{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:18:44Z","timestamp":1750220324627,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,14]],"date-time":"2021-12-14T00:00:00Z","timestamp":1639440000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,14]]},"DOI":"10.1145\/3486622.3493999","type":"proceedings-article","created":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T01:18:53Z","timestamp":1649899133000},"page":"647-652","source":"Crossref","is-referenced-by-count":1,"title":["Enhance while protecting: privacy preserving image filtering"],"prefix":"10.1145","author":[{"given":"Diego","family":"Arcelli","sequence":"first","affiliation":[{"name":"University of Perugia, Italy"}]},{"given":"Alina Elena","family":"Baia","sequence":"additional","affiliation":[{"name":"University of Perugia, Italy"}]},{"given":"Alfredo","family":"Milani","sequence":"additional","affiliation":[{"name":"University of Perugia, Italy"}]},{"given":"Valentina","family":"Poggioni","sequence":"additional","affiliation":[{"name":"University of Perugia, Italy"}]}],"member":"320","published-online":{"date-parts":[[2022,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Ho Bae Jaehee Jang Dahuin Jung Hyemi Jang Heonseok Ha Hyungyu Lee and Sungroh Yoon. 2018. Security and privacy issues in deep learning. arXiv preprint arXiv:1807.11655(2018).  Ho Bae Jaehee Jang Dahuin Jung Hyemi Jang Heonseok Ha Hyungyu Lee and Sungroh Yoon. 2018. Security and privacy issues in deep learning. arXiv preprint arXiv:1807.11655(2018)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-72699-7_35"},{"key":"e_1_3_2_1_3_1","unstructured":"Anand Bhattad Min\u00a0Jin Chong Kaizhao Liang Bo Li and David\u00a0A. Forsyth. 2019. Big but Imperceptible Adversarial Perturbations via Semantic Manipulation. CoRR abs\/1904.06347(2019).  Anand Bhattad Min\u00a0Jin Chong Kaizhao Liang Bo Li and David\u00a0A. Forsyth. 2019. Big but Imperceptible Adversarial Perturbations via Semantic Manipulation. CoRR abs\/1904.06347(2019)."},{"volume-title":"Towards Evaluating the Robustness of Neural Networks. IEEE Symp. on Security and Privacy(2017)","author":"Carlini Nicholas","key":"e_1_3_2_1_4_1","unstructured":"Nicholas Carlini and D. Wagner . 2017 . Towards Evaluating the Robustness of Neural Networks. IEEE Symp. on Security and Privacy(2017) , 39\u201357. Nicholas Carlini and D. Wagner. 2017. Towards Evaluating the Robustness of Neural Networks. IEEE Symp. on Security and Privacy(2017), 39\u201357."},{"key":"e_1_3_2_1_5_1","unstructured":"Ian\u00a0J. Goodfellow Jonathon Shlens and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. CoRR abs\/1412.6572(2015).  Ian\u00a0J. Goodfellow Jonathon Shlens and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. CoRR abs\/1412.6572(2015)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Jamie Hayes and George Danezis. 2018. Learning universal adversarial perturbations with generative models. In 2018 IEEE Security and Privacy WS. 43\u201349.  Jamie Hayes and George Danezis. 2018. Learning universal adversarial perturbations with generative models. In 2018 IEEE Security and Privacy WS. 43\u201349.","DOI":"10.1109\/SPW.2018.00015"},{"key":"e_1_3_2_1_7_1","unstructured":"Hossein Hosseini and Radha Poovendran. 2018. Semantic Adversarial Examples. CoRR abs\/1804.00499(2018). arxiv:1804.00499http:\/\/arxiv.org\/abs\/1804.00499  Hossein Hosseini and Radha Poovendran. 2018. Semantic Adversarial Examples. CoRR abs\/1804.00499(2018). arxiv:1804.00499http:\/\/arxiv.org\/abs\/1804.00499"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Manoj Kumar Mohammad Husain Naveen Upreti and Deepti Gupta. 2010. Genetic algorithm: Review and application. Available at SSRN 3529843(2010).  Manoj Kumar Mohammad Husain Naveen Upreti and Deepti Gupta. 2010. Genetic algorithm: Review and application. Available at SSRN 3529843(2010).","DOI":"10.2139\/ssrn.3529843"},{"key":"e_1_3_2_1_9_1","unstructured":"Cassidy Laidlaw and S. Feizi. 2019. Functional Adversarial Attacks. In NeurIPS.  Cassidy Laidlaw and S. Feizi. 2019. Functional Adversarial Attacks. In NeurIPS."