{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:09:55Z","timestamp":1750219795121,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,23]],"date-time":"2022-12-23T00:00:00Z","timestamp":1671753600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,23]]},"DOI":"10.1145\/3579109.3579112","type":"proceedings-article","created":{"date-parts":[[2023,3,14]],"date-time":"2023-03-14T07:46:29Z","timestamp":1678779989000},"page":"13-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Black Cloud Generation Method for Privacy Protection in Fall Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0503-7254","authenticated-orcid":false,"given":"Runqing","family":"Zhang","sequence":"first","affiliation":[{"name":"Center for Technology Research &amp; Innovation, China Mobile (Suzhou) Software Technology Co., Ltd., China Mobile (Suzhou) Software Technology Co., Ltd., China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9087-4868","authenticated-orcid":false,"given":"Haoran","family":"Yan","sequence":"additional","affiliation":[{"name":"Center for Technology Research &amp; Innovation, China Mobile (Suzhou) Software Technology Co., Ltd., China Mobile (Suzhou) Software Technology Co., Ltd., China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0204-160X","authenticated-orcid":false,"given":"Dunbo","family":"Cai","sequence":"additional","affiliation":[{"name":"Center for Technology Research &amp; Innovation, China Mobile (Suzhou) Software Technology Co., Ltd., China Mobile (Suzhou) Software Technology Co., Ltd., China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5661-1722","authenticated-orcid":false,"given":"Ling","family":"Qian","sequence":"additional","affiliation":[{"name":"Center for Technology Research &amp; Innovation, China Mobile (Suzhou) Software Technology Co., Ltd., China Mobile (Suzhou) Software Technology Co., Ltd., China"}]}],"member":"320","published-online":{"date-parts":[[2023,3,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2795239"},{"key":"e_1_3_2_1_2_1","first-page":"5","volume-title":"2022 19th International Conference on ElectricalEngineering\/Electronics, Computer, Telecom-munications and Information Technology (ECTI-CON)","author":"Chutimawattanakul Pongsatorn","year":"2022","unstructured":"Pongsatorn Chutimawattanakul and Pranchalee Saman-piboon , \u201c Fall detection for the elderly using yolov4 and lstm ,\u201d in 2022 19th International Conference on ElectricalEngineering\/Electronics, Computer, Telecom-munications and Information Technology (ECTI-CON) , 2022 , pp. 1\u2013 5 . Pongsatorn Chutimawattanakul and Pranchalee Saman-piboon, \u201cFall detection for the elderly using yolov4 and lstm,\u201d in 2022 19th International Conference on ElectricalEngineering\/Electronics, Computer, Telecom-munications and Information Technology (ECTI-CON), 2022, pp. 1\u20135."},{"key":"e_1_3_2_1_3_1","first-page":"4","volume-title":"2021 12th National Conference with International Participation (ELECTRONICA)","author":"Hristov Plamen","year":"2021","unstructured":"Plamen Hristov , \u201c Real-time abnormal human activity detection using 1dcnn-lstm for 3d skeleton data ,\u201d in 2021 12th National Conference with International Participation (ELECTRONICA) , 2021 , pp. 1\u2013 4 . Plamen Hristov, \u201cReal-time abnormal human activity detection using 1dcnn-lstm for 3d skeleton data,\u201d in 2021 12th National Conference with International Participation (ELECTRONICA), 2021, pp. 1\u20134."