{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T04:03:19Z","timestamp":1751688199692,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"funder":[{"name":"Guangdong Provincial Key Lab of Integrated Communication, Sensing and Computation for Ubiquitous Internet of Things","award":["2023B1212010007"],"award-info":[{"award-number":["2023B1212010007"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706598.3713391","type":"proceedings-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T04:29:11Z","timestamp":1745468951000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Bystander Privacy in Video Sharing Era: Automated Consent Compliance through Platform Censorship"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-0791-9155","authenticated-orcid":false,"given":"Si","family":"Liao","sequence":"first","affiliation":[{"name":"School of Information Science and Technology, ShanghaiTech University, Shanghai, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-9886-2970","authenticated-orcid":false,"given":"Hanwei","family":"He","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, ShanghaiTech University, Shanghai, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0313-4421","authenticated-orcid":false,"given":"Huangxun","family":"Chen","sequence":"additional","affiliation":[{"name":"IoT Thrust, Information Hub, Hong Kong University of Science and Technology (Guangzhou), Guangzhou, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7900-0745","authenticated-orcid":false,"given":"Zhice","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, ShanghaiTech University, Shanghai, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"e_1_3_3_3_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906412"},{"key":"e_1_3_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00006"},{"key":"e_1_3_3_3_4_2","doi-asserted-by":"crossref","unstructured":"Meng Ao Dong Yi Zhen Lei and Stan\u00a0Z Li. 2009. Face recognition at a distance: system issues. Handbook of Remote Biometrics: For Surveillance and Security (2009) 155\u2013167.","DOI":"10.1007\/978-1-84882-385-3_6"},{"key":"e_1_3_3_3_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/2668332.2668339"},{"key":"e_1_3_3_3_6_2","unstructured":"Laura Ceci. 2024. Distribution of TikTok users worldwide. https:\/\/www.statista.com\/statistics\/1299771\/tiktok-global-user-age-distribution\/"},{"key":"e_1_3_3_3_7_2","unstructured":"Laura Ceci. 2024. Distribution of YouTube users worldwide. https:\/\/www.statista.com\/statistics\/1287137\/youtube-global-users-age-gender-distribution."},{"key":"e_1_3_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376304"},{"key":"e_1_3_3_3_9_2","unstructured":"Sergiu Ciumac. 2024. Audio\/Video fingerprinting and recognition in.NET. https:\/\/github.com\/AddictedCS\/soundfingerprinting."},{"key":"e_1_3_3_3_10_2","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v11i1.14955"},{"key":"e_1_3_3_3_11_2","unstructured":"Fackbook. 2024. Photos or Videos That Violate Your Privacy. https:\/\/www.facebook.com\/help\/428478523862899\/?helpref=related_articles."},{"key":"e_1_3_3_3_12_2","unstructured":"Adam Geitgey. 2018. Face Recognition. https:\/\/github.com\/ageitgey\/face_recognition."},{"key":"e_1_3_3_3_13_2","doi-asserted-by":"publisher","unstructured":"Robert\u00a0O. Gjerdingen and David Perrott. 2008. Scanning the Dial: The Rapid Recognition of Music Genres. Journal of New Music Research 37 2 (2008) 93\u2013100. arXiv:10.1080\/0929821080247926810.1080\/09298210802479268","DOI":"10.1080\/09298210802479268"},{"key":"e_1_3_3_3_14_2","unstructured":"Sound\u00a0Understanding group. Jul. 06 2024. AudioSet. https:\/\/research.google.com\/audioset\/dataset\/index.html."},{"key":"e_1_3_3_3_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445258"},{"key":"e_1_3_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00097"},{"key":"e_1_3_3_3_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581496"},{"key":"e_1_3_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462113"},{"key":"e_1_3_3_3_19_2","doi-asserted-by":"publisher","unstructured":"Romain Hennequin Anis Khlif Felix Voituret and Manuel Moussallam. 2020. Spleeter: a fast and efficient music source separation tool with pre-trained models. Journal of Open Source Software 5 50 (2020) 2154. 10.21105\/joss.02154 Deezer Research.","DOI":"10.21105\/joss.02154"},{"key":"e_1_3_3_3_20_2","unstructured":"Josh Howarth. 2024. 30+ Incredible Creator Economy Statistics (2024). https:\/\/explodingtopics.com\/blog\/creator-economy-stats."},{"key":"e_1_3_3_3_21_2","unstructured":"Instagram. 2024. Instagram\u2019s Community Guidelines. https:\/\/www.facebook.com\/help\/instagram\/477434105621119."},{"key":"e_1_3_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02189"},{"key":"e_1_3_3_3_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3531073.3531125"},{"key":"e_1_3_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2016.7733008"},{"key":"e_1_3_3_3_25_2","doi-asserted-by":"publisher","unstructured":"Yifang Li Nishant Vishwamitra Bart\u00a0P. Knijnenburg Hongxin Hu and Kelly Caine. 2017. Effectiveness and Users\u2019 Experience of Obfuscation as a Privacy-Enhancing Technology for Sharing Photos. Proc. ACM Hum.-Comput. Interact. 1 CSCW Article 67 (Dec. 2017) 24\u00a0pages. 10.1145\/3134702","DOI":"10.1145\/3134702"},{"key":"e_1_3_3_3_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858391"},{"key":"e_1_3_3_3_27_2","unstructured":"Meta. 2024. Providing context on sensitive or misleading content. https:\/\/transparency.meta.com\/zh-cn\/enforcement\/taking-action\/context-on-sensitive-misleading-content\/."