{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:02:01Z","timestamp":1750309321873,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1145\/3660512.3665520","type":"proceedings-article","created":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T22:25:38Z","timestamp":1719613538000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An Empirical Study of Photo Naming Conventions across Popular Social Media Platforms"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8036-954X","authenticated-orcid":false,"given":"Anh-Duy","family":"Tran","sequence":"first","affiliation":[{"name":"DistriNet, KU Leuven, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-4018-7948","authenticated-orcid":false,"given":"Dinh-Hai","family":"Le","sequence":"additional","affiliation":[{"name":"University of Science, Viet Nam and Vietnam National University, Vietnam"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-2938-9846","authenticated-orcid":false,"given":"Thien-Phu","family":"Dao","sequence":"additional","affiliation":[{"name":"University of Science, Viet Nam and Vietnam National University, Vietnam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3046-3041","authenticated-orcid":false,"given":"Minh-Triet","family":"Tran","sequence":"additional","affiliation":[{"name":"University of Science, Viet Nam and Vietnam National University, Vietnam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2761-2213","authenticated-orcid":false,"given":"Duc-Tien","family":"Dang-Nguyen","sequence":"additional","affiliation":[{"name":"University of Bergen, Norway"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2010. Announcing Snowflake. https:\/\/blog.twitter.com\/engineering\/en_us\/a\/2010\/announcing-snowflake"},{"key":"e_1_3_2_1_2_1","unstructured":"2010. Ticket Servers: Distributed Unique Primary Keys on the Cheap. https:\/\/code.flickr.net\/2010\/02\/08\/ticket-servers-distributed-unique-primary-keys-on-the-cheap\/"},{"key":"e_1_3_2_1_3_1","unstructured":"2011. 6 000 000 000 | Flickr blog. https:\/\/blog.flickr.net\/en\/2011\/08\/04\/6000000000\/"},{"key":"e_1_3_2_1_4_1","unstructured":"2011. Twitter Usage Statistics - Internet Live Stats. https:\/\/www.internetlivestats.com\/twitter-statistics"},{"key":"e_1_3_2_1_5_1","unstructured":"2012. Get places near a location. https:\/\/developer.twitter.com\/en\/docs\/twitter-api\/v1\/geo\/places-near-location\/overview"},{"key":"e_1_3_2_1_6_1","unstructured":"2014. Photo Image URLs. https:\/\/www.flickr.com\/services\/api\/misc.urls.html"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2015.26"},{"key":"e_1_3_2_1_8_1","unstructured":"Doug Beaver Sanjeev Kumar Harry\u00a0C Li Jason Sobel Peter Vajgel 2010. Finding a Needle in Haystack: Facebook\u2019s Photo Storage.. In OSDI Vol.\u00a010. 1\u20138."},{"key":"e_1_3_2_1_9_1","volume-title":"Practical Analyses of How Common Social Media Platforms and Photo Storage Services Handle Uploaded Images. In International Conference on Multimedia Modeling. Springer, 164\u2013176","author":"Dang-Nguyen Duc-Tien","year":"2023","unstructured":"Duc-Tien Dang-Nguyen, Vegard\u00a0Velle Sj\u00f8en, Dinh-Hai Le, Thien-Phu Dao, Anh-Duy Tran, and Minh-Triet Tran. 2023. Practical Analyses of How Common Social Media Platforms and Photo Storage Services Handle Uploaded Images. In International Conference on Multimedia Modeling. Springer, 164\u2013176."},{"key":"e_1_3_2_1_10_1","first-page":"335","article-title":"Authentication of digital image using exif metadata and decoding properties","volume":"3","author":"Gangwar DP","year":"2018","unstructured":"DP Gangwar and Anju Pathania. 2018. Authentication of digital image using exif metadata and decoding properties. International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSR CSEIT) 3, 8 (2018), 335\u2013341.","journal-title":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSR CSEIT)"},{"key":"e_1_3_2_1_11_1","unstructured":"JustAnotherArchivist. 2018. snscrape. https:\/\/github.com\/JustAnotherArchivist\/snscrape."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2128309"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3236993"},{"key":"e_1_3_2_1_14_1","unstructured":"Neal Krawetz. 2014. Name dropping. https:\/\/hackerfactor.com\/blog\/index.php?%2Farchives%2F634-Name-Dropping.html"},{"key":"e_1_3_2_1_15_1","unstructured":"Cooper Smith. 2013. Facebook Users Are Uploading 350 Million New Photos Each Day. https:\/\/www.businessinsider.com\/facebook-350-million-photos-each-day-2013-9#:\u00a0:text=Facebook%20revealed%20in%20a%20white million%20new%20photos%20each%20day."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3512731.3534213"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2007.366212"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the International AAAI Conference on Web and Social Media, Vol.\u00a010","author":"Zampoglou Markos","year":"2016","unstructured":"Markos Zampoglou, Symeon Papadopoulos, Yiannis Kompatsiaris, Ruben Bouwmeester, and Jochen Spangenberg. 2016. Web and social media image forensics for news professionals. In Proceedings of the International AAAI Conference on Web and Social Media, Vol.\u00a010. 159\u2013166."}],"event":{"name":"ASIA CCS '24: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Singapore Singapore","acronym":"ASIA CCS '24"},"container-title":["Proceedings of the 1st Workshop on Security-Centric Strategies for Combating Information Disorder"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3660512.3665520","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3660512.3665520","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:58Z","timestamp":1750291438000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3660512.3665520"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":18,"alternative-id":["10.1145\/3660512.3665520","10.1145\/3660512"],"URL":"https:\/\/doi.org\/10.1145\/3660512.3665520","relation":{},"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-07-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}