{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:15:57Z","timestamp":1750220157712,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T00:00:00Z","timestamp":1665360000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["LY22F020028"],"award-info":[{"award-number":["LY22F020028"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21B2040, 61806063, 62125201, 62020106007, 61836002, 62072147"],"award-info":[{"award-number":["U21B2040, 61806063, 62125201, 62020106007, 61836002, 62072147"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National key R&D Program of China","award":["2020YFB1406705"],"award-info":[{"award-number":["2020YFB1406705"]}]},{"name":"Alibaba Group through Alibaba Research Fellow (ARF) Program"},{"name":"Natural Science Foundation of Zhejiang ProvinceNatural Science Foundation of Zhejiang Province for Distinguished Young Scholars","award":["LR22F020001"],"award-info":[{"award-number":["LR22F020001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,10]]},"DOI":"10.1145\/3503161.3548235","type":"proceedings-article","created":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T15:42:35Z","timestamp":1665416555000},"page":"2314-2323","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Delegate-based Utility Preserving Synthesis for Pedestrian Image Anonymization"],"prefix":"10.1145","author":[{"given":"Zhenzhong","family":"Kuang","sequence":"first","affiliation":[{"name":"Hangzhou Dianzi University, Hangzhou, China"}]},{"given":"Longbin","family":"Teng","sequence":"additional","affiliation":[{"name":"Hangzhou Dianzi University, Hangzhou, China"}]},{"given":"Zhou","family":"Yu","sequence":"additional","affiliation":[{"name":"Hangzhou Dianzi University, Hangzhou, China"}]},{"given":"Jun","family":"Yu","sequence":"additional","affiliation":[{"name":"Hangzhou Dianzi University, Hangzhou, China"}]},{"given":"Jianping","family":"Fan","sequence":"additional","affiliation":[{"name":"AI Lab at Lenovo Research &amp; Hangzhou Dianzi University, Beijing &amp; Hangzhou, China"}]},{"given":"Mingliang","family":"Xu","sequence":"additional","affiliation":[{"name":"Zhengzhou University, Zhengzhou , China"}]}],"member":"320","published-online":{"date-parts":[[2022,10,10]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2011.2105551"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.471"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/2870614.2870620"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1399504.1360638"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.173"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00332"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2929257"},{"key":"e_1_3_2_2_8_1","first-page":"1753","article-title":"Deep fakes: A looming challenge for privacy, democracy, and national security","volume":"107","author":"Chesney Bobby","year":"2019","unstructured":"Bobby Chesney and Danielle Citron . 2019 . Deep fakes: A looming challenge for privacy, democracy, and national security . California Law Review , Vol. 107 (2019), 1753 . Bobby Chesney and Danielle Citron. 2019. Deep fakes: A looming challenge for privacy, democracy, and national security. California Law Review, Vol. 107 (2019), 1753.","journal-title":"California Law Review"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-021-01091-9"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412340"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2019.01.027"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791834.1791836"},{"key":"e_1_3_2_2_13_1","first-page":"3","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork , Aaron Roth , 2014 . The algorithmic foundations of differential privacy . Foundations and Trends in Theoretical Computer Science , Vol. 9 , 3 -- 4 (2014), 211--407. Cynthia Dwork, Aaron Roth, et al. 2014. The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science, Vol. 9, 3--4 (2014), 211--407.","journal-title":"Foundations and Trends in Theoretical Computer Science"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95729-6_10"},{"key":"e_1_3_2_2_15_1","volume-title":"Proceedings of the International Workshop on Privacy Enhancing Technologies. 227--242","author":"Gross Ralph","year":"2005","unstructured":"Ralph Gross , Edoardo Airoldi , Bradley Malin , and Latanya Sweeney . 2005 . Integrating utility into face de-identification . In Proceedings of the International Workshop on Privacy Enhancing Technologies. 227--242 . Ralph Gross, Edoardo Airoldi, Bradley Malin, and Latanya Sweeney. 2005. Integrating utility into face de-identification. In Proceedings of the International Workshop on Privacy Enhancing Technologies. 227--242."},{"key":"e_1_3_2_2_16_1","volume-title":"Mask R-CNN. In Proceedings of the IEEE International Conference on Computer Vision. 2961--2969","author":"He Kaiming","year":"2017","unstructured":"Kaiming He , Georgia Gkioxari , Piotr Doll\u00e1r , and Ross Girshick . 2017 . Mask R-CNN. In Proceedings of the IEEE International Conference on Computer Vision. 2961--2969 . Kaiming He, Georgia Gkioxari, Piotr Doll\u00e1r, and Ross Girshick. 2017. Mask R-CNN. In Proceedings of the IEEE International Conference on Computer Vision. 2961--2969."},{"key":"e_1_3_2_2_17_1","first-page":"1","article-title":"GANs trained by a two time-scale update rule converge to a local nash equilibrium","volume":"30","author":"Heusel Martin","year":"2017","unstructured":"Martin Heusel , Hubert Ramsauer , Thomas Unterthiner , Bernhard Nessler , and Sepp Hochreiter . 2017 . GANs trained by a two time-scale update rule converge to a local nash equilibrium . In Proceedings of the Advances in Neural Information Processing Systems , Vol. 30. 1 -- 12 . Martin Heusel, Hubert Ramsauer, Thomas Unterthiner, Bernhard Nessler, and Sepp Hochreiter. 2017. GANs trained by a two time-scale update rule converge to a local nash equilibrium. In Proceedings of the Advances in Neural Information Processing Systems, Vol. 30. 1--12.","journal-title":"Proceedings of the Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_18_1","volume-title":"International Conference on Learning Representations.","author":"Jordon James","year":"2018","unstructured":"James Jordon , Jinsung Yoon , and Mihaela Van Der Schaar . 2018 . PATE-GAN: Generating synthetic data with differential privacy guarantees . In International Conference on Learning Representations. James Jordon, Jinsung Yoon, and Mihaela Van Der Schaar. 