{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:14:52Z","timestamp":1763468092813,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,12,3]],"date-time":"2012-12-03T00:00:00Z","timestamp":1354492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0846065"],"award-info":[{"award-number":["CNS-0846065"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,12,3]]},"DOI":"10.1145\/2420950.2420975","type":"proceedings-article","created":{"date-parts":[[2012,12,19]],"date-time":"2012-12-19T14:12:22Z","timestamp":1355926342000},"page":"149-158","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["SensorSift"],"prefix":"10.1145","author":[{"given":"Miro","family":"Enev","sequence":"first","affiliation":[{"name":"University of Washington"}]},{"given":"Jaeyeon","family":"Jung","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond WA"}]},{"given":"Liefeng","family":"Bo","sequence":"additional","affiliation":[{"name":"University of Washington"}]},{"given":"Xiaofeng","family":"Ren","sequence":"additional","affiliation":[{"name":"University of Washington"}]},{"given":"Tadayoshi","family":"Kohno","sequence":"additional","affiliation":[{"name":"University of Washington"}]}],"member":"320","published-online":{"date-parts":[[2012,12,3]]},"reference":[{"unstructured":"Inside google project glass part 1 2012. http:\/\/www.fastcompany.com\/1838801\/exclusive-inside-google-x-project-glass-steve-lee.  Inside google project glass part 1 2012. http:\/\/www.fastcompany.com\/1838801\/exclusive-inside-google-x-project-glass-steve-lee.","key":"e_1_3_2_1_1_1"},{"unstructured":"Kinect for windows sdk 2012. http:\/\/www.microsoft.com\/en-us\/kinectforwindows\/develop\/new.aspx.  Kinect for windows sdk 2012. http:\/\/www.microsoft.com\/en-us\/kinectforwindows\/develop\/new.aspx.","key":"e_1_3_2_1_2_1"},{"unstructured":"Talking face video 2012. http:\/\/www-prima.inrialpes.fr\/FGnet\/data\/01-TalkingFace\/talking_face.html.  Talking face video 2012. http:\/\/www-prima.inrialpes.fr\/FGnet\/data\/01-TalkingFace\/talking_face.html.","key":"e_1_3_2_1_3_1"},{"doi-asserted-by":"crossref","unstructured":"Mukhtaj S.\n      Barhm Nidal\n      Qwasmi Faisal Z.\n      Qureshi and \n      Khalil\n      El-Khatib\n    .\n  Negotiating privacy preferences in video surveillance systems\n  . \n  In IEA\/AIE volume \n  6704\n   of \n  Lecture Notes in Computer Science pages \n  511\n  --\n  521 2011\n  .   Mukhtaj S. Barhm Nidal Qwasmi Faisal Z. Qureshi and Khalil El-Khatib. Negotiating privacy preferences in video surveillance systems. In IEA\/AIE volume 6704 of Lecture Notes in Computer Science pages 511--521 2011.","key":"e_1_3_2_1_4_1","DOI":"10.1007\/978-3-642-21827-9_52"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1109\/PERCOMW.2011.5766914"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1016\/j.pmcj.2012.03.002"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"CVPR","author":"Gross R.","year":"2008","unstructured":"R. Gross , L. Sweeney , F. de la Torre, and S. Baker. Semi-supervised learning of multi-factor models for face de-identification . In CVPR , pages 1 -- 8 , 2008 . R. Gross, L. Sweeney, F. de la Torre, and S. Baker. Semi-supervised learning of multi-factor models for face de-identification. In CVPR, pages 1--8, 2008."},{"unstructured":"David Kotz Sasikanth Avancha and Amit Baxi. A privacy framework for mobile health and home-care systems.  David Kotz Sasikanth Avancha and Amit Baxi. A privacy framework for mobile health and home-care systems.","key":"e_1_3_2_1_9_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1007\/978-3-540-88693-8_25"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1109\/ICCV.2009.5459250"},{"key":"e_1_3_2_1_12_1","volume-title":"Advertisers start using facial recognition to tailor pitches","author":"Li Shan","year":"2011","unstructured":"Shan Li and David Sarno . Advertisers start using facial recognition to tailor pitches , 2011 . http:\/\/www.latimes.com\/business\/la-fi-facial-recognition-20110821,0,7327487.story. Shan Li and David Sarno. Advertisers start using facial recognition to tailor pitches, 2011. http:\/\/www.latimes.com\/business\/la-fi-facial-recognition-20110821,0,7327487.story."},{"key":"e_1_3_2_1_13_1","volume-title":"WIAMIS","author":"Isabel","year":"2005","unstructured":"Isabel Martnez-ponte, Xavier Desurmont , Jerome Meessen , and Jean franois Delaigle . Robust human face hiding ensuring privacy . In WIAMIS , 2005 . Isabel Martnez-ponte, Xavier Desurmont, Jerome Meessen, and Jean franois Delaigle. Robust human face hiding ensuring privacy. In WIAMIS, 2005."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/1921168.1921191"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/TKDE.2005.32"},{"key":"e_1_3_2_1_16_1","volume-title":"August","author":"Taigman Yaniv","year":"2011","unstructured":"Yaniv Taigman and Lior Wolf . Leveraging billions of faces to overcome performance barriers in unconstrained face recognition , August 2011 . Yaniv Taigman and Lior Wolf. Leveraging billions of faces to overcome performance barriers in unconstrained face recognition, August 2011."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1002\/(SICI)1099-128X(199801\/02)12:1<41::AID-CEM500>3.0.CO;2-F"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.5555\/2354409.2354865"}],"event":{"sponsor":["ACSA Applied Computing Security Assoc"],"acronym":"ACSAC '12","name":"ACSAC '12: Annual Computer Security Applications Conference","location":"Orlando Florida USA"},"container-title":["Proceedings of the 28th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2420950.2420975","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2420950.2420975","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:33:57Z","timestamp":1750239237000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2420950.2420975"}},"subtitle":["balancing sensor data privacy and utility in automated face understanding"],"short-title":[],"issued":{"date-parts":[[2012,12,3]]},"references-count":18,"alternative-id":["10.1145\/2420950.2420975","10.1145\/2420950"],"URL":"https:\/\/doi.org\/10.1145\/2420950.2420975","relation":{},"subject":[],"published":{"date-parts":[[2012,12,3]]},"assertion":[{"value":"2012-12-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}