{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:21:13Z","timestamp":1776115273516,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":125,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,26]],"date-time":"2020-10-26T00:00:00Z","timestamp":1603670400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,26]]},"DOI":"10.1145\/3373625.3417024","type":"proceedings-article","created":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:58:05Z","timestamp":1604019485000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["Exploring Collection of Sign Language Datasets: Privacy, Participation, and Model Performance"],"prefix":"10.1145","author":[{"given":"Danielle","family":"Bragg","sequence":"first","affiliation":[{"name":"Microsoft Research, USA"}]},{"given":"Oscar","family":"Koller","sequence":"additional","affiliation":[{"name":"Microsoft, Germany"}]},{"given":"Naomi","family":"Caselli","sequence":"additional","affiliation":[{"name":"Boston University, USA"}]},{"given":"William","family":"Thies","sequence":"additional","affiliation":[{"name":"Microsoft Research, India"}]}],"member":"320","published-online":{"date-parts":[[2020,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2011.2105551"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Rakesh Agrawal and Ramakrishnan Srikant. 2000. Privacy-preserving data mining. In ACM Sigmod Record Vol.\u00a029. ACM 439\u2013450.","DOI":"10.1145\/335191.335438"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1983.4767370"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1121\/1.2003011"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1093\/deafed\/enh025"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.279181"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2450142.2450148"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2014.04.003"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Raphael Bost Raluca\u00a0Ada Popa Stephen Tu and Shafi Goldwasser. 2015. Machine learning classification over encrypted data.. In NDSS Vol.\u00a04324. 4325.","DOI":"10.14722\/ndss.2015.23241"},{"key":"e_1_3_2_1_12_1","volume-title":"PICO: Privacy through invertible cryptographic obscuration. In Computer Vision for Interactive and Intelligent Environment (CVIIE\u201905)","author":"Boult Terrance\u00a0Edward","year":"2005","unstructured":"Terrance\u00a0Edward Boult. 2005. PICO: Privacy through invertible cryptographic obscuration. In Computer Vision for Interactive and Intelligent Environment (CVIIE\u201905). IEEE, 27\u201338."},{"key":"e_1_3_2_1_13_1","volume-title":"Bourlard and Nelson Morgan","author":"A.","year":"1993","unstructured":"Herve\u00a0A. Bourlard and Nelson Morgan. 1993. Connectionist Speech Recognition: A Hybrid Approach. Kluwer Academic Publishers, Norwell, MA."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/358916.358935"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Danielle Bragg Oscar Koller Mary Bellard Larwan Berke Patrick Boudrealt Annelies Braffort Naomi Caselli Matt Huenerfauth Hernisa Kacorri Tessa Verhoef 2019. Sign Language Recognition Generation and Translation: An Interdisciplinary Perspective. arXiv preprint arXiv:1908.08597(2019).","DOI":"10.1145\/3308561.3353774"},{"key":"e_1_3_2_1_16_1","volume-title":"Using Multiple Sensors for Mobile Sign Language Recognition. In 7th IEEE International Symposium on Wearable Computers. IEEE","author":"Brashear Helene","year":"2003","unstructured":"Helene Brashear, Thad Starner, Paul Lukowicz, and Holger Junker. 2003. Using Multiple Sensors for Mobile Sign Language Recognition. In 7th IEEE International Symposium on Wearable Computers. IEEE, White Plains, NY, USA, 45\u201352."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078847"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/0024-3841(95)00032-1"},{"key":"e_1_3_2_1_19_1","first-page":"145","article-title":"Representing Handshapes in Sign Languages Using Morphological Templates1. Geb\u00e4rdensprachen: Struktur, Erwerb","volume":"13","author":"Brentari Diane","year":"2018","unstructured":"Diane Brentari. 