{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T21:07:21Z","timestamp":1765487241028,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","funder":[{"name":"FAPESP","award":["2023\/12086-9,2022\/14690-8, 2020\/09838-0, 2013\/08293-7"],"award-info":[{"award-number":["2023\/12086-9,2022\/14690-8, 2020\/09838-0, 2013\/08293-7"]}]},{"name":"PIND\/FAEPEX UNICAMP","award":["2597\/23"],"award-info":[{"award-number":["2597\/23"]}]},{"name":"Serrapilheira Institute","award":["R-2011-37776"],"award-info":[{"award-number":["R-2011-37776"]}]},{"name":"H.IAAC","award":["01245.003479\/2024-10"],"award-info":[{"award-number":["01245.003479\/2024-10"]}]},{"name":"CNPq","award":["316489\/2023-9"],"award-info":[{"award-number":["316489\/2023-9"]}]},{"name":"Becas Santander"},{"name":"Alumni Grant (Instituto de Computa\u00e7\u00e3o)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,23]]},"DOI":"10.1145\/3715275.3732102","type":"proceedings-article","created":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T17:01:18Z","timestamp":1750698078000},"page":"1543-1553","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Minimizing Risk Through Minimizing Model-Data Interaction: A Protocol For Relying on Proxy Tasks When Designing Child Sexual Abuse Imagery Detection Models"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-4894-0347","authenticated-orcid":false,"given":"Thamiris","family":"Coelho","sequence":"first","affiliation":[{"name":"Universidade Estadual de Campinas (UNICAMP), Instituto de Computa\u00e7\u00e3o, Campinas, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1781-2630","authenticated-orcid":false,"given":"Leo Sampaio Ferraz","family":"Ribeiro","sequence":"additional","affiliation":[{"name":"Universidade de S\u00e3o Paulo (USP), Instituto de Ci\u00eancias Matem\u00e1ticas e de Computa\u00e7\u00e3o, S\u00e3o Carlos, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5558-3088","authenticated-orcid":false,"given":"Jo\u00e3o","family":"Macedo","sequence":"additional","affiliation":[{"name":"Universidade Federal de Minas Gerais (UFMG), Departamento de Ci\u00eancia da Computa\u00e7\u00e3o, Belo Horizonte, Brazil and Departamento de Pol\u00edcia Federal (DPF), Belo Horizonte, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8889-1586","authenticated-orcid":false,"given":"Jefersson A.","family":"dos Santos","sequence":"additional","affiliation":[{"name":"University of Sheffield, School of Computer Science, Sheffield, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9068-938X","authenticated-orcid":false,"given":"Sandra","family":"Avila","sequence":"additional","affiliation":[{"name":"Universidade Estadual de Campinas (UNICAMP), Instituto de Computa\u00e7\u00e3o, Campinas, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2025,6,23]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"Mhd\u00a0Wesam Al-Nabki Eduardo Fidalgo Roberto\u00a0A Vasco-Carofilis Francisco Janez-Martino and Javier Velasco-Mata. 2020. Evaluating performance of an adult pornography classifier for child sexual abuse detection. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2005.08766 (2020)."},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"crossref","unstructured":"Felix Anda Nhien-An Le-Khac and Mark Scanlon. 2020. DeepUAge: improving underage age estimation accuracy to aid CSEM investigation. Forensic Science International: Digital Investigation 32 (2020) 300921.","DOI":"10.1016\/j.fsidi.2020.300921"},{"volume-title":"CSAM Detection - Technical Summary","year":"2021","key":"e_1_3_3_2_4_2","unstructured":"Apple. 2021. CSAM Detection - Technical Summary. Technical Report. Apple."},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"crossref","unstructured":"Sandra Avila Nicolas Thome Matthieu Cord Eduardo Valle and Arnaldo de\u00a0A. Ara\u00faJo. 2013. Pooling in Image Representation: The Visual Codeword Point of View. Computer Vision and Image Understanding 117 5 (2013) 453\u2013465.","DOI":"10.1016\/j.cviu.2012.09.007"},{"key":"e_1_3_3_2_6_2","unstructured":"Rubel Biswas Victor Gonz\u00e1lez-Castro E Fidalgo and Deisy Chaves. 2019. Boosting child abuse victim identification in Forensic Tools with hashing techniques. V Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad 1 (2019) 344\u2013345."},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313482"},{"key":"e_1_3_3_2_8_2","first-page":"2633","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Carlini Nicholas","year":"2021","unstructured":"Nicholas Carlini, Florian Tram\u00e8r, Eric Wallace, Matthew Jagielski, Ariel Herbert-Voss, Katherine Lee, Adam Roberts, Tom Brown, Dawn Song, \u00dalfar Erlingsson, Alina Oprea, and Colin Raffel. 2021. Extracting Training Data from Large Language Models. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 2633\u20132650. