{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T20:44:55Z","timestamp":1759178695526,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,21]],"date-time":"2020-04-21T00:00:00Z","timestamp":1587427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,21]]},"DOI":"10.1145\/3313831.3376434","type":"proceedings-article","created":{"date-parts":[[2020,5,27]],"date-time":"2020-05-27T16:16:47Z","timestamp":1590596207000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Camera Adversaria"],"prefix":"10.1145","author":[{"given":"Kieran","family":"Browne","sequence":"first","affiliation":[{"name":"Australian National University, Canberra, ACT, Australia"}]},{"given":"Ben","family":"Swift","sequence":"additional","affiliation":[{"name":"Australian National University, Canberra, ACT, Australia"}]},{"given":"Terhi","family":"Nurmikko-Fuller","sequence":"additional","affiliation":[{"name":"Australian National University, Canberra, ACT, Australia"}]}],"member":"320","published-online":{"date-parts":[[2020,4,23]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"The work of being watched: Interactive media and the exploitation of self-disclosure. Critical studies in media communication 19, 2","author":"Andrejevic Mark","year":"2002","unstructured":"Mark Andrejevic. 2002. The work of being watched: Interactive media and the exploitation of self-disclosure. Critical studies in media communication 19, 2 (2002), 230--248."},{"key":"e_1_3_2_2_2_1","volume-title":"Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples. arXiv:1802.00420 [cs] (Feb","author":"Athalye Anish","year":"2018","unstructured":"Anish Athalye, Nicholas Carlini, and David Wagner. 2018. Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples. arXiv:1802.00420 [cs] (Feb. 2018)."},{"key":"e_1_3_2_2_3_1","volume-title":"Artnome","author":"Bailey Jason","year":"2019","unstructured":"Jason Bailey. 2019. Bye Bye Camera - an App for the Post-human Era. https:\/\/www.artnome.com\/news\/2019\/6\/ 24\/bye-bye-camera-an-app-for-the-post-human-era, Artnome (2019). Accessed: 16 September 2019."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466451"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.07.023"},{"key":"e_1_3_2_2_6_1","unstructured":"James Bridle. 2017. Every CCTV Camera (CC). https:\/\/jamesbridle.com\/works\/every-cctv-camera-cc. (2017)."},{"key":"e_1_3_2_2_7_1","volume-title":"GitHub repository","author":"Browne Kieran","year":"2019","unstructured":"Kieran Browne. 2019. Camera Adversaria Source Code. https:\/\/github.com\/kieranbrowne\/camera-adversaria, GitHub repository (2019)."},{"volume-title":"Human and Machine Learning","author":"Browne Kieran","key":"e_1_3_2_2_8_1","unstructured":"Kieran Browne, Ben Swift, and Henry Gardner. 2018. Critical Challenges for the Visual Representation of Deep Neural Networks. In Human and Machine Learning. Springer, Switzerland, 119--136."},{"key":"e_1_3_2_2_9_1","volume-title":"Vernacular resistance to data collection and analysis: A political theory of obfuscation. First Monday 16, 5","author":"Brunton Finn","year":"2011","unstructured":"Finn Brunton and Helen Nissenbaum. 2011. Vernacular resistance to data collection and analysis: A political theory of obfuscation. First Monday 16, 5 (2011)."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1177\/0163443718754648"},{"key":"e_1_3_2_2_11_1","volume-title":"Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Neural Networks. arXiv preprint arXiv:1810.00470","author":"Co Kenneth T","year":"2018","unstructured":"Kenneth T Co, Luis Mu\u00f1oz-Gonz\u00e1lez, and Emil C Lupu. 2018. Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Neural Networks. arXiv preprint arXiv:1810.00470 (2018)."},{"volume-title":"Between Truth and Power: The Legal Constructions of Informational Capitalism","author":"Cohen Julie E","key":"e_1_3_2_2_12_1","unstructured":"Julie E Cohen. 2019. Between Truth and Power: The Legal Constructions of Informational Capitalism. Oxford University Press, USA."},{"volume-title":"Adversarial Design","author":"DiSalvo Carl","key":"e_1_3_2_2_13_1","unstructured":"Carl DiSalvo. 2012. Adversarial Design. MIT Press."},{"volume-title":"Design noir: The secret life of electronic objects","author":"Dunne Anthony","key":"e_1_3_2_2_14_1","unstructured":"Anthony Dunne and Fiona Raby. 2001. Design noir: The secret life of electronic objects. Birkh\u00e4user."