2018. Representing Handshapes in Sign Languages Using Morphological Templates1. Geb\u00e4rdensprachen: Struktur, Erwerb, Verwendung 13 (2018), 145.","journal-title":"Verwendung"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2696454.2696484"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1037\/e577562012-003"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2016.7899606"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2009-429581"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2008.4587569"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/0141-5425(92)90088-3"},{"key":"e_1_3_2_1_26_1","unstructured":"Kamalika Chaudhuri and Claire Monteleoni. 2009. Privacy-preserving logistic regression. In Advances in neural information processing systems. 289\u2013296."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/2567709.2567754"},{"key":"e_1_3_2_1_28_1","volume-title":"Technical Report TR-10-98. Computer Science Group","author":"Chen S.","year":"1998","unstructured":"S. Chen and J. Goodman. 1998. An Empirical Study of Smoothing Techniques for Language Modeling. Technical Report TR-10-98. Computer Science Group, Harvard University. 1\u201363 pages."},{"key":"e_1_3_2_1_29_1","volume-title":"2012 BIOSIG-proceedings of the international conference of biometrics special interest group (BIOSIG). IEEE, 1\u20137.","author":"Chingovska Ivana","year":"2012","unstructured":"Ivana Chingovska, Andr\u00e9 Anjos, and S\u00e9bastien Marcel. 2012. On the effectiveness of local binary patterns in face anti-spoofing. In 2012 BIOSIG-proceedings of the international conference of biometrics special interest group (BIOSIG). IEEE, 1\u20137."},{"key":"e_1_3_2_1_30_1","volume-title":"Deaf president now!: The 1988 revolution at Gallaudet University","author":"Christiansen B","unstructured":"John\u00a0B Christiansen and Sharon\u00a0N Barnartt. 2003. Deaf president now!: The 1988 revolution at Gallaudet University. Gallaudet University Press."},{"key":"e_1_3_2_1_31_1","volume-title":"Sign Language Recognition Using Linguistically Derived Sub-Units. In LREC Workshop on the Representation and Processing of Sign Languages. Valletta, Malta, 57\u201361","author":"Cooper Helen","year":"2010","unstructured":"Helen Cooper and Richard Bowden. 2010. Sign Language Recognition Using Linguistically Derived Sub-Units. In LREC Workshop on the Representation and Processing of Sign Languages. Valletta, Malta, 57\u201361."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2018.2889563"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Kevin Dale Kalyan Sunkavalli Micah\u00a0K Johnson Daniel Vlasic Wojciech Matusik and Hanspeter Pfister. 2011. Video face replacement. In ACM Transactions on Graphics (TOG) Vol.\u00a030. ACM 130.","DOI":"10.1145\/2070781.2024164"},{"key":"e_1_3_2_1_34_1","volume-title":"Collective information practice: Exploring privacy and security as social and cultural phenomena. Human-computer interaction 21, 3","author":"Dourish Paul","year":"2006","unstructured":"Paul Dourish and Ken Anderson. 2006. Collective information practice: Exploring privacy and security as social and cultural phenomena. Human-computer interaction 21, 3 (2006), 319\u2013342."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972740.21"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2006.184"},{"key":"e_1_3_2_1_37_1","volume-title":"Differential privacy. Encyclopedia of Cryptography and Security(2011), 338\u2013340","author":"Dwork Cynthia","unstructured":"Cynthia Dwork. 2011. Differential privacy. Encyclopedia of Cryptography and Security(2011), 338\u2013340."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.12"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591796.2591883"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1177\/0160597613481731"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1099554.1099711"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.182690"},{"key":"e_1_3_2_1_43_1","unstructured":"World\u00a0Federation fo\u00a0the Deaf. 2018. Our Work. http:\/\/wfdeaf.org\/our-work\/"},{"key":"e_1_3_2_1_44_1","volume-title":"Modality Combination Techniques for Continuous Sign Language Recognition. In Iberian Conference on Pattern Recognition and Image Analysis(Lecture Notes in Computer Science 7887)","author":"Forster Jens","year":"2013","unstructured":"Jens Forster, Christian Oberd\u00f6rfer, Oscar Koller, and Hermann Ney. 2013. Modality Combination Techniques for Continuous Sign Language Recognition. In Iberian Conference on Pattern Recognition and Image Analysis(Lecture Notes in Computer Science 7887). Springer, Madeira, Portugal, 89\u201399."