{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T03:39:07Z","timestamp":1771299547230,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,22]],"date-time":"2021-12-22T00:00:00Z","timestamp":1640131200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Yunnan Innovation Team of Education Informatization for Nationalities, and Yunnan ExpertWorkstation of Xiaochun Cao"},{"name":"postgraduate scientific research innovation project of Yunnan Normal University","award":["No.YJSJJ21-B72"],"award-info":[{"award-number":["No.YJSJJ21-B72"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,22]]},"DOI":"10.1145\/3512576.3512609","type":"proceedings-article","created":{"date-parts":[[2022,4,11]],"date-time":"2022-04-11T16:22:04Z","timestamp":1649694124000},"page":"185-188","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Face Privacy Protection Based on Attribute Manipulation"],"prefix":"10.1145","author":[{"given":"Jing","family":"Wang","sequence":"first","affiliation":[{"name":"Key Laboratory of Education Informatization for Nationalities,Ministry of Education;Yunnan Key Laboratory of Smart Education, Yunnan Normal University, China"}]},{"given":"Jun","family":"Wang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Education Informatization for Nationalities,Ministry of Education;Yunnan Key Laboratory of Smart Education, Yunnan Normal University, China"}]},{"given":"Jianhou","family":"Gan","sequence":"additional","affiliation":[{"name":"Key Laboratory of Education Informatization for Nationalities,Ministry of Education;Yunnan Key Laboratory of Smart Education, Yunnan Normal University, China"}]},{"given":"Juxiang","family":"Zhou","sequence":"additional","affiliation":[{"name":"Key Laboratory of Education Informatization for Nationalities,Ministry of Education;Yunnan Key Laboratory of Smart Education, Yunnan Normal University, China"}]}],"member":"320","published-online":{"date-parts":[[2022,4,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.68"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRIA.2019.8786004"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190716"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICB2018.2018.00023"},{"key":"e_1_3_2_1_5_1","volume-title":"Unified generative adversarial networks for multi-domain image-to-image translation.\" Proceedings of the IEEE conference on computer vision and pattern recognition","year":"2018","unstructured":"Choi, Yunjey, \"Stargan : Unified generative adversarial networks for multi-domain image-to-image translation.\" Proceedings of the IEEE conference on computer vision and pattern recognition . 2018 . Choi, Yunjey, \"Stargan: Unified generative adversarial networks for multi-domain image-to-image translation.\" Proceedings of the IEEE conference on computer vision and pattern recognition. 2018."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272743"},{"key":"e_1_3_2_1_7_1","first-page":"696","volume-title":"InEuropean Conference on Computer Vision Workshop","author":"Othman A.","unstructured":"A. Othman and A. Ross . Privacy of facial soft biometrics: Suppressing gender but retaining identity . InEuropean Conference on Computer Vision Workshop , pages 682\u2013 696 .Springer, 2014. A. Othman and A. Ross. Privacy of facial soft biometrics: Suppressing gender but retaining identity. InEuropean Conference on Computer Vision Workshop, pages 682\u2013696.Springer, 2014."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2015.7139096"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.32"},{"key":"e_1_3_2_1_10_1","first-page":"696","volume-title":"InEuropean Conference on Computer Vision Workshop","author":"Othman A.","unstructured":"A. Othman and A. Ross . Privacy of facial soft biometrics: Suppressing gender but retaining identity . InEuropean Conference on Computer Vision Workshop , pages 682\u2013 696 .Springer, 2014. A. Othman and A. Ross. Privacy of facial soft biometrics: Suppressing gender but retaining identity. InEuropean Conference on Computer Vision Workshop, pages 682\u2013696.Springer, 2014."},{"key":"e_1_3_2_1_11_1","first-page":"8","volume-title":"In11th IEEE International Conference on Automatic Face and Gesture Recognition (FG)","volume":"4","author":"Sim T.","year":"2015","unstructured":"T. Sim and L. Zhang . Controllable face privacy . In11th IEEE International Conference on Automatic Face and Gesture Recognition (FG) , volume 4 , pages 1\u2013 8 , 2015 . T. Sim and L. Zhang. Controllable face privacy. In11th IEEE International Conference on Automatic Face and Gesture Recognition (FG), volume 4, pages 1\u20138, 2015."