},{"key":"e_1_3_2_1_4_1","first-page":"1","volume-title":"AAAI conference on artificial intelligence","author":"Yan Sijie","year":"2018","unstructured":"Sijie Yan , Yuanjun Xiong , and Dahua Lin , \u201c Spatial temporal graph convolutional networks for skeleton-based action recognition ,\u201d in AAAI conference on artificial intelligence , 2018 , pp. 1 - 10 . Sijie Yan, Yuanjun Xiong, and Dahua Lin, \u201cSpatial temporal graph convolutional networks for skeleton-based action recognition,\u201d in AAAI conference on artificial intelligence, 2018, pp.1-10."},{"key":"e_1_3_2_1_5_1","first-page":"12035","volume-title":"IEEE Conference on Computer Vision and Pattern Recognition","author":"Shi Lei","year":"2019","unstructured":"Lei Shi , Yifan Zhang , Jian Cheng , and Hanqing Lu ,\u201c Two-stream adaptive graph convolutional networks for skeleton-based action recognition ,\u201d in IEEE Conference on Computer Vision and Pattern Recognition , 2019 , pp. 12026\u2013 12035 . Lei Shi, Yifan Zhang, Jian Cheng, and Hanqing Lu,\u201cTwo-stream adaptive graph convolutional networks for skeleton-based action recognition,\u201d in IEEE Conference on Computer Vision and Pattern Recognition, 2019, pp. 12026\u201312035."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/j.sigpro.2014.08.021","article-title":"An unsupervised acoustic fall detection system using source separation for sound interference suppression","volume":"110","author":"Khan Muhammad Salman","year":"2015","unstructured":"Muhammad Salman Khan , Miao Yu , Pengming Feng , Liang Wang , and Jonathon Chambers , \u201c An unsupervised acoustic fall detection system using source separation for sound interference suppression ,\u201d Signal processing , vol. 110 , pp. 199 \u2013 210 , 2015 . Muhammad Salman Khan, Miao Yu, Pengming Feng, Liang Wang, and Jonathon Chambers, \u201cAn unsupervised acoustic fall detection system using source separation for sound interference suppression,\u201d Signal processing, vol. 110, pp. 199\u2013210, 2015.","journal-title":"Signal processing"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2016.27"},{"key":"e_1_3_2_1_8_1","first-page":"9","volume-title":"An accelerometer-based fall detector: development, experimentation, and analysis","author":"Brown Garrett","year":"2005","unstructured":"Garrett Brown , \u201c An accelerometer-based fall detector: development, experimentation, and analysis ,\u201d University of California , Berkeley , pp. 1\u2013 9 , 2005 . Garrett Brown, \u201cAn accelerometer-based fall detector: development, experimentation, and analysis,\u201d University of California, Berkeley, pp. 1\u20139, 2005."},{"key":"e_1_3_2_1_9_1","first-page":"143","volume-title":"IEEE","author":"Li Qiang","year":"2009","unstructured":"Qiang Li , John A Stankovic , Mark A Hanson , Adam T Barth , John Lach , and Gang Zhou , \u201c Accurate, fast fall detection using gyroscopes and accelerometer-derivedpostureinformation,\u201d inInternationalWorkshop on Wearable and Implantable Body Sensor Networks . IEEE , 2009 , pp. 138\u2013 143 . Qiang Li, John A Stankovic, Mark A Hanson, Adam TBarth, John Lach, and Gang Zhou, \u201cAccurate, fast fall detection using gyroscopes and accelerometer-derivedpostureinformation,\u201d inInternationalWorkshop on Wearable and Implantable Body Sensor Networks. IEEE, 2009, pp. 138\u2013143."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2011.2129370"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2841440.2841481"},{"key":"e_1_3_2_1_12_1","first-page":"5792","volume-title":"International Conference on Computer Vision","author":"Xu Huijuan","year":"2017","unstructured":"Huijuan Xu , Abir Das , and Kate Saenko , \u201c R-c3d: Region convolutional 3d network for temporal activity detection ,\u201d in International Conference on Computer Vision , 2017 , pp. 5783\u2013 5792 . Huijuan Xu, Abir Das, and Kate Saenko, \u201cR-c3d: Region convolutional 3d network for temporal activity detection,\u201d in International Conference on Computer Vision, 2017, pp. 5783\u20135792."