},{"key":"e_1_3_2_1_45_1","volume-title":"Proc. Int. Conf. on Language Resources and Evaluation (LREC). Reykjavik","author":"Forster Jens","year":"2014","unstructured":"Jens Forster, Christoph Schmidt, Oscar Koller, Martin Bellgardt, and Hermann Ney. 2014. Extensions of the Sign Language Recognition and Translation Corpus RWTH-PHOENIX-Weather. In Proc. Int. Conf. on Language Resources and Evaluation (LREC). Reykjavik, Island, 1911\u20131916."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2009.5459413"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Craig Gentry 2009. Fully homomorphic encryption using ideal lattices.. In Stoc Vol.\u00a09. 169\u2013178.","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_48_1","volume-title":"International Conference on Machine Learning. 201\u2013210","author":"Gilad-Bachrach Ran","year":"2016","unstructured":"Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In International Conference on Machine Learning. 201\u2013210."},{"key":"e_1_3_2_1_49_1","volume-title":"International Conference on Information Security and Cryptology. Springer, 1\u201321","author":"Graepel Thore","year":"2012","unstructured":"Thore Graepel, Kristin Lauter, and Michael Naehrig. 2012. ML confidential: Machine learning on encrypted data. In International Conference on Information Security and Cryptology. Springer, 1\u201321."},{"key":"e_1_3_2_1_50_1","unstructured":"Gary\u00a0J. Grimes. 1983. Digital Data Entry Glove Interface Device. US Patent."},{"key":"e_1_3_2_1_51_1","volume-title":"International Workshop on Privacy Enhancing Technologies. Springer, 227\u2013242","author":"Gross Ralph","year":"2005","unstructured":"Ralph Gross, Edoardo Airoldi, Bradley Malin, and Latanya Sweeney. 2005. Integrating utility into face de-identification. In International Workshop on Privacy Enhancing Technologies. Springer, 227\u2013242."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10995-017-2287-y"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"crossref","unstructured":"Wyatte\u00a0C Hall Leonard\u00a0L Levin and Melissa\u00a0L Anderson. 2017. Language deprivation syndrome: a possible neurodevelopmental disorder with sociocultural origins. Social psychiatry and psychiatric epidemiology 52 6(2017) 761\u2013776.","DOI":"10.1007\/s00127-017-1351-7"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1353\/sls.0.0011"},{"key":"e_1_3_2_1_55_1","volume-title":"Camoflash-anti-paparazzi clutch. URL http:\/\/ahprojects. com\/projects\/camoflash\/Accessed 8(2010)","author":"Harvey A","year":"2014","unstructured":"A Harvey. 2010. Camoflash-anti-paparazzi clutch. URL http:\/\/ahprojects. com\/projects\/camoflash\/Accessed 8(2010), 2014."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173621"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1093\/deafed\/eny014"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1353\/aad.2012.0684"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199763"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2015.7177428"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.2011.01570.x"},{"key":"e_1_3_2_1_62_1","volume-title":"Audism: The making of a word. Unpublished essay","author":"Humphries Tom","year":"1975","unstructured":"Tom Humphries. 1975. Audism: The making of a word. Unpublished essay (1975)."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813603"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081942"},{"key":"e_1_3_2_1_65_1","unstructured":"Jeeliz. [n.d.]. jeelizFaceFilter. https:\/\/github.com\/jeeliz\/jeelizFaceFilter"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654889"},{"key":"e_1_3_2_1_67_1","volume-title":"MS-ASL: A Large-Scale Data Set and Benchmark for Understanding American Sign Language. arXiv:1812.01053 [cs] (Dec","author":"Reza\u00a0Vaezi Joze Hamid","year":"2018","unstructured":"Hamid Reza\u00a0Vaezi Joze and Oscar Koller. 