{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:00:30Z","timestamp":1776106830564,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T00:00:00Z","timestamp":1649894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2129164,2114982,2031002,2120369,2120369"],"award-info":[{"award-number":["2129164,2114982,2031002,2120369,2120369"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,14]]},"DOI":"10.1145\/3508398.3511517","type":"proceedings-article","created":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T04:13:31Z","timestamp":1650082411000},"page":"65-76","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Towards Automated Content-based Photo Privacy Control in User-Centered Social Networks"],"prefix":"10.1145","author":[{"given":"Nishant","family":"Vishwamitra","sequence":"first","affiliation":[{"name":"University at Buffalo, Buffalo, NY, USA"}]},{"given":"Yifang","family":"Li","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"given":"Hongxin","family":"Hu","sequence":"additional","affiliation":[{"name":"University at Buffalo, Buffalo, NY, USA"}]},{"given":"Kelly","family":"Caine","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"given":"Long","family":"Cheng","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"given":"Ziming","family":"Zhao","sequence":"additional","affiliation":[{"name":"University at Buffalo, Buffalo, NY, USA"}]},{"given":"Gail-Joon","family":"Ahn","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,4,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2011. Teacher sacked for posting picture of herself holding glass of wine and mug of beer on Facebook . https:\/\/www.dailymail.co.uk\/news\/article-1354515\/Teacher-sacked-posting-picture-holding-glass-wine-mug-beer-Facebook.html. 2011. Teacher sacked for posting picture of herself holding glass of wine and mug of beer on Facebook . https:\/\/www.dailymail.co.uk\/news\/article-1354515\/Teacher-sacked-posting-picture-holding-glass-wine-mug-beer-Facebook.html."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"2016. Social Media Update 2016 - Pew Research Center . https:\/\/www.pewresearch.org\/internet\/2016\/11\/11\/social-media-update-2016\/. 2016. Social Media Update 2016 - Pew Research Center . https:\/\/www.pewresearch.org\/internet\/2016\/11\/11\/social-media-update-2016\/.","DOI":"10.12968\/sece.2016.25.11"},{"key":"e_1_3_2_1_3_1","unstructured":"2017. Bathroom Selfie Phenomenon . https:\/\/www.theguardian.com\/media\/shortcuts\/2017\/ jan\/24\/finished-in-there-yet-how-bathroom-selfie-became-huge. 2017. Bathroom Selfie Phenomenon . https:\/\/www.theguardian.com\/media\/shortcuts\/2017\/ jan\/24\/finished-in-there-yet-how-bathroom-selfie-became-huge."},{"key":"e_1_3_2_1_4_1","unstructured":"2020 a. Face Plus Plus . http:\/\/www.faceplusplus.com . 2020 a. Face Plus Plus . http:\/\/www.faceplusplus.com ."},{"key":"e_1_3_2_1_5_1","unstructured":"2020 b. Facebook . https:\/\/www.facebook.com . 2020 b. Facebook . https:\/\/www.facebook.com ."},{"key":"e_1_3_2_1_6_1","unstructured":"2020. Instagram . https:\/\/www.instagram.com\/. 2020. Instagram . https:\/\/www.instagram.com\/."},{"key":"e_1_3_2_1_7_1","unstructured":"2020. YOLO . https:\/\/pjreddie.com\/darknet\/yolo\/. 2020. YOLO . https:\/\/pjreddie.com\/darknet\/yolo\/."},{"key":"e_1_3_2_1_8_1","volume-title":"Technostress: technological antecedents and implications. MIS quarterly","author":"Ayyagari Ramakrishna","year":"2011","unstructured":"Ramakrishna Ayyagari , Varun Grover , and Russell Purvis . 2011. Technostress: technological antecedents and implications. MIS quarterly , Vol. 35 , 4 ( 2011 ), 831--858. Ramakrishna Ayyagari, Varun Grover, and Russell Purvis. 2011. Technostress: technological antecedents and implications. MIS quarterly , Vol. 35, 4 (2011), 831--858."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753560"},{"key":"e_1_3_2_1_10_1","volume-title":"Retrieved April","volume":"13","author":"Official Blog YouTube","year":"2012","unstructured":"YouTube Official Blog . 2012 . Face blurring: when footage requires anonymity. Blog.(18 July 2012) . Retrieved April , Vol. 13 (2012), 2017. YouTube Official Blog. 2012. Face blurring: when footage requires anonymity. Blog.(18 July 2012). Retrieved April , Vol. 13 (2012), 2017."