},{"key":"e_1_3_2_1_13_1","first-page":"2126","volume-title":"International Conference on Computer Vision","author":"Zhang Pengfei","year":"2017","unstructured":"Pengfei Zhang , Cuiling Lan , Junliang Xing , Wenjun Zeng , Jianru Xue , and Nanning Zheng , \u201c View adaptive recurrent neural networks for high performance human action recognition from skeleton data ,\u201d in International Conference on Computer Vision , 2017 , pp. 2117\u2013 2126 . Pengfei Zhang, Cuiling Lan, Junliang Xing, Wenjun Zeng, Jianru Xue, and Nanning Zheng, \u201cView adaptive recurrent neural networks for high performance human action recognition from skeleton data,\u201d in International Conference on Computer Vision, 2017, pp. 2117\u20132126."},{"key":"e_1_3_2_1_14_1","first-page":"562","volume-title":"International Conference on Systems and Informatics. IEEE","author":"Zheng Yin","year":"2019","unstructured":"Yin Zheng , Dongping Zhang , Li Yang , and Zhihong Zhou , \u201c Fall detection and recognition based on gcn and 2d pose ,\u201d in International Conference on Systems and Informatics. IEEE , 2019 , pp. 558\u2013 562 . Yin Zheng, Dongping Zhang, Li Yang, and Zhihong Zhou, \u201cFall detection and recognition based on gcn and 2d pose,\u201d in International Conference on Systems and Informatics. IEEE, 2019, pp. 558\u2013562."},{"key":"e_1_3_2_1_15_1","first-page":"35","volume-title":"European Conference on Computer Vision. Springer","author":"Oh Seong Joon","year":"2016","unstructured":"Seong Joon Oh , Rodrigo Benenson , Mario Fritz , and Bernt Schiele , \u201c Faceless person recognition: Privacy implications in social media ,\u201d in European Conference on Computer Vision. Springer , 2016 , pp. 19\u2013 35 . Seong Joon Oh, Rodrigo Benenson, Mario Fritz, and Bernt Schiele, \u201cFaceless person recognition: Privacy implications in social media,\u201d in European Conference on Computer Vision. Springer, 2016, pp. 19\u201335."},{"key":"e_1_3_2_1_16_1","volume-title":"5th International Workshop, PET 2005","author":"Gross R.","year":"2005","unstructured":"R. Gross , E. Airoldi , B. Malin , and L. Sweeney , \u201c Integrating utility into face de-identification,\u201d in Privacy Enhancing Technologies , 5th International Workshop, PET 2005 , Cavtat, Croatia, May 30- June 1, 2005 , Revised Selected Papers, 2006. R. Gross, E. Airoldi, B. Malin, and L. Sweeney, \u201cIntegrating utility into face de-identification,\u201d in Privacy Enhancing Technologies, 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers, 2006."},{"key":"e_1_3_2_1_17_1","first-page":"1604","volume-title":"Fawkes: Protecting privacy against unauthorized deep learning models","author":"Shan S.","year":"2020","unstructured":"S. Shan , E. Wenger , J. Zhang , H. Li , H. Zheng , and B. Y. Zhao , \u201c Fawkes: Protecting privacy against unauthorized deep learning models ,\u201d pp. 1589\u2013 1604 , 2020 . S. Shan, E. Wenger, J. Zhang, H. Li, H. Zheng, and B. Y. Zhao, \u201cFawkes: Protecting privacy against unauthorized deep learning models,\u201d pp. 1589\u20131604, 2020."