{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T15:54:27Z","timestamp":1774194867097,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,1]],"date-time":"2014-09-01T00:00:00Z","timestamp":1409529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1353400"],"award-info":[{"award-number":["1353400"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1145\/2631775.2631803","type":"proceedings-article","created":{"date-parts":[[2014,8,29]],"date-time":"2014-08-29T13:03:43Z","timestamp":1409317423000},"page":"136-147","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Analyzing images' privacy for the modern web"],"prefix":"10.1145","author":[{"given":"Anna C.","family":"Squicciarini","sequence":"first","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]},{"given":"Cornelia","family":"Caragea","sequence":"additional","affiliation":[{"name":"University of North Texas, Denton, TX, USA"}]},{"given":"Rahul","family":"Balakavi","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Java content based image retrieval 2011. https:\/\/code.google.com\/p\/jcbir\/.  Java content based image retrieval 2011. https:\/\/code.google.com\/p\/jcbir\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240683"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240772"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1520340.1520704"},{"key":"e_1_3_2_1_6_1","unstructured":"S. D. Blog. Pin or not to pin: An inside look 2012. http:\/\/blog.socialdiscovery.org\/tag\/statistics\/.  S. D. Blog. Pin or not to pin: An inside look 2012. http:\/\/blog.socialdiscovery.org\/tag\/statistics\/."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572569"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2009.45"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2502081.2502282"},{"key":"e_1_3_2_1_10_1","unstructured":"Bullguard. Privacy violations the dark side of social media. http:\/\/www.bullguard.com\/bullguard-security-center\/internet-security\/social-media-dangers\/privacy-violations-in-social-media.aspx.  Bullguard. Privacy violations the dark side of social media. http:\/\/www.bullguard.com\/bullguard-security-center\/internet-security\/social-media-dangers\/privacy-violations-in-social-media.aspx."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.788646"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SISAP.2009.16"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295142"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1459359.1459473"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1698924.1699229"},{"key":"e_1_3_2_1_16_1","unstructured":"R. da Silva Torres and A. Falcao. Content-based image retrieval: Theory and applications. Revista de Inform\u00e1tica Te\u00f3rica e Aplicada 2(13):161--185 2006.  R. da Silva Torres and A. Falcao. Content-based image retrieval: Theory and applications. Revista de Inform\u00e1tica Te\u00f3rica e Aplicada 2(13):161--185 2006."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1348246.1348248"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1888150.1888157"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772727"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/11760146_14"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/641007.641080"},{"key":"e_1_3_2_1_22_1","unstructured":"K. J. Higgins. Social networks for patients stir privacy security worries 2010. Online at http:\/\/www.darkreading.com\/authentication\/167901072\/security\/privacy\/227500908\/social-networks-for-patients-stir-privacy-security-worries.html.  K. J. Higgins. Social networks for patients stir privacy security worries 2010. Online at http:\/\/www.darkreading.com\/authentication\/167901072\/security\/privacy\/227500908\/social-networks-for-patients-stir-privacy-security-worries.html."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979200"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207728"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1870096.1870102"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240682"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.07.002"},{"key":"e_1_3_2_1_30_1","unstructured":"A. Plangprasopchok and K. Lerman. Exploiting social annotation for automatic resource discovery. CoRR abs\/0704.1675 2007.  A. Plangprasopchok and K. Lerman. Exploiting social annotation for automatic resource discovery. CoRR abs\/0704.1675 2007."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2037676.2037684"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2324796.2324810"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"J. Read B. Pfahringer G. Holmes and E. Frank. Classifier chains for multi-label classification 2011.  J. Read B. Pfahringer G. Holmes and E. Frank. Classifier chains for multi-label classification 2011.","DOI":"10.1007\/s10994-011-5256-5"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526813"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2072298.2072496"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-010-0650-8"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/946247.946751"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1995966.1996000"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1631272.1631351"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2191529"},{"issue":"12","key":"e_1_3_2_1_41_1","first-page":"1935","article-title":"On image classification: City images vs. landscapes","volume":"31","author":"Vailaya A.","year":"1921","journal-title":"Pattern Recognition"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.COLLABORATECOM2009.8340"},{"key":"e_1_3_2_1_43_1","first-page":"1903","volume-title":"Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2009","author":"Wang C.","year":"2009"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1290082.1290111"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1873951.1873963"},{"key":"e_1_3_2_1_46_1","first-page":"2","article-title":"Providing access control to online photo albums based on tags and linked data","author":"Yeung C.","year":"2009","journal-title":"Social Semantic Web: Where Web"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772881"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/1698924.1699283"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348292"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551510386164"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1816041.1816047"}],"event":{"name":"HT '14: 25th ACM Conference on Hypertext and Social Media","location":"Santiago Chile","acronym":"HT '14","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 25th ACM conference on Hypertext and social media"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2631775.2631803","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2631775.2631803","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:13Z","timestamp":1750231153000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2631775.2631803"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":50,"alternative-id":["10.1145\/2631775.2631803","10.1145\/2631775"],"URL":"https:\/\/doi.org\/10.1145\/2631775.2631803","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]},"assertion":[{"value":"2014-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}