},{"key":"e_1_3_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23657"},{"key":"e_1_3_3_3_29_2","unstructured":"Reliable Music. 2022. Crowded Streets - People Walking - Noisy Environment. https:\/\/www.aigei.com\/item\/ren_lei_xing_4.html."},{"key":"e_1_3_3_3_30_2","first-page":"399","volume-title":"Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017","author":"Naeini Pardis\u00a0Emami","year":"2017","unstructured":"Pardis\u00a0Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie\u00a0Faith Cranor, and Norman\u00a0M. Sadeh. 2017. Privacy Expectations and Preferences in an IoT World. In Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017. USENIX Association, 399\u2013412. https:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/naeini"},{"key":"e_1_3_3_3_31_2","doi-asserted-by":"publisher","unstructured":"Rajalakshmi Nandakumar Alex Takakuwa Tadayoshi Kohno and Shyamnath Gollakota. 2017. CovertBand: Activity Information Leakage using Music. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1 3 Article 87 (sep 2017) 24\u00a0pages. 10.1145\/3131897","DOI":"10.1145\/3131897"},{"key":"e_1_3_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/2559206.2581195"},{"key":"e_1_3_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179392"},{"key":"e_1_3_3_3_34_2","unstructured":"Jerome Pesenti. 2021. An Update On Our Use of Face Recognition. https:\/\/about.fb.com\/news\/2021\/11\/update-on-use-of-face-recognition\/."},{"key":"e_1_3_3_3_35_2","doi-asserted-by":"crossref","unstructured":"Moo-Ryong Ra Seungjoon Lee Emiliano Miluzzo and Eric Zavesky. 2017. Do Not Capture: Automated Obscurity for Pervasive Imaging. IEEE Internet Computing 21 3 (2017) 82\u201387.","DOI":"10.1109\/MIC.2017.67"},{"key":"e_1_3_3_3_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10096956"},{"key":"e_1_3_3_3_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081366"},{"key":"e_1_3_3_3_38_2","series-title":"(NSDI\u201918)","first-page":"547","volume-title":"Proceedings of the 15th USENIX Conference on Networked Systems Design and Implementation","author":"Roy Nirupam","year":"2018","unstructured":"Nirupam Roy, Sheng Shen, Haitham Hassanieh, and Romit\u00a0Roy Choudhury. 2018. Inaudible voice commands: the long-range attack and defense. In Proceedings of the 15th USENIX Conference on Networked Systems Design and Implementation (Renton, WA, USA) (NSDI\u201918). USENIX Association, USA, 547\u2013560."},{"key":"e_1_3_3_3_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642333"},{"key":"e_1_3_3_3_40_2","doi-asserted-by":"crossref","unstructured":"Filipo Sharevski Amy Devine Emma Pieroni and Peter Jachim. 2022. Folk models of misinformation on social media. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2207.12589 (2022).","DOI":"10.14722\/ndss.2023.24293"},{"key":"e_1_3_3_3_41_2","unstructured":"Mahnoor Sheikh. 2024. 50+ Social Media Video Marketing Statistics for 2024. https:\/\/sproutsocial.com\/insights\/social-media-video-statistics\/."},{"key":"e_1_3_3_3_42_2","unstructured":"Rohit Shewale. 2024. YouTube Statistics. https:\/\/www.demandsage.com\/youtube-stats\/."},{"key":"e_1_3_3_3_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/3204949.3204973"},{"key":"e_1_3_3_3_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP57164.2023.00056"},{"key":"e_1_3_3_3_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP57164.2023.00056"},{"key":"e_1_3_3_3_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319913"},{"key":"e_1_3_3_3_47_2","doi-asserted-by":"crossref","unstructured":"Jose\u00a0M Such and Natalia Criado. 2018. Multiparty privacy in social media. Commun. ACM 61 8 (2018) 74\u201381.","DOI":"10.1145\/3208039"},{"key":"e_1_3_3_3_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399341"},{"key":"e_1_3_3_3_49_2","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417883"},{"key":"e_1_3_3_3_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559351"},{"key":"e_1_3_3_3_51_2","unstructured":"TP-Link. 2024. About Face Monitoring. https:\/\/security.tp-link.com.cn\/service\/detail_article_4513.html."},{"key":"e_1_3_3_3_52_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24260"},{"key":"e_1_3_3_3_53_2","doi-asserted-by":"crossref","unstructured":"Maximiliane Windl and Sven Mayer. 2022. The skewed privacy concerns of bystanders in smart environments. Proceedings of the ACM on Human-Computer Interaction 6 MHCI (2022) 1\u201321.","DOI":"10.1145\/3546719"},{"key":"e_1_3_3_3_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642103"},{"key":"e_1_3_3_3_55_2","unstructured":"YouTube. 2024. YouTube\u2019s Community Guidelines. https:\/\/support.google.com\/youtube\/answer\/9288567?sjid=15820223809265265066-AP."},{"key":"e_1_3_3_3_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"},{"key":"e_1_3_3_3_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971662"},{"key":"e_1_3_3_3_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560571"},{"key":"e_1_3_3_3_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00961"}],"event":{"name":"CHI 2025: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Yokohama Japan","acronym":"CHI '25"},"container-title":["Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713391","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706598.3713391","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:16:13Z","timestamp":1751606173000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713391"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":58,"alternative-id":["10.1145\/3706598.3713391","10.1145\/3706598"],"URL":"https:\/\/doi.org\/10.1145\/3706598.3713391","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}