{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:37:25Z","timestamp":1775230645881,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T00:00:00Z","timestamp":1591056000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,2]]},"DOI":"10.1145\/3379156.3391364","type":"proceedings-article","created":{"date-parts":[[2020,6,4]],"date-time":"2020-06-04T06:33:57Z","timestamp":1591252437000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["Privacy Preserving Gaze Estimation using Synthetic Images via a Randomized Encoding Based Framework"],"prefix":"10.1145","author":[{"given":"Efe","family":"Bozkir","sequence":"first","affiliation":[{"name":"University of T\u00fcbingen, Germany"}]},{"given":"Ali Burak","family":"\u00dcnal","sequence":"additional","affiliation":[{"name":"University of T\u00fcbingen"}]},{"given":"Mete","family":"Akg\u00fcn","sequence":"additional","affiliation":[{"name":"University of T\u00fcbingen"}]},{"given":"Enkelejda","family":"Kasneci","sequence":"additional","affiliation":[{"name":"University of T\u00fcbingen"}]},{"given":"Nico","family":"Pfeifer","sequence":"additional","affiliation":[{"name":"University of T\u00fcbingen"}]}],"member":"320","published-online":{"date-parts":[[2020,6,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319837"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3204493.3204531"},{"key":"e_1_3_2_1_3_1","volume-title":"Tutorials on the Foundations of Cryptography","author":"Applebaum Benny","unstructured":"Benny Applebaum . 2017. Garbled circuits as randomized encodings of functions: a primer . In Tutorials on the Foundations of Cryptography . Springer , 1\u201344. Benny Applebaum. 2017. Garbled circuits as randomized encodings of functions: a primer. In Tutorials on the Foundations of Cryptography. Springer, 1\u201344."},{"key":"e_1_3_2_1_4_1","volume-title":"Computationally private randomizing polynomials and their applications. computational complexity 15, 2","author":"Applebaum Benny","year":"2006","unstructured":"Benny Applebaum , Yuval Ishai , and Eyal Kushilevitz . 2006a. Computationally private randomizing polynomials and their applications. computational complexity 15, 2 ( 2006 ), 115\u2013162. Benny Applebaum, Yuval Ishai, and Eyal Kushilevitz. 2006a. Computationally private randomizing polynomials and their applications. computational complexity 15, 2 (2006), 115\u2013162."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539705446950"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300451"},{"key":"e_1_3_2_1_7_1","volume-title":"Defending Yarbus: Eye movements reveal observers","author":"Borji Ali","year":"2014","unstructured":"Ali Borji and Laurent Itti . 2014 . Defending Yarbus: Eye movements reveal observers \u2019 task. Journal of vision 14 (03 2014). https:\/\/doi.org\/10.1167\/14.3.29 10.1167\/14.3.29 Ali Borji and Laurent Itti. 2014. Defending Yarbus: Eye movements reveal observers\u2019 task. Journal of vision 14 (03 2014). https:\/\/doi.org\/10.1167\/14.3.29"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3343036.3343138"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITS.2017.2743171"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3204493.3204550"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/07370024.2014.892428"},{"key":"e_1_3_2_1_12_1","volume-title":"Optimal eye movement strategies: a comparison of neurosurgeons gaze patterns when using a surgical microscope. Acta neurochirurgica 159, 6","author":"Eivazi Shahram","year":"2017","unstructured":"Shahram Eivazi , Ahmad Hafez , Wolfgang Fuhl , Hoorieh Afkari , Enkelejda Kasneci , Martin Lehecka , and Roman Bednarik . 2017. Optimal eye movement strategies: a comparison of neurosurgeons gaze patterns when using a surgical microscope. Acta neurochirurgica 159, 6 ( 2017 ), 959\u2013966. Shahram Eivazi, Ahmad Hafez, Wolfgang Fuhl, Hoorieh Afkari, Enkelejda Kasneci, Martin Lehecka, and Roman Bednarik. 2017. Optimal eye movement strategies: a comparison of neurosurgeons gaze patterns when using a surgical microscope. Acta neurochirurgica 159, 6 (2017), 959\u2013966."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319816"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1743666.1743712"},{"key":"e_1_3_2_1_15_1","volume-title":"2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS). IEEE, 1\u20138. https:\/\/doi.org\/10","author":"V.","year":"2013","unstructured":"Oleg\u00a0 V. Komogortsev and Corey\u00a0D. Holland. 2013. Biometric authentication via complex oculomotor behavior . In 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS). IEEE, 1\u20138. https:\/\/doi.org\/10 .1109\/BTAS. 2013 .6712725 10.1109\/BTAS.2013.6712725 Oleg\u00a0V. Komogortsev and Corey\u00a0D. Holland. 2013. Biometric authentication via complex oculomotor behavior. In 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS). IEEE, 1\u20138. https:\/\/doi.org\/10.1109\/BTAS.2013.6712725"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1743666.1743679"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.trf.2014.04.016"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication(UbiComp \u201914 Adjunct). ACM","author":"J.","unstructured":"Daniel\u00a0 J. Liebling and S\u00f6ren Preibusch. 2014. Privacy Considerations for a Pervasive Eye Tracking World . In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication(UbiComp \u201914 Adjunct). ACM , New York, NY, USA, 1169\u20131177. https:\/\/doi.org\/10.1145\/2638728.2641688 10.1145\/2638728.2641688 Daniel\u00a0J. Liebling and S\u00f6ren Preibusch. 2014. Privacy Considerations for a Pervasive Eye Tracking World. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication(UbiComp \u201914 Adjunct). ACM, New York, NY, USA, 1169\u20131177. https:\/\/doi.org\/10.1145\/2638728.2641688"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319823"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1698924.1699144"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3204493.3204545"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2807520"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319915"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319913"},{"key":"e_1_3_2_1_25_1","volume-title":"Cryptology and Network Security","author":"\u00dcnal Ali\u00a0Burak","unstructured":"Ali\u00a0Burak \u00dcnal , Mete Akg\u00fcn , and Nico Pfeifer . 2019. A Framework with Randomized Encoding for a Fast Privacy Preserving Calculation of Non-linear Kernels for Machine Learning Applications in Precision Medicine . In Cryptology and Network Security . Springer International Publishing , Cham , 493\u2013511. Ali\u00a0Burak \u00dcnal, Mete Akg\u00fcn, and Nico Pfeifer. 2019. A Framework with Randomized Encoding for a Fast Privacy Preserving Calculation of Non-linear Kernels for Machine Learning Applications in Precision Medicine. In Cryptology and Network Security. Springer International Publishing, Cham, 493\u2013511."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857491.2857492"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3161410"}],"event":{"name":"ETRA '20: 2020 Symposium on Eye Tracking Research and Applications","location":"Stuttgart Germany","acronym":"ETRA '20","sponsor":["SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["ACM Symposium on Eye Tracking Research and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3379156.3391364","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3379156.3391364","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:32:54Z","timestamp":1750199574000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3379156.3391364"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,2]]},"references-count":27,"alternative-id":["10.1145\/3379156.3391364","10.1145\/3379156"],"URL":"https:\/\/doi.org\/10.1145\/3379156.3391364","relation":{},"subject":[],"published":{"date-parts":[[2020,6,2]]},"assertion":[{"value":"2020-06-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}