2018. MS-ASL: A Large-Scale Data Set and Benchmark for Understanding American Sign Language. arXiv:1812.01053 [cs] (Dec. 2018). arxiv:1812.01053\u00a0[cs]"},{"key":"e_1_3_2_1_68_1","volume-title":"Weakly Supervised Learning with Multi-Stream CNN-LSTM-HMMs to Discover Sequential Parallelism in Sign Language Videos","author":"Koller Oscar","unstructured":"Oscar Koller, Necati\u00a0Cihan Camgoz, Hermann Ney, and Richard Bowden. 2019. Weakly Supervised Learning with Multi-Stream CNN-LSTM-HMMs to Discover Sequential Parallelism in Sign Language Videos. IEEE Transactions on Pattern Analysis and Machine Intelligence accepted for publication(2019), 15."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2015.09.013"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.364"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.5244\/C.30.136"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-018-1121-3"},{"key":"e_1_3_2_1_73_1","unstructured":"Pavel Korshunov and S\u00e9bastien Marcel. 2018. Deepfakes: a new threat to face recognition? assessment and detection. arXiv preprint arXiv:1812.08685(2018)."},{"key":"e_1_3_2_1_74_1","first-page":"14","article-title":"Video quality for face detection, recognition, and tracking","volume":"7","author":"Korshunov Pavel","year":"2011","unstructured":"Pavel Korshunov and Wei\u00a0Tsang Ooi. 2011. Video quality for face detection, recognition, and tracking. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 7, 3 (2011), 14.","journal-title":"ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM)"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134702"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/AFGR.1998.671007"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.02.005"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6_3"},{"key":"e_1_3_2_1_79_1","volume-title":"Three generations, no imbeciles: Eugenics, the Supreme Court, and Buck v. Bell","author":"Lombardo A","unstructured":"Paul\u00a0A Lombardo. 2008. Three generations, no imbeciles: Eugenics, the Supreme Court, and Buck v. Bell. JHU Press."},{"key":"e_1_3_2_1_80_1","volume-title":"Face spoofing detection from single images using texture and local shape analysis. IET biometrics 1, 1","author":"M\u00e4\u00e4tt\u00e4 Jukka","year":"2012","unstructured":"Jukka M\u00e4\u00e4tt\u00e4, Abdenour Hadid, and Matti Pietik\u00e4inen. 2012. Face spoofing detection from single images using texture and local shape analysis. IET biometrics 1, 1 (2012), 3\u201310."},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1093\/deafed\/enq049"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.880081"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2011.06.015"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.3390\/s150612959"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.01.041"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1353\/sls.2012.0005"},{"key":"e_1_3_2_1_88_1","volume-title":"Blindspot: Creating capture-resistant spaces. In Protecting Privacy in Video Surveillance","author":"Patel N","year":"2009","unstructured":"Shwetak\u00a0N Patel, Jay\u00a0W Summet, and Khai\u00a0N Truong. 2009. Blindspot: Creating capture-resistant spaces. In Protecting Privacy in Video Surveillance. Springer, 185\u2013201."},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.278"},{"key":"e_1_3_2_1_90_1","volume-title":"Biometric recognition: Security and privacy concerns","author":"Prabhakar Salil","year":"2003","unstructured":"Salil Prabhakar, Sharath Pankanti, and Anil\u00a0K Jain. 2003. Biometric recognition: Security and privacy concerns. IEEE security & privacy2 (2003), 33\u201342."},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675246"},{"key":"e_1_3_2_1_92_1","first-page":"69","article-title":"Cartoon-like avatar generation using facial component matching","volume":"8","author":"Rhee Chi-Hyoung","year":"2013","unstructured":"Chi-Hyoung Rhee and C LEE. 2013. Cartoon-like avatar generation using facial component matching. Int. J. of Multimedia and Ubiquitous Engineering 8, 4(2013), 69\u201378.","journal-title":"Int. J. of Multimedia and Ubiquitous Engineering"},{"key":"e_1_3_2_1_93_1","unstructured":"Benjamin\u00a0IP Rubinstein Peter\u00a0L Bartlett Ling Huang and Nina Taft. 2009. Learning in a large function space: Privacy-preserving mechanisms for SVM learning. arXiv preprint arXiv:0911.5708(2009)."