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078847"},{"key":"e_1_3_2_1_12_1","volume-title":"Exploring everyday privacy behaviors and misclosures . Ph.,D. Dissertation","author":"Caine Kelly Erinn","unstructured":"Kelly Erinn Caine . 2009a. Exploring everyday privacy behaviors and misclosures . Ph.,D. Dissertation . Georgia Institute of Technology . Kelly Erinn Caine. 2009a. Exploring everyday privacy behaviors and misclosures . Ph.,D. Dissertation. Georgia Institute of Technology."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1520340.1520448"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143865"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2181176.2181182"},{"key":"e_1_3_2_1_16_1","volume-title":"Photo and video sharing grow online. Pew Research Internet Project","author":"Duggan Maeve","year":"2013","unstructured":"Maeve Duggan . 2013. Photo and video sharing grow online. Pew Research Internet Project ( 2013 ). Maeve Duggan. 2013. Photo and video sharing grow online. Pew Research Internet Project (2013)."},{"key":"e_1_3_2_1_17_1","volume-title":"An introduction to ROC analysis. Pattern recognition letters","author":"Fawcett Tom","year":"2006","unstructured":"Tom Fawcett . 2006. An introduction to ROC analysis. Pattern recognition letters , Vol. 27 , 8 ( 2006 ), 861--874. Tom Fawcett. 2006. An introduction to ROC analysis. Pattern recognition letters , Vol. 27, 8 (2006), 861--874."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2009.5459413"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243792"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173621"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.175"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.40"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Geoffrey E Hinton. 1999. Products of experts. (1999). Geoffrey E Hinton. 1999. Products of experts. (1999).","DOI":"10.1049\/cp:19991075"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632079"},{"key":"e_1_3_2_1_25_1","volume-title":"Paired t test","author":"Hsu Henry","year":"2014","unstructured":"Henry Hsu and Peter A Lachenbruch . 2014. Paired t test . Wiley StatsRef : Statistics Reference Online ( 2014 ). Henry Hsu and Peter A Lachenbruch. 2014. Paired t test. Wiley StatsRef: Statistics Reference Online (2014)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.97"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813603"},{"key":"e_1_3_2_1_28_1","volume-title":"On loss functions for deep neural networks in classification. arXiv preprint arXiv:1702.05659","author":"Janocha Katarzyna","year":"2017","unstructured":"Katarzyna Janocha and Wojciech Marian Czarnecki . 2017. On loss functions for deep neural networks in classification. arXiv preprint arXiv:1702.05659 ( 2017 ). Katarzyna Janocha and Wojciech Marian Czarnecki. 2017. On loss functions for deep neural networks in classification. arXiv preprint arXiv:1702.05659 (2017)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858451"},{"key":"e_1_3_2_1_30_1","volume-title":"Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114","author":"Kingma Diederik P","year":"2013","unstructured":"Diederik P Kingma and Max Welling . 2013. Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114 ( 2013 ). Diederik P Kingma and Max Welling. 2013. Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114 (2013)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1097\/00006199-199003000-00019"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592665.1592668"},{"key":"e_1_3_2_1_33_1","volume-title":"Effectiveness and users' experience of obfuscation as a privacy-enhancing technology for sharing photos. Manuscript submitted for publication","author":"Li Yifang","year":"2017","unstructured":"Yifang Li , Nishant Vishwamitra , Bart P Knijnenburg , Hongxin Hu , and Kelly Caine . 2017. Effectiveness and users' experience of obfuscation as a privacy-enhancing technology for sharing photos. Manuscript submitted for publication , Vol. 4 ( 2017 ). Yifang Li, Nishant Vishwamitra, Bart P Knijnenburg, Hongxin Hu, and Kelly Caine. 