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/carlini-extracting"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"crossref","unstructured":"Modesto Castrill\u00f3n-Santana Javier Lorenzo-Navarro Carlos\u00a0M Travieso-Gonz\u00e1lez David Freire-Obreg\u00f3n and Jes\u00fas\u00a0B Alonso-Hern\u00e1ndez. 2018. Evaluation of local descriptors and CNNs for non-adult detection in visual content. Pattern Recognition Letters 113 (2018) 10\u201318.","DOI":"10.1016\/j.patrec.2017.03.016"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.5220\/0008945907210729"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","unstructured":"Haoxing Chen Huaxiong Li Yaohui Li and Chunlin Chen. 2023. Sparse Spatial Transformers for Few-Shot Learning. Science China Information Sciences 66 11 (Nov. 2023) 210102. https:\/\/doi.org\/10.1007\/s11432-022-3700-8","DOI":"10.1007\/s11432-022-3700-8"},{"key":"e_1_3_3_2_12_2","volume-title":"International Conference on Learning Representations","author":"Chen Wei-Yu","year":"2019","unstructured":"Wei-Yu Chen, Yen-Cheng Liu, Zsolt Kira, Yu-Chiang\u00a0Frank Wang, and Jia-Bin Huang. 2019. A Closer Look at Few-shot Classification. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=HkxLXnAcFQ"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2010.74"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_3_2_15_2","first-page":"21981","volume-title":"Advances in Neural Information Processing Systems","author":"Doersch Carl","year":"2020","unstructured":"Carl Doersch, Ankush Gupta, and Andrew Zisserman. 2020. CrossTransformers: spatially-aware few-shot transfer. In Advances in Neural Information Processing Systems, Vol.\u00a033. Curran Associates, Inc., 21981\u201321993."},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.5769\/C2012002"},{"key":"e_1_3_3_2_17_2","first-page":"1126","volume-title":"International Conference on Machine Learning","author":"Finn Chelsea","year":"2017","unstructured":"Chelsea Finn, Pieter Abbeel, and Sergey Levine. 2017. Model-agnostic meta-learning for fast adaptation of deep networks. In International Conference on Machine Learning. 1126\u20131135."},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"crossref","unstructured":"Abhishek Gangwar V\u00edctor Gonz\u00e1lez-Castro Enrique Alegre and Eduardo Fidalgo. 2021. AttM-CNN: Attention and metric learning based CNN for pornography age and Child Sexual Abuse (CSA) Detection in images. Neurocomputing 445 (2021) 81\u2013104.","DOI":"10.1016\/j.neucom.2021.02.056"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10710-017-9314-z"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.01733"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00891"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00886"},{"key":"e_1_3_3_2_23_2","unstructured":"Microsoft Inc.2020. PhotoDNA Cloud Services. https:\/\/www.microsoft.com\/en-us\/PhotoDNA."},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"crossref","unstructured":"Juliane\u00a0A Kloess Jessica Woodhams and Catherine\u00a0E Hamilton-Giachritsis. 2021. The Challenges of Identifying and Classifying Child Sexual Exploitation Material: Moving towards a More Ecologically Valid Pilot Study with Digital Forensics Analysts. Child Abuse & Neglect 118 (2021) 105166.","DOI":"10.1016\/j.chiabu.2021.105166"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"crossref","unstructured":"Juliane\u00a0A Kloess Jessica Woodhams Helen Whittle Tim Grant and Catherine\u00a0E Hamilton-Giachritsis. 2019. The Challenges of Identifying and Classifying Child Sexual Abuse Material. Sexual Abuse 31 2 (2019) 173\u2013196.","DOI":"10.1177\/1079063217724768"},{"key":"e_1_3_3_2_26_2","volume-title":"35th Conference on Neural Information Processing Systems (NeurIPS 2021)","author":"Koch Bernard","year":"2021","unstructured":"Bernard Koch, Emily Denton, Alex Hanna, and Jacob Foster. 2021. Reduced, Reused and Recycled: The Life of a Dataset in Machine Learning Research. In 35th Conference on Neural Information Processing Systems (NeurIPS 2021)."},{"key":"e_1_3_3_2_27_2","volume-title":"ICML Deep Learning Workshop","author":"Koch Gregory","year":"2015","unstructured":"Gregory Koch, Richard Zemel, and Ruslan Salakhutdinov. 2015. Siamese neural networks for one-shot image recognition. In ICML Deep Learning Workshop."},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3534636"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"crossref","unstructured":"Hee-Eun Lee Tatiana Ermakova Vasilis Ververis and Benjamin Fabian. 2020. Detecting child sexual abuse material: A comprehensive survey. Forensic Science International: Digital Investigation 34 (2020) 301022.","DOI":"10.1016\/j.fsidi.2020.301022"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/SIBGRAPI.2018.00065"},{"key":"e_1_3_3_2_31_2","unstructured":"Jay Mahadeokar and Gerry Pesavento. 2016. Open Sourcing a Deep Learning Solution for Detecting NSFW Images. Retrieved August 24 (2016) 2018."},{"key":"e_1_3_3_2_32_2","unstructured":"Mark Mazumder Colby Banbury Xiaozhe Yao Bojan Karla\u0161 William\u00a