},{"key":"e_1_3_2_1_10_1","first-page":"85","article-title":"SRIM Scheme","volume":"4","author":"Li F.","year":"2018","unstructured":"F. Li , Zhelei Sun , Ben Niu , Y. Guo , and Ziwen Liu . 2018 . SRIM Scheme : An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users. Engineering 4 (2018), 85 \u2013 93 . F. Li, Zhelei Sun, Ben Niu, Y. Guo, and Ziwen Liu. 2018. SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users. Engineering 4(2018), 85\u201393.","journal-title":"An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users. Engineering"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647189"},{"key":"e_1_3_2_1_12_1","volume-title":"Delving into transferable adversarial examples and black-box attacks. arXiv:1611.02770","author":"Liu Yanpei","year":"2016","unstructured":"Yanpei Liu , Xinyun Chen , Chang Liu , and Dawn Song . 2016. Delving into transferable adversarial examples and black-box attacks. arXiv:1611.02770 ( 2016 ). Yanpei Liu, Xinyun Chen, Chang Liu, and Dawn Song. 2016. Delving into transferable adversarial examples and black-box attacks. arXiv:1611.02770 (2016)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/1897438"},{"key":"e_1_3_2_1_14_1","unstructured":"Fatemehsadat Mireshghallah Mohammadkazem Taram Praneeth Vepakomma Abhishek Singh Ramesh Raskar and Hadi Esmaeilzadeh. 2020. Privacy in deep learning: A survey. arXiv preprint arXiv:2004.12254(2020).  Fatemehsadat Mireshghallah Mohammadkazem Taram Praneeth Vepakomma Abhishek Singh Ramesh Raskar and Hadi Esmaeilzadeh. 2020. Privacy in deep learning: A survey. arXiv preprint arXiv:2004.12254(2020)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2214050"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2012.2227726"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Seyed-Mohsen Moosavi-Dezfooli Alhussein Fawzi Omar Fawzi and P. Frossard. 2017. Universal Adversarial Perturbations. IEEE CVPR (2017) 86\u201394.  Seyed-Mohsen Moosavi-Dezfooli Alhussein Fawzi Omar Fawzi and P. Frossard. 2017. Universal Adversarial Perturbations. IEEE CVPR (2017) 86\u201394.","DOI":"10.1109\/CVPR.2017.17"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Seyed-Mohsen Moosavi-Dezfooli Alhussein Fawzi and P. Frossard. 2016. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks. IEEE CVPR (2016) 2574\u20132582.  Seyed-Mohsen Moosavi-Dezfooli Alhussein Fawzi and P. Frossard. 2016. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks. IEEE CVPR (2016) 2574\u20132582.","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_1_19_1","volume-title":"Generalizable data-free objective for crafting universal adversarial perturbations","author":"Mopuri Konda\u00a0Reddy","year":"2018","unstructured":"Konda\u00a0Reddy Mopuri , Aditya Ganeshan , and R\u00a0Venkatesh Babu . 2018. Generalizable data-free objective for crafting universal adversarial perturbations . IEEE transactions on pattern analysis and machine intelligence 41, 10( 2018 ), 2452\u20132465. Konda\u00a0Reddy Mopuri, Aditya Ganeshan, and R\u00a0Venkatesh Babu. 2018. Generalizable data-free objective for crafting universal adversarial perturbations. IEEE transactions on pattern analysis and machine intelligence 41, 10(2018), 2452\u20132465."},{"key":"e_1_3_2_1_20_1","unstructured":"Tim Salimans Jonathan Ho Xi Chen Szymon Sidor and Ilya Sutskever. 2017. Evolution strategies as a scalable alternative to reinforcement learning. arXiv preprint arXiv:1703.03864(2017).  Tim Salimans Jonathan Ho Xi Chen Szymon Sidor and Ilya Sutskever. 2017. Evolution strategies as a scalable alternative to reinforcement learning. arXiv preprint arXiv:1703.03864(2017)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.2987694"},{"volume-title":"ColorFool: Semantic Adversarial Colorization. In Proc of CVPR 2020([n. d.]).","author":"Shahin\u00a0Shamsabadi Ali","key":"e_1_3_2_1_22_1","unstructured":"Ali Shahin\u00a0Shamsabadi , Ricardo Sanchez-Matilla , and Andrea Cavallaro . [n.d.]. ColorFool: Semantic Adversarial Colorization. In Proc of CVPR 2020([n. d.]). Ali Shahin\u00a0Shamsabadi, Ricardo Sanchez-Matilla, and Andrea Cavallaro. [n.d.]