},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"e_1_3_2_1_95_1","volume-title":"RASR - The RWTH Aachen University Open Source Speech Recognition Toolkit. In IEEE Automatic Speech Recognition and Understanding Workshop (ASRU)","author":"Rybach David","year":"2011","unstructured":"David Rybach, Stefan Hahn, Patrick Lehnen, David Nolden, Martin Sundermeyer, Zolt\u00e1n T\u00fcske, Simon Wiesler, Ralf Schl\u00fcter, and Hermann Ney. 2011. RASR - The RWTH Aachen University Open Source Speech Recognition Toolkit. In IEEE Automatic Speech Recognition and Understanding Workshop (ASRU). Waikoloa, HI, USA."},{"key":"e_1_3_2_1_96_1","volume-title":"Phonological representation of the sign: Linearity and nonlinearity in American Sign Language. Vol.\u00a032","author":"Sandler Wendy","unstructured":"Wendy Sandler. 1989. Phonological representation of the sign: Linearity and nonlinearity in American Sign Language. Vol.\u00a032. Walter de Gruyter."},{"key":"e_1_3_2_1_97_1","volume-title":"Protecting Privacy in Video Surveillance","author":"Schiff Jeremy","unstructured":"Jeremy Schiff, Marci Meingast, Deirdre\u00a0K Mulligan, Shankar Sastry, and Ken Goldberg. 2009. Respectful cameras: Detecting visual markers in real-time to address privacy concerns. In Protecting Privacy in Video Surveillance. Springer, 65\u201389."},{"key":"e_1_3_2_1_98_1","volume-title":"Enhancing Gloss-Based Corpora with Facial Features Using Active Appearance Models. In International Symposium on Sign Language Translation and Avatar Technology, Vol.\u00a02","author":"Schmidt Christoph","year":"2013","unstructured":"Christoph Schmidt, Oscar Koller, Hermann Ney, Thomas Hoyoux, and Justus Piater. 2013. Enhancing Gloss-Based Corpora with Facial Features Using Active Appearance Models. In International Symposium on Sign Language Translation and Avatar Technology, Vol.\u00a02. Chicago, IL, USA."},{"key":"e_1_3_2_1_99_1","volume-title":"International Workshop on Spoken Language Translation","author":"Schmidt Christoph","year":"2013","unstructured":"Christoph Schmidt, Oscar Koller, Hermann Ney, Thomas Hoyoux, and Justus Piater. 2013. Using Viseme Recognition to Improve a Sign Language Translation System. In International Workshop on Spoken Language Translation. Heidelberg, Germany, 197\u2013203."},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1080\/03601277.2012.734165"},{"key":"e_1_3_2_1_101_1","volume-title":"Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. ACM, 1310\u20131321","author":"Shokri Reza","year":"2015","unstructured":"Reza Shokri and Vitaly Shmatikov. 2015. Privacy-preserving deep learning. In Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. ACM, 1310\u20131321."},{"key":"e_1_3_2_1_102_1","volume-title":"deaf-friendly research, and good practice when studying sign languages. Research methods in sign language studies: A practical guide","author":"Singleton J","year":"2015","unstructured":"J Singleton, Amber Martin, and Gary Morgan. 2015. Ethics, deaf-friendly research, and good practice when studying sign languages. Research methods in sign language studies: A practical guide (2015), 7\u201320."},{"key":"e_1_3_2_1_103_1","volume-title":"Color-based face detection in the","author":"Solina Franc","year":"2003","unstructured":"Franc Solina, Peter Peer, Borut Batagelj, Samo Juvan, and Jure Kova\u010d. 2003. Color-based face detection in the\u201d 15 seconds of fame\u201d art installation. (2003)."},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.5555\/2627435.2670313"},{"key":"e_1_3_2_1_105_1","volume-title":"International Symposium on Computer Vision","author":"Starner T.","unstructured":"T. Starner and A. Pentland. 1995. Real-Time American Sign Language Recognition from Video Using Hidden Markov Models. In International Symposium on Computer Vision. Coral Gables, Florida, USA, 265\u2013270."