{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T15:59:57Z","timestamp":1765382397587,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T00:00:00Z","timestamp":1655683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,21]]},"DOI":"10.1145\/3531146.3534636","type":"proceedings-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T14:27:10Z","timestamp":1655735230000},"page":"2189-2205","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Seeing without Looking: Analysis Pipeline for Child Sexual Abuse Datasets"],"prefix":"10.1145","author":[{"given":"Camila","family":"Laranjeira da Silva","sequence":"first","affiliation":[{"name":"Department of Computer Science, Universidade Federal de Minas Gerais, Brazil"}]},{"given":"Joao","family":"Macedo","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Universidade Federal de Minas Gerais, Brazil"}]},{"given":"Sandra","family":"Avila","sequence":"additional","affiliation":[{"name":"Institute of Computing, Universidade Estadual de Campinas, Brazil"}]},{"given":"Jefersson","family":"dos Santos","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Universidade Federal de Minas Gerais, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2022,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Osman Aka Ken Burke Alex B\u00e4uerle Christina Greer and Margaret Mitchell. 2021. Measuring Model Biases in the Absence of Ground Truth. arXiv preprint arXiv:2103.03417(2021).","DOI":"10.1145\/3461702.3462557"},{"key":"e_1_3_2_1_2_1","unstructured":"Mhd\u00a0Wesam Al-Nabki Eduardo Fidalgo Roberto\u00a0A Vasco-Carofilis Francisco Janez-Martino and Javier Velasco-Mata. 2020. Evaluating performance of an adult pornography classifier for child sexual abuse detection. arXiv preprint arXiv:2005.08766(2020)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2020.300921"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00158"},{"key":"e_1_3_2_1_5_1","unstructured":"Alexey Bochkovskiy Chien-Yao Wang and Hong-Yuan\u00a0Mark Liao. 2020. Yolov4: Optimal speed and accuracy of object detection. arXiv preprint arXiv:2004.10934(2020)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Elie Bursztein Einat Clarke Michelle DeLaune David\u00a0M Elifff Nick Hsu Lindsey Olson John Shehan Madhukar Thakur Kurt Thomas and Travis Bright. 2019. Rethinking the detection of child sexual abuse imagery on the Internet. In The world wide web conference. 2601\u20132607.","DOI":"10.1145\/3308558.3313482"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2017.03.016"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/76.767122"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5220\/0008945907210729"},{"key":"e_1_3_2_1_10_1","unstructured":"Maria Leonina\u00a0Couto Cunha. 2021. Abuso sexual contra crian\u00e7as e adolescentes: Abordagem de casos concretos em uma perspectiva multidisciplinar e interinstitucional. Minist\u00e9rio da Mulher da Fam\u00edlia e dos Direitos Humanos. https:\/\/www.gov.br\/mdh\/pt-br\/assuntos\/noticias\/2021\/maio\/CartilhaMaioLaranja2021.pdf"},{"key":"e_1_3_2_1_11_1","volume-title":"Disque Direitos Humanos: Relat\u00f3rio","author":"Ouvidoria Nacional\u00a0dos Direitos\u00a0Humanos Equipe","year":"2019","unstructured":"Equipe da\u00a0Ouvidoria Nacional\u00a0dos Direitos\u00a0Humanos. 2019. Disque Direitos Humanos: Relat\u00f3rio 2019. Minist\u00e9rio da Mulher, da Fam\u00edlia e dos Direitos Humanos. https:\/\/crianca.mppr.mp.br\/arquivos\/File\/publi\/mmfdh\/disque_100_relatorio_mmfdh2019.pdf"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.05.004"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2010.74"},{"key":"e_1_3_2_1_14_1","unstructured":"Jean\u00a0Vitor de Paulo. 2018. PySkinDetection. https:\/\/github.com\/Jeanvit\/PySkinDetection."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2359646"},{"key":"e_1_3_2_1_16_1","unstructured":"United Nations\u00a0Children\u2019s Fund. 2020. Research on the Sexual Exploitation of Boys: Findings ethical considerations and methodological challenges. UNICEF. https:\/\/data.unicef.org\/resources\/sexual-exploitation-boys-findings-ethical-considerations-methodological-challenges"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1049\/ic.2017.0046"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.02.056"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458723"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chiabu.2021.105336"},{"volume-title":"Refining Child Pornography Law","author":"Hessick Carissa\u00a0Byrne","key":"e_1_3_2_1_21_1","unstructured":"Carissa\u00a0Byrne Hessick. 