. ColorFool: Semantic Adversarial Colorization. In Proc of CVPR 2020([n. d.])."},{"volume-title":"Proc of ICASSP 2020([n. d.]).","author":"Shamsabadi Ali\u00a0Shahin","key":"e_1_3_2_1_23_1","unstructured":"Ali\u00a0Shahin Shamsabadi , Changjae Oh , and Andrea Cavallaro . [n.d.]. Edgefool : an Adversarial Image Enhancement Filter . In Proc of ICASSP 2020([n. d.]). Ali\u00a0Shahin Shamsabadi, Changjae Oh, and Andrea Cavallaro. [n.d.]. Edgefool: an Adversarial Image Enhancement Filter. In Proc of ICASSP 2020([n. d.])."},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 22nd ACM SIGSAC 2015. 1310\u20131321","author":"Shokri Reza","year":"2015","unstructured":"Reza Shokri and Vitaly Shmatikov . 2015 . Privacy-preserving deep learning . In Proceedings of the 22nd ACM SIGSAC 2015. 1310\u20131321 . Reza Shokri and Vitaly Shmatikov. 2015. Privacy-preserving deep learning. In Proceedings of the 22nd ACM SIGSAC 2015. 1310\u20131321."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2539165"},{"key":"e_1_3_2_1_26_1","unstructured":"Christian Szegedy W. Zaremba Ilya Sutskever Joan Bruna D. Erhan Ian\u00a0J. Goodfellow and R. Fergus. 2014. Intriguing properties of neural networks. CoRR abs\/1312.6199(2014).  Christian Szegedy W. Zaremba Ilya Sutskever Joan Bruna D. Erhan Ian\u00a0J. Goodfellow and R. Fergus. 2014. Intriguing properties of neural networks. CoRR abs\/1312.6199(2014)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2831899"},{"key":"e_1_3_2_1_28_1","volume-title":"Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity. arXiv preprint arXiv:2107.01396(2021).","author":"Wang Yajie","year":"2021","unstructured":"Yajie Wang , Shangbo Wu , Wenyi Jiang , Shengang Hao , Yu-an Tan, and Quanxin Zhang . 2021 . Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity. arXiv preprint arXiv:2107.01396(2021). Yajie Wang, Shangbo Wu, Wenyi Jiang, Shengang Hao, Yu-an Tan, and Quanxin Zhang. 2021. Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity. arXiv preprint arXiv:2107.01396(2021)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1080\/02564602.2016.1151385"},{"volume-title":"USENIX Security Symposium.","author":"Xu Yi","key":"e_1_3_2_1_30_1","unstructured":"Yi Xu , T. Price , Jan-Michael Frahm , and F. Monrose . 2016. Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos . In USENIX Security Symposium. Yi Xu, T. Price, Jan-Michael Frahm, and F. Monrose. 2016. Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos. In USENIX Security Symposium."},{"key":"e_1_3_2_1_31_1","unstructured":"M. Xue S. Sun Z. Wu C.H. J. Wang and W. Liu. 2020. SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images. ArXiv abs\/2011.13560(2020).  M. Xue S. Sun Z. Wu C.H. J. Wang and W. Liu. 2020. SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images. ArXiv abs\/2011.13560(2020)."},{"key":"e_1_3_2_1_32_1","unstructured":"Zhengyu Zhao Zhuoran Liu and M. Larson. 2020. Adversarial Color Enhancement: Generating Unrestricted Adversarial Images by Optimizing a Color Filter.In Proc. of BMVC (2020).  Zhengyu Zhao Zhuoran Liu and M. Larson. 2020. Adversarial Color Enhancement: Generating Unrestricted Adversarial Images by Optimizing a Color Filter.In Proc. of BMVC (2020)."}],"event":{"name":"WI-IAT '21: IEEE\/WIC\/ACM International Conference on Web Intelligence","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence"],"location":"ESSENDON VIC Australia","acronym":"WI-IAT '21"},"container-title":["IEEE\/WIC\/ACM International Conference on Web Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3486622.3493999","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3486622.3493999","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:05Z","timestamp":1750191125000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3486622.3493999"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,14]]},"references-count":32,"alternative-id":["10.1145\/3486622.3493999","10.1145\/3486622"],"URL":"https:\/\/doi.org\/10.1145\/3486622.3493999","relation":{},"subject":[],"published":{"date-parts":[[2021,12,14]]}}}