2018. PATE-GAN: Generating synthetic data with differential privacy guarantees. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2013.6636641"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475464"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3040881"},{"key":"e_1_3_2_2_23_1","volume-title":"Differentially private imaging via latent space manipulation. arXiv preprint arXiv:2103.05472","author":"Li Tao","year":"2021","unstructured":"Tao Li and Chris Clifton . 2021. Differentially private imaging via latent space manipulation. arXiv preprint arXiv:2103.05472 ( 2021 ). Tao Li and Chris Clifton. 2021. Differentially private imaging via latent space manipulation. arXiv preprint arXiv:2103.05472 (2021)."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.176"},{"key":"e_1_3_2_2_25_1","volume-title":"DP-Image: Differential Privacy for Image Data in Feature Space. arXiv preprint arXiv:2103.07073","author":"Liu Bo","year":"2021","unstructured":"Bo Liu , Ming Ding , Hanyu Xue , Tianqing Zhu , Dayong Ye , Li Song , and Wanlei Zhou . 2021. DP-Image: Differential Privacy for Image Data in Feature Space. arXiv preprint arXiv:2103.07073 ( 2021 ). Bo Liu, Ming Ding, Hanyu Xue, Tianqing Zhu, Dayong Ye, Li Song, and Wanlei Zhou. 2021. DP-Image: Differential Privacy for Image Data in Feature Space. arXiv preprint arXiv:2103.07073 (2021)."},{"key":"e_1_3_2_2_26_1","volume-title":"Privacy Intelligence: A Survey on Image Sharing on Online Social Networks. arXiv preprint arXiv:2008.12199","author":"Liu Chi","year":"2020","unstructured":"Chi Liu , Tianqing Zhu , Jun Zhang , and Wanlei Zhou . 2020 . Privacy Intelligence: A Survey on Image Sharing on Online Social Networks. arXiv preprint arXiv:2008.12199 (2020). Chi Liu, Tianqing Zhu, Jun Zhang, and Wanlei Zhou. 2020. Privacy Intelligence: A Survey on Image Sharing on Online Social Networks. arXiv preprint arXiv:2008.12199 (2020)."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2019.2958756"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01341"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00549"},{"key":"e_1_3_2_2_30_1","volume-title":"Defeating image obfuscation with deep learning. arXiv preprint arXiv:1609.00408","author":"McPherson Richard","year":"2016","unstructured":"Richard McPherson , Reza Shokri , and Vitaly Shmatikov . 2016. Defeating image obfuscation with deep learning. arXiv preprint arXiv:1609.00408 ( 2016 ). Richard McPherson, Reza Shokri, and Vitaly Shmatikov. 2016. Defeating image obfuscation with deep learning. arXiv preprint arXiv:1609.00408 (2016)."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.66"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.32"},{"key":"e_1_3_2_2_34_1","volume-title":"Proceedings of the 21st International Conference on Pattern Recognition. 2889--2893","author":"Nodari Angelo","year":"2012","unstructured":"Angelo Nodari , Marco Vanetti , and Ignazio Gallo . 2012 . Digital privacy: Replacing pedestrians from google street view images . In Proceedings of the 21st International Conference on Pattern Recognition. 2889--2893 . Angelo Nodari, Marco Vanetti, and Ignazio Gallo. 2012. Digital privacy: Replacing pedestrians from google street view images. In Proceedings of the 21st International Conference on Pattern Recognition. 2889--2893."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46487-9_2"},{"key":"e_1_3_2_2_36_1","volume-title":"Proceedings of the IEEE Conference on Advanced Video and Signal Based Surveillance. 171--176","author":"Park Sangho","year":"2005","unstructured":"Sangho Park and Mohan M Trivedi . 2005 . A track-based human movement analysis and privacy protection system adaptive to environmental contexts . In Proceedings of the IEEE Conference on Advanced Video and Signal Based Surveillance. 171--176 . Sangho Park and Mohan M Trivedi. 2005. A track-based human movement analysis and privacy protection system adaptive to environmental contexts. In Proceedings of the IEEE Conference on Advanced Video and Signal Based Surveillance. 171--176."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2016.05.020"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48881-3_2"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2320729"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00530"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58595-2_43"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01083"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00016"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/718"},{"key":"e_1_3_2_2_46_1","volume-title":"IdentityDP: Differential Private Identification Protection for Face Images. arXiv preprint arXiv:2103.01745","author":"Wen Yunqian","year":"2021","unstructured":"Yunqian Wen , Li Song , Bo Liu , Ming Ding , and Rong Xie . 2021. IdentityDP: Differential Private Identification Protection for Face Images. arXiv preprint arXiv:2103.01745 ( 2021 ). Yunqian Wen, Li Song, Bo Liu, Ming Ding, and Rong Xie. 2021. IdentityDP: Differential Private Identification Protection for Face Images. arXiv preprint arXiv:2103.01745 (2021)."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00789"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00716"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/2919332.2919877"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00224"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159171"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375627.3375849"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00245"}],"event":{"name":"MM '22: The 30th ACM International Conference on Multimedia","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Lisboa Portugal","acronym":"MM '22"},"container-title":["Proceedings of the 30th ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503161.3548235","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503161.3548235","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:20Z","timestamp":1750186820000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503161.3548235"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,10]]},"references-count":53,"alternative-id":["10.1145\/3503161.3548235","10.1145\/3503161"],"URL":"https:\/\/doi.org\/10.1145\/3503161.3548235","relation":{},"subject":[],"published":{"date-parts":[[2022,10,10]]},"assertion":[{"value":"2022-10-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}