2016. Refining Child Pornography Law. University of Michigan Press."},{"key":"e_1_3_2_1_22_1","volume-title":"The dataset nutrition label. Data Protection and Privacy: Data Protection and Democracy 1","author":"Holland Sarah","year":"2020","unstructured":"Sarah Holland, Ahmed Hosny, and Sarah Newman. 2020. The dataset nutrition label. Data Protection and Privacy: Data Protection and Democracy 1 (2020)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00159"},{"key":"e_1_3_2_1_24_1","unstructured":"Sergey Kastryulin Dzhamil Zakirov and Denis Prokopenko. 2019. PyTorch Image Quality: Metrics and Measure for Image Quality Assessment. https:\/\/github.com\/photosynthesis-team\/piq Open-source software available at https:\/\/github.com\/photosynthesis-team\/piq."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59725-2_31"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1177\/1079063217724768"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-020-01316-z"},{"key":"e_1_3_2_1_28_1","unstructured":"Gant Laborde. [n. d.]. Deep NN for NSFW Detection. https:\/\/github.com\/GantMan\/nsfw_model"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIBGRAPI.2018.00065"},{"key":"e_1_3_2_1_31_1","volume-title":"Open sourcing a deep learning solution for detecting NSFW images. Retrieved August 24(2016)","author":"Mahadeokar Jay","year":"2018","unstructured":"Jay Mahadeokar and Gerry Pesavento. 2016. Open sourcing a deep learning solution for detecting NSFW images. Retrieved August 24(2016), 2018."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Donald Maxim Stephanie Orlando Katie Skinner and Roderic Broadhurst. 2016. Online Child Exploitation Material\u2013Trends and Emerging Issues: Research Report of the Australian National University Cybercrime Observatory with the input of the Office of the Children\u2019s eSafety Commissioner. Online Child Exploitation Material\u2013Trends and Emerging Issues Australian National University Cybercrime Observatory with the input of the Australian Office of the Children\u2019s e-Safety Commissioner Canberra (2016).","DOI":"10.2139\/ssrn.2861644"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Angelina McMillan-Major Salomey Osei Juan\u00a0Diego Rodriguez Pawan\u00a0Sasanka Ammanamanchi Sebastian Gehrmann and Yacine Jernite. 2021. Reusable Templates and Guides For Documenting Datasets and Models for Natural Language Processing and Generation: A Case Study of the HuggingFace and GEM Data and Model Cards. In Workshop on Natural Language Generation Evaluation and Metrics. 121\u2013135.","DOI":"10.18653\/v1\/2021.gem-1.11"},{"key":"e_1_3_2_1_34_1","unstructured":"Michele Merler Nalini Ratha Rogerio\u00a0S Feris and John\u00a0R Smith. 2019. Diversity in faces. arXiv preprint arXiv:1901.10436(2019)."},{"key":"e_1_3_2_1_35_1","unstructured":"Microsoft. [n. d.]. Microsoft PhotoDNA. https:\/\/www.microsoft.com\/en-us\/photodna. Accessed: 2022-01-04."},{"key":"e_1_3_2_1_36_1","volume-title":"The Ethics of Datasets: Moving Forward Requires Stepping Back. In AAAI\/ACM Conference on AI, Ethics, and Society. 1\u20131.","author":"Narayanan Arvind","year":"2021","unstructured":"Arvind Narayanan. 2021. The Ethics of Datasets: Moving Forward Requires Stepping Back. In AAAI\/ACM Conference on AI, Ethics, and Society. 1\u20131."},{"key":"e_1_3_2_1_37_1","unstructured":"People + AI\u00a0Research (PAIR). [n. d.]. Google Know Your Data. https:\/\/knowyourdata.withgoogle.com\/. Accessed: 2021-12-27."},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the LREC Workshop on Language Resources for Public Security Applications. 27\u201331","author":"Panchenko Alexander","year":"2012","unstructured":"Alexander Panchenko, Richard Beaufort, and Cedrick Fairon. 2012. Detection of child sexual abuse media on p2p networks: Normalization and classification of associated filenames. In Proceedings of the LREC Workshop on Language Resources for Public Security Applications. 27\u201331."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2014.27"},{"volume-title":"Deep Learning of Human Apparent Age for the Detection of Sexually Exploitative Imagery of Children","author":"Rondeau Jared","key":"e_1_3_2_1_40_1","unstructured":"Jared Rondeau. 