},{"key":"e_1_3_2_1_106_1","unstructured":"William\u00a0C Stokoe. 1960. Sign language structure (Studies in Linguistics. Occasional paper 8(1960)."},{"key":"e_1_3_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.21437\/ICSLP.2002-303"},{"key":"e_1_3_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"e_1_3_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(88)90048-9"},{"key":"e_1_3_2_1_110_1","first-page":"59","article-title":"A theory of creepy: technology, privacy and shifting social norms","volume":"16","author":"Tene Omer","year":"2013","unstructured":"Omer Tene and Jules Polonetsky. 2013. A theory of creepy: technology, privacy and shifting social norms. Yale JL & Tech. 16(2013), 59.","journal-title":"Yale JL & Tech."},{"key":"e_1_3_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/2929464.2929475"},{"key":"e_1_3_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1007\/11551201_5"},{"key":"e_1_3_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2011.6130267"},{"key":"e_1_3_2_1_114_1","volume-title":"Proc. British Machine Vision Conference (BMVC)","author":"Vaezi\u00a0Joze Hamid","year":"2019","unstructured":"Hamid Vaezi\u00a0Joze and Oscar Koller. 2019. MS-ASL: A Large-Scale Data Set and Benchmark for Understanding American Sign Language. In Proc. British Machine Vision Conference (BMVC). Cardiff, UK."},{"key":"e_1_3_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0041-y"},{"key":"e_1_3_2_1_116_1","unstructured":"Els Van\u00a0der Kooij. 2002. Phonological categories in Sign Language of the Netherlands: The role of phonetic implementation and iconicity. Netherlands Graduate School of Linguistics."},{"key":"e_1_3_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10209-007-0104-x"},{"key":"e_1_3_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2003.1251144"},{"key":"e_1_3_2_1_119_1","volume-title":"Phonological and prosodic layering of nonmanuals in American Sign Language. The signs of language revisited: An anthology to honor Ursula Bellugi and Edward Klima","author":"Wilbur B","year":"2000","unstructured":"Ronnie\u00a0B Wilbur. 2000. Phonological and prosodic layering of nonmanuals in American Sign Language. The signs of language revisited: An anthology to honor Ursula Bellugi and Edward Klima (2000), 215\u2013244."},{"key":"e_1_3_2_1_120_1","volume-title":"Williams and David Zipser","author":"J.","year":"1995","unstructured":"Ronald\u00a0J. Williams and David Zipser. 1995. Gradient-Based Learning Algorithms for Recurrent Networks and Their Computational Complexity. Back-propagation: Theory, architectures and applications 1 (1995), 433\u2013486."},{"key":"e_1_3_2_1_121_1","unstructured":"YouTube. 2018. #SIGNanimojichallenge [Interview With Bilal Chinoy]. https:\/\/www.youtube.com\/watch?v=0av-wKimT9Q"},{"key":"e_1_3_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2008.4712094"},{"key":"e_1_3_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070481.2070532"},{"key":"e_1_3_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2015.2416591"},{"key":"e_1_3_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1109\/SKG.2010.19"}],"event":{"name":"ASSETS '20: The 22nd International ACM SIGACCESS Conference on Computers and Accessibility","location":"Virtual Event Greece","acronym":"ASSETS '20","sponsor":["SIGACCESS ACM Special Interest Group on Accessible Computing"]},"container-title":["Proceedings of the 22nd International ACM SIGACCESS Conference on Computers and Accessibility"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3373625.3417024","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3373625.3417024","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:22Z","timestamp":1750203862000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3373625.3417024"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,26]]},"references-count":125,"alternative-id":["10.1145\/3373625.3417024","10.1145\/3373625"],"URL":"https:\/\/doi.org\/10.1145\/3373625.3417024","relation":{},"subject":[],"published":{"date-parts":[[2020,10,26]]},"assertion":[{"value":"2020-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}