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v6i3.3280"},{"key":"e_1_3_2_2_16_1","unstructured":"Michel Foucault. 2012. Discipline and Punish: The Birth of the Prison. Vintage."},{"key":"e_1_3_2_2_17_1","unstructured":"Ian J. Goodfellow Jonathon Shlens and Christian Szegedy. 2014. Explaining and Harnessing Adversarial Examples. (2014). http:\/\/arxiv.org\/abs\/1412.6572"},{"key":"e_1_3_2_2_18_1","unstructured":"Adam Harvey. 2010. CV Dazzle: Camouflage from face detection. http:\/\/cvdazzle.com\/. (2010). Accessed: 13 September 2019."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173621"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300597"},{"key":"e_1_3_2_2_21_1","volume-title":"The Guardian (14","author":"Hern Alex","year":"2017","unstructured":"Alex Hern. 2017. Vibrator maker ordered to pay out C$4m for tracking users' sexual activity. https:\/\/www.theguardian.com\/technology\/2017\/mar\/14\/ we-vibe-vibrator-tracking-users-sexual-habits, The Guardian (14 March 2017). Accessed: 7 January 2020."},{"key":"e_1_3_2_2_22_1","volume-title":"Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861","author":"Howard Andrew G","year":"2017","unstructured":"Andrew G Howard, Menglong Zhu, Bo Chen, Dmitry Kalenichenko, Weijun Wang, Tobias Weyand, Marco Andreetto, and Hartwig Adam. 2017. Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861 (2017)."},{"volume-title":"Lessons from the Identity trail: Anonymity, privacy, and identity in a networked society","author":"Howe Daniel C","key":"e_1_3_2_2_23_1","unstructured":"Daniel C Howe and Helen Nissenbaum. 2009. TrackMeNot: Resisting surveillance in web search. In Lessons from the Identity trail: Anonymity, privacy, and identity in a networked society, Ian Kerr, Carole Lucock, and Valerie Steeves (Eds.). Oxford University Press, 417--436."},{"key":"e_1_3_2_2_24_1","unstructured":"Sandy Huang Nicolas Papernot Ian Goodfellow Yan Duan and Pieter Abbeel. 2017. Adversarial Attacks on Neural Network Policies. (2017). http:\/\/arxiv.org\/abs\/1702.02284"},{"key":"e_1_3_2_2_25_1","volume-title":"DeepPrivacy: A Generative Adversarial Network for Face Anonymization. arXiv preprint arXiv:1909.04538","author":"Hukkel\u00e5s H\u00e5kon","year":"2019","unstructured":"H\u00e5kon Hukkel\u00e5s, Rudolf Mester, and Frank Lindseth. 2019. DeepPrivacy: A Generative Adversarial Network for Face Anonymization. arXiv preprint arXiv:1909.04538 (2019)."},{"key":"e_1_3_2_2_26_1","volume-title":"Introducing Appsperiments: Exploring the Potentials of Mobile Photography. https:\/\/ai.googleblog.com\/2017\/12\/ introducing-appsperiments-exploring.html, Google AI Blog","author":"Kauffmann Alex","year":"2017","unstructured":"Alex Kauffmann. 2017. Introducing Appsperiments: Exploring the Potentials of Mobile Photography. https:\/\/ai.googleblog.com\/2017\/12\/ introducing-appsperiments-exploring.html, Google AI Blog (2017). Accessed: 16 September 2019."},{"key":"e_1_3_2_2_27_1","volume-title":"Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & security 64","author":"Kokolakis Spyros","year":"2017","unstructured":"Spyros Kokolakis. 2017. Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & security 64 (2017), 122--134."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971485.2993921"},{"volume-title":"The Whale and the Reactor: A search for limits in an age of high technology","author":"Langdon Winner","key":"e_1_3_2_2_29_1","unstructured":"Winner Langdon. 1986. The Whale and the Reactor: A search for limits in an age of high technology. University of Chicago Press, Chicago."},{"key":"e_1_3_2_2_30_1","volume-title":"Google AI Blog","author":"Levoy Marc","year":"2017","unstructured":"Marc Levoy. 2017. Portrait mode on the Pixel 2 and Pixel 2 XL smartphones. https:\/\/ai.googleblog.com\/2017\/10\/ portrait-mode-on-pixel-2-and-pixel-2-xl.html, Google AI Blog (2017). Accessed: 16 September 2019."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134702"},{"key":"e_1_3_2_2_32_1","volume-title":"Defeating image obfuscation with deep learning. arXiv preprint arXiv:1609.00408","author":"McPherson Richard","year":"2016","unstructured":"Richard McPherson, Reza Shokri, and Vitaly Shmatikov. 2016. Defeating image obfuscation with deep learning. arXiv preprint arXiv:1609.00408 (2016)."