},{"key":"e_1_3_2_1_12_1","volume-title":"Generative adversarial nets[J]. Advances in neural information processing systems","author":"Goodfellow","year":"2014","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M , Generative adversarial nets[J]. Advances in neural information processing systems , 2014 , 27. Goodfellow I, Pouget-Abadie J, Mirza M, Generative adversarial nets[J]. Advances in neural information processing systems, 2014, 27."},{"key":"e_1_3_2_1_13_1","volume-title":"Conditional generative adversarial nets[J]. arXiv preprint arXiv:1411.1784","author":"Mirza","year":"2014","unstructured":"Mirza M, Osindero S. Conditional generative adversarial nets[J]. arXiv preprint arXiv:1411.1784 , 2014 . Mirza M, Osindero S. Conditional generative adversarial nets[J]. arXiv preprint arXiv:1411.1784, 2014."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Zhu Jun-Yan \"Unpaired image-to-image translation using cycle-consistent adversarial networks.\" Proceedings of the IEEE international conference on computer vision. 2017.  Zhu Jun-Yan \"Unpaired image-to-image translation using cycle-consistent adversarial networks.\" Proceedings of the IEEE international conference on computer vision. 2017.","DOI":"10.1109\/ICCV.2017.244"},{"key":"e_1_3_2_1_15_1","volume-title":"V edaldi, and V . Lempitsky. Instance normalization: The missing ingredient for fast stylization.arXiv preprint arXiv:1607.08022","author":"Ulyanov D.","year":"2016","unstructured":"D. Ulyanov , A. V edaldi, and V . Lempitsky. Instance normalization: The missing ingredient for fast stylization.arXiv preprint arXiv:1607.08022 , 2016 .5 D. Ulyanov, A. V edaldi, and V . Lempitsky. Instance normalization: The missing ingredient for fast stylization.arXiv preprint arXiv:1607.08022, 2016.5"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"e_1_3_2_1_17_1","volume-title":"Conditional image synthesis with auxiliary classifier gans.arXiv preprint arXiv:1610.09585","author":"Odena A.","year":"2016","unstructured":"A. Odena , C. Olah , and J. Shlens . Conditional image synthesis with auxiliary classifier gans.arXiv preprint arXiv:1610.09585 , 2016 .3,5 A. Odena, C. Olah, and J. Shlens. Conditional image synthesis with auxiliary classifier gans.arXiv preprint arXiv:1610.09585, 2016.3,5"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"e_1_3_2_1_20_1","volume-title":"On the variance of the adaptive learning rate and beyond.arXiv preprint arXiv:1908.03265","author":"Liu Liyuan","year":"2019","unstructured":"Liyuan Liu , Haoming Jiang , Pengcheng He , Weizhu Chen , Xiaodong Liu , Jianfeng Gao , and Jiawei Han . On the variance of the adaptive learning rate and beyond.arXiv preprint arXiv:1908.03265 , 2019 Liyuan Liu, Haoming Jiang, Pengcheng He, Weizhu Chen,Xiaodong Liu, Jianfeng Gao, and Jiawei Han. On the variance of the adaptive learning rate and beyond.arXiv preprint arXiv:1908.03265, 2019"},{"key":"e_1_3_2_1_21_1","first-page":"9608","volume-title":"InAdvances in Neural Information Processing Systems","author":"Zhang Michael","year":"2019","unstructured":"Michael Zhang , James Lucas , Jimmy Ba , and Geoffrey E Hinton . Lookahead optimizer : k steps forward, 1 step back . InAdvances in Neural Information Processing Systems , pages 9597\u2013 9608 , 2019 . Michael Zhang, James Lucas, Jimmy Ba, and Geoffrey EHinton. Lookahead optimizer: k steps forward, 1 step back. InAdvances in Neural Information Processing Systems, pages 9597\u20139608, 2019."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"He Kaiming \"Deep residual learning for image recognition.\" Proceedings of the IEEE conference on computer vision and pattern recognition. 2016.  He Kaiming \"Deep residual learning for image recognition.\" Proceedings of the IEEE conference on computer vision and pattern recognition. 2016.","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00552"}],"event":{"name":"ICIT 2021: IoT and Smart City","location":"Guangzhou China","acronym":"ICIT 2021"},"container-title":["2021 The 9th International Conference on Information Technology: IoT and Smart City"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3512576.3512609","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3512576.3512609","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:11:51Z","timestamp":1750191111000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3512576.3512609"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,22]]},"references-count":23,"alternative-id":["10.1145\/3512576.3512609","10.1145\/3512576"],"URL":"https:\/\/doi.org\/10.1145\/3512576.3512609","relation":{},"subject":[],"published":{"date-parts":[[2021,12,22]]},"assertion":[{"value":"2022-04-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}