},{"key":"e_1_3_2_1_18_1","first-page":"1","volume-title":"IEEE Conference on Computer Vision and Pattern Recognition","author":"Pathak D.","year":"2016","unstructured":"D. Pathak , P. Krahenbuhl , J. Donahue , T. Darrell , and A. A. Efros , \u201c Context encoders: Feature learning by inpainting ,\u201d in IEEE Conference on Computer Vision and Pattern Recognition , 2016 , pp. 1 - 10 . D. Pathak, P. Krahenbuhl, J. Donahue, T. Darrell, and A. A. Efros, \u201cContext encoders: Feature learning by inpainting,\u201d in IEEE Conference on Computer Vision and Pattern Recognition, 2016, pp. 1-10."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","first-page":"1507","DOI":"10.1109\/LSP.2022.3185964","article-title":"Privacy-phys: Facial video-based physiological modification for privacy protection","volume":"29","author":"Sun Zhaodong","year":"2022","unstructured":"Zhaodong Sun and Xiaobai Li , \u201c Privacy-phys: Facial video-based physiological modification for privacy protection ,\u201d IEEE Signal Processing Letters , vol. 29 , pp. 1507 \u2013 1511 , 2022 . Zhaodong Sun and Xiaobai Li, \u201cPrivacy-phys: Facial video-based physiological modification for privacy protection,\u201d IEEE Signal Processing Letters, vol. 29, pp. 1507\u20131511, 2022.","journal-title":"IEEE Signal Processing Letters"},{"key":"e_1_3_2_1_20_1","first-page":"6","volume-title":"2022 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB)","author":"Cao Jingyi","year":"2022","unstructured":"Jingyi Cao , Bo Liu , Yunqian Wen , Yunhui Zhu , Rong Xie , Li Song , Lin Li , and Yaoyao Yin , \u201c Hiding among your neighbors: Face image privacy protection with differential private k-anonymity ,\u201d in 2022 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB) , 2022 , pp. 1\u2013 6 . Jingyi Cao, Bo Liu, Yunqian Wen, Yunhui Zhu, Rong Xie, Li Song, Lin Li, and Yaoyao Yin, \u201cHiding among your neighbors: Face image privacy protection with differential private k-anonymity,\u201d in 2022 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), 2022, pp. 1\u20136."},{"key":"e_1_3_2_1_21_1","first-page":"89","volume-title":"International Conference on Biometrics. IEEE","author":"Mirjalili Vahid","year":"2018","unstructured":"Vahid Mirjalili , Sebastian Raschka , Anoop Namboodiri , and Arun Ross , \u201c Semi-adversarial networks: Convolutional autoencoders for imparting privacy to face images ,\u201d in International Conference on Biometrics. IEEE , 2018 , pp. 82\u2013 89 . Vahid Mirjalili, Sebastian Raschka, Anoop Namboodiri, and Arun Ross, \u201cSemi-adversarial networks: Convolutional autoencoders for imparting privacy to face images,\u201d in International Conference on Biometrics. IEEE, 2018, pp. 82\u201389."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2020.3024026"},{"volume-title":"Data lake algorithm competition[online]","year":"2021","key":"e_1_3_2_1_23_1","unstructured":"\u201c Data lake algorithm competition[online] ,\u201d 2021 , URL :https:\/\/www.heywhale.com\/landing\/hualucup. \u201cData lake algorithm competition[online],\u201d 2021, URL:https:\/\/www.heywhale.com\/landing\/hualucup."},{"key":"e_1_3_2_1_24_1","volume-title":"Conference on Neural Information Processing Systems Datasets and Benchmarks Track","author":"An Jaeju","year":"2021","unstructured":"Jaeju An , Jeongho Kim , Hanbeen Lee , Jinbeom Kim , Junhyung Kang , Saebyeol Shin , Minha Kim , Donghee Hong , and Simon S Woo , \u201c Vfp290k: A large-scale benchmark dataset for vision-based fallen person detection ,\u201d in Conference on Neural Information Processing Systems Datasets and Benchmarks Track , 2021 . Jaeju An, Jeongho Kim, Hanbeen Lee, Jinbeom Kim, Junhyung Kang, Saebyeol Shin, Minha Kim, Donghee Hong, and Simon S Woo, \u201cVfp290k: A large-scale benchmark dataset for vision-based fallen person detection,\u201d in Conference on Neural Information Processing Systems Datasets and Benchmarks Track, 2021."