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1080\/14791420.2015.1006646"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/09502386.2017.1374424"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"crossref","unstructured":"Seyed-Mohsen Moosavi-Dezfooli Alhussein Fawzi Omar Fawzi and Pascal Frossard. 2017b. Universal adversarial perturbations. (2017). https:\/\/youtu.be\/jhOu5yhe0rc","DOI":"10.1109\/CVPR.2017.17"},{"key":"e_1_3_2_2_37_1","volume-title":"Authoritarian and democratic technics. Technology and culture 5, 1","author":"Mumford Lewis","year":"1964","unstructured":"Lewis Mumford. 1964. Authoritarian and democratic technics. Technology and culture 5, 1 (1964), 1--8."},{"key":"e_1_3_2_2_38_1","unstructured":"Guardian News. 2019. Anti-surveillance protesters tear down 'smart' lamp-post in Hong Kong. (2019). https:\/\/youtu.be\/u1Ji7wonUhE"},{"key":"e_1_3_2_2_39_1","unstructured":"George Orwell. 2009. Nineteen Eighty-Four. Everyman's Library."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1177\/0093650211418338"},{"key":"e_1_3_2_2_41_1","unstructured":"James Pethokoukis. 2019. In praise of surveillance capitalism. http:\/\/www.aei.org\/publication\/ in-praise-of-surveillance-capitalism\/ AEIdeas Blog (2019). Accessed: 16 September 2019."},{"volume-title":"Presented as part of the 10th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 13). 515--528.","author":"Ra Moo-Ryong","key":"e_1_3_2_2_42_1","unstructured":"Moo-Ryong Ra, Ramesh Govindan, and Antonio Ortega. 2013. P3: Toward privacy-preserving photo sharing. In Presented as part of the 10th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 13). 515--528."},{"key":"e_1_3_2_2_43_1","volume-title":"Google AI Blog","author":"Rosenberg Chuck","year":"2013","unstructured":"Chuck Rosenberg. 2013. Improving Photo Search: A Step Across the Semantic Gap. https:\/\/ai.googleblog.com\/2013\/06\/improving-photo-search-step-across.html, Google AI Blog (2013). Accessed: 16 September 2019."},{"key":"e_1_3_2_2_44_1","volume-title":"NY Times (17","author":"Rosenberg Matthew","year":"2018","unstructured":"Matthew Rosenberg, Nicholas Confessore, and Carole Cadwalladr. 2018. How Trump Consultants Exploited the Facebook Data of Millions. https:\/\/www.nytimes.com\/2018\/03\/17\/us\/politics\/ cambridge-analytica-trump-campaign.html, NY Times (17 March 2018). Accessed: 7 January 2020."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24434-6_1"},{"volume-title":"Needs' for Surveillance and the Movement to Protect Privacy","author":"Rule James B","key":"e_1_3_2_2_46_1","unstructured":"James B Rule. 2012. 'Needs' for Surveillance and the Movement to Protect Privacy. In Routledge handbook of surveillance studies, Kirstie Ball, Kevin D Haggerty, and David Lyon (Eds.). Routledge, 64--71."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660460.2660470"},{"key":"e_1_3_2_2_48_1","volume-title":"International Conference on Learning Representations.","author":"Szegedy Christian","year":"2014","unstructured":"Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2014. Intriguing properties of neural networks. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2512938.2512939"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v17i1\/2.13237"},{"volume-title":"The Age of Surveillance Capitalism: The fight for a human future at the new frontier of power","author":"Zuboff Shoshana","key":"e_1_3_2_2_51_1","unstructured":"Shoshana Zuboff. 2019. The Age of Surveillance Capitalism: The fight for a human future at the new frontier of power. Profile Books."}],"event":{"name":"CHI '20: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Honolulu HI USA","acronym":"CHI '20"},"container-title":["Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3313831.3376434","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3313831.3376434","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:34Z","timestamp":1750199914000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3313831.3376434"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,21]]},"references-count":51,"alternative-id":["10.1145\/3313831.3376434","10.1145\/3313831"],"URL":"https:\/\/doi.org\/10.1145\/3313831.3376434","relation":{},"subject":[],"published":{"date-parts":[[2020,4,21]]},"assertion":[{"value":"2020-04-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}