":"Dropout: A simple way to prevent neural networks from overfitting","volume":"15","author":"srivastava","year":"2014","journal-title":"J Mach Learn Res"},{"key":"ref52","first-page":"1378","article-title":"Object bank: A high-level image representation for scene classification & semantic feature sparsification","author":"li","year":"2010","journal-title":"Proc NIPS"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1459359.1459375"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.COLLABORATECOM2009.8340"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654889"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2012.250490"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2320729"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1995966.1996000"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2009.5202725"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207728"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572587"},{"key":"ref18","first-page":"9","article-title":"Providing access control to online albums based on tags and linked data","author":"yeung","year":"2009","journal-title":"Proc AAAI Symp"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1654988.1654991"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2076444.2076448"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2009.09.003"},{"key":"ref6","first-page":"1563","article-title":"Moving beyond untagging: Photo privacy in a tagged world","author":"besmer","year":"2011","journal-title":"Proc CHI"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22348-8_5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.462"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1609\/icwsm.v3i1.13954","article-title":"Motivational, structural and tenure factors that impact online community photo sharing","author":"nov","year":"2009","journal-title":"Proc ICWSM"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298965"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5539988"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298642"},{"key":"ref45","first-page":"1","article-title":"Semantic image segmentation with deep convolutional nets and fully connected CRFs","author":"chen","year":"2015","journal-title":"Proc ICLR"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.179"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298780"},{"key":"ref42","first-page":"1","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2015","journal-title":"Proc ICLR"},{"key":"ref41","first-page":"-647i","article-title":"DeCAF: A deep convolutional activation feature for generic visual recognition","author":"donahue","year":"2014","journal-title":"Proc ICML"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.123"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/ielaam\/10206\/8272400\/8249924-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8272400\/08249924.pdf?arnumber=8249924","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,30]],"date-time":"2023-08-30T13:38:10Z","timestamp":1693402690000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8249924\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":71,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2017.2787986","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5]]}}}