},{"volume-title":"The fall detection dataset[online]","year":"2019","key":"e_1_3_2_1_25_1","unstructured":"\u201c The fall detection dataset[online] ,\u201d 2019 , URL :http:\/\/le2i.cnrs.fr\/Fall-detection-Dataset?lang=fr. \u201cThe fall detection dataset[online],\u201d 2019, URL:http:\/\/le2i.cnrs.fr\/Fall-detection-Dataset?lang=fr."},{"key":"e_1_3_2_1_26_1","first-page":"818","volume-title":"European conference on computer vision","author":"Chen Liang-Chieh","year":"2018","unstructured":"Liang-Chieh Chen , Yukun Zhu , George Papandreou , Florian Schroff , and Hartwig Adam , \u201c Encoder-decoder with atrous separable convolution for semantic image segmentation ,\u201d in European conference on computer vision , 2018 , pp. 801\u2013 818 . Liang-Chieh Chen, Yukun Zhu, George Papandreou, Florian Schroff, and Hartwig Adam, \u201cEncoder-decoder with atrous separable convolution for semantic image segmentation,\u201d in European conference on computer vision, 2018, pp. 801\u2013818."},{"volume-title":"Yolov5(v6.2)","year":"2020","key":"e_1_3_2_1_27_1","unstructured":"\u201c Yolov5(v6.2) ,\u201d 2020 , URL :https:\/\/github.com\/ultralytics\/yolov5. \u201cYolov5(v6.2),\u201d 2020, URL:https:\/\/github.com\/ultralytics\/yolov5."},{"key":"e_1_3_2_1_28_1","first-page":"190","volume-title":"European conference on computer vision. Springer","author":"Yuan Yuhui","year":"2020","unstructured":"Yuhui Yuan , Xilin Chen , and Jingdong Wang , \u201c Object-contextual representations for semantic segmentation ,\u201d in European conference on computer vision. Springer , 2020 , pp. 173\u2013 190 . Yuhui Yuan, Xilin Chen, and Jingdong Wang, \u201cObject-contextual representations for semantic segmentation,\u201d in European conference on computer vision. Springer, 2020, pp. 173\u2013190."},{"key":"e_1_3_2_1_29_1","first-page":"209","volume-title":"IEEE Winter Conference on Applications of Computer Vision Workshops","author":"Chu Lutao","year":"2022","unstructured":"Lutao Chu , Yi Liu , Zewu Wu , Shiyu Tang , Guowei Chen , Yuying Hao , Juncai Peng , Zhiliang Yu , Zeyu Chen , Baohua Lai , and Haoyi Xiong , \u201c Pp-humanseg: Connectivity-aware portrait segmentation with a large-scale teleconferencing video dataset ,\u201d in IEEE Winter Conference on Applications of Computer Vision Workshops , January 2022 , pp. 202\u2013 209 . Lutao Chu, Yi Liu, Zewu Wu, Shiyu Tang, Guowei Chen, Yuying Hao, Juncai Peng, Zhiliang Yu, Zeyu Chen, Baohua Lai, and Haoyi Xiong, \u201cPp-humanseg: Connectivity-aware portrait segmentation with a large-scale teleconferencing video dataset,\u201d in IEEE Winter Conference on Applications of Computer Vision Workshops, January 2022, pp. 202\u2013209."}],"event":{"name":"ICVIP 2022: 2022 The 6th International Conference on Video and Image Processing","acronym":"ICVIP 2022","location":"Shanghai China"},"container-title":["2022 The 6th International Conference on Video and Image Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579109.3579112","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3579109.3579112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:38:05Z","timestamp":1750178285000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579109.3579112"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,23]]},"references-count":29,"alternative-id":["10.1145\/3579109.3579112","10.1145\/3579109"],"URL":"https:\/\/doi.org\/10.1145\/3579109.3579112","relation":{},"subject":[],"published":{"date-parts":[[2022,12,23]]},"assertion":[{"value":"2023-03-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}