2019. Deep Learning of Human Apparent Age for the Detection of Sexually Exploitative Imagery of Children. University of Rhode Island."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00414-012-0765-8"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7026079"},{"key":"e_1_3_2_1_43_1","volume-title":"Data Cascades in High-Stakes AI. In Conference on Human Factors in Computing Systems. 1\u201315","author":"Sambasivan Nithya","year":"2021","unstructured":"Nithya Sambasivan, Shivani Kapania, Hannah Highfill, Diana Akrong, Praveen Paritosh, and Lora\u00a0M Aroyo. 2021. \u201cEveryone wants to do the model work, not the data work\u201d: Data Cascades in High-Stakes AI. In Conference on Human Factors in Computing Systems. 1\u201315."},{"key":"e_1_3_2_1_44_1","first-page":"15","article-title":"Toward efficient detection of child pornography in the network infrastructure","volume":"1","author":"Shupo Asaf","year":"2006","unstructured":"Asaf Shupo, Miguel\u00a0Vargas Martin, Luis Rueda, Anasuya Bulkan, Yongming Chen, and Patrick\u00a0CK Hung. 2006. Toward efficient detection of child pornography in the network infrastructure. IADIS International Journal on Computer Science and Information Systems 1, 2(2006), 15\u201331.","journal-title":"IADIS International Journal on Computer Science and Information Systems"},{"volume-title":"Treating Children with Dissociative Disorders","author":"Silberg Joyanna","key":"e_1_3_2_1_45_1","unstructured":"Joyanna Silberg. [n. d.]. A case series of 70 victims of exploitation from child sexual abuse imagery. In Treating Children with Dissociative Disorders. Routledge, 49\u201372."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3469096.3469867"},{"key":"e_1_3_2_1_47_1","volume-title":"9th European Signal Processing Conference (EUSIPCO","author":"Tsekeridou Sofia","year":"1998","unstructured":"Sofia Tsekeridou and Ioannis Pitas. 1998. Facial feature extraction in frontal views using biometric analogies. In 9th European Signal Processing Conference (EUSIPCO 1998). IEEE, 1\u20134."},{"volume-title":"The morphological approach to segmentation: an introduction","author":"Vincent Luc","key":"e_1_3_2_1_48_1","unstructured":"Luc Vincent and Serge Beucher. 1989. The morphological approach to segmentation: an introduction. Centre de Morphologie Math\u00e9matique, Ecole Nationale Sup\u00e9rieure des Mines de Paris."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2017.12.005"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1001\/jamadermatol.2015.0351"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICT.2017.7998260"},{"key":"e_1_3_2_1_52_1","unstructured":"Andrew Young Stuart Campo and Stefaan Verhulst. 2019. Responsible data for children: synthesis report. (2019)."},{"key":"e_1_3_2_1_53_1","unstructured":"Delu Zeng Minyu Liao Mohammad Tavakolian Yulan Guo Bolei Zhou Dewen Hu Matti Pietik\u00e4inen and Li Liu. 2021. Deep Learning for Scene Classification: A Survey. arXiv preprint arXiv:2101.10531(2021)."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"},{"key":"e_1_3_2_1_55_1","volume-title":"Places: A 10 million image database for scene recognition","author":"Zhou Bolei","year":"2017","unstructured":"Bolei Zhou, Agata Lapedriza, Aditya Khosla, Aude Oliva, and Antonio Torralba. 2017. Places: A 10 million image database for scene recognition. IEEE transactions on pattern analysis and machine intelligence 40, 6(2017), 1452\u20131464."}],"event":{"name":"FAccT '22: 2022 ACM Conference on Fairness, Accountability, and Transparency","sponsor":["ACM Association for Computing Machinery"],"location":"Seoul Republic of Korea","acronym":"FAccT '22"},"container-title":["2022 ACM Conference on Fairness Accountability and Transparency"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3531146.3534636","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3531146.3534636","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:31Z","timestamp":1750188691000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3531146.3534636"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,20]]},"references-count":55,"alternative-id":["10.1145\/3531146.3534636","10.1145\/3531146"],"URL":"https:\/\/doi.org\/10.1145\/3531146.3534636","relation":{},"subject":[],"published":{"date-parts":[[2022,6,20]]},"assertion":[{"value":"2022-06-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}