2017. Effectiveness and users' experience of obfuscation as a privacy-enhancing technology for sharing photos. Manuscript submitted for publication , Vol. 4 (2017)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/2206206"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240682"},{"key":"e_1_3_2_1_37_1","volume-title":"PyTorch: An Imperative Style","author":"Paszke Adam","unstructured":"Adam Paszke , Sam Gross , Francisco Massa , Adam Lerer , James Bradbury , Gregory Chanan , Trevor Killeen , Zeming Lin , Natalia Gimelshein , Luca Antiga , Alban Desmaison , Andreas Kopf , Edward Yang , Zachary DeVito , Martin Raison , Alykhan Tejani , Sasank Chilamkurthy , Benoit Steiner , Lu Fang , Junjie Bai , and Soumith Chintala . 2019. PyTorch: An Imperative Style , High-Performance Deep Learning Library . In Advances in Neural Information Processing Systems 32, H. Wallach, H. Larochelle, A. Beygelzimer, F. dtextquotesingle Alch\u00e9-Buc, E. Fox, and R. Garnett (Eds.). Curran Associates, Inc., 8024--8035. http:\/\/papers.neurips.cc\/paper\/9015-pytorch-an-imperative-style-high-performance-deep-learning-library.pdf Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, Alban Desmaison, Andreas Kopf, Edward Yang, Zachary DeVito, Martin Raison, Alykhan Tejani, Sasank Chilamkurthy, Benoit Steiner, Lu Fang, Junjie Bai, and Soumith Chintala. 2019. PyTorch: An Imperative Style, High-Performance Deep Learning Library. In Advances in Neural Information Processing Systems 32, H. Wallach, H. Larochelle, A. Beygelzimer, F. dtextquotesingle Alch\u00e9-Buc, E. Fox, and R. Garnett (Eds.). Curran Associates, Inc., 8024--8035. http:\/\/papers.neurips.cc\/paper\/9015-pytorch-an-imperative-style-high-performance-deep-learning-library.pdf"},{"key":"e_1_3_2_1_38_1","volume-title":"Searching for activation functions. arXiv preprint arXiv:1710.05941","author":"Ramachandran Prajit","year":"2017","unstructured":"Prajit Ramachandran , Barret Zoph , and Quoc V Le. 2017. Searching for activation functions. arXiv preprint arXiv:1710.05941 ( 2017 ). Prajit Ramachandran, Barret Zoph, and Quoc V Le. 2017. Searching for activation functions. arXiv preprint arXiv:1710.05941 (2017)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526780"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1995966.1996000"},{"key":"e_1_3_2_1_42_1","first-page":"295","article-title":"Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption","volume":"2019","author":"Tajik Kimia","year":"2019","unstructured":"Kimia Tajik , Akshith Gunasekaran , Rhea Dutta , Brandon Ellis , Rakesh B Bobba , Mike Rosulek , Charles V Wright , and Wu-chi Feng. 2019 . Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption . IACR Cryptology ePrint Archive , Vol. 2019 (2019), 295 . Kimia Tajik, Akshith Gunasekaran, Rhea Dutta, Brandon Ellis, Rakesh B Bobba, Mike Rosulek, Charles V Wright, and Wu-chi Feng. 2019. Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption. IACR Cryptology ePrint Archive , Vol. 2019 (2019), 295.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1097\/00006199-199907000-00006"},{"key":"e_1_3_2_1_44_1","unstructured":"Mike Wu and Noah Goodman. 2018. Multimodal generative models for scalable weakly-supervised learning. In Advances in Neural Information Processing Systems. 5575--5585. Mike Wu and Noah Goodman. 2018. Multimodal generative models for scalable weakly-supervised learning. In Advances in Neural Information Processing Systems. 5575--5585."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2636090"},{"key":"e_1_3_2_1_46_1","volume-title":"JH Stefan Siersdorfer, and E Demidova","author":"Zerr S","year":"2012","unstructured":"S Zerr , JH Stefan Siersdorfer, and E Demidova . 2012 . Picalert ! data set. S Zerr, JH Stefan Siersdorfer, and E Demidova. 2012. Picalert! data set."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.319"}],"event":{"name":"CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy","location":"Baltimore MD USA","acronym":"CODASPY '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511517","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508398.3511517","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508398.3511517","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:39Z","timestamp":1750188639000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511517"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,14]]},"references-count":47,"alternative-id":["10.1145\/3508398.3511517","10.1145\/3508398"],"URL":"https:\/\/doi.org\/10.1145\/3508398.3511517","relation":{},"subject":[],"published":{"date-parts":[[2022,4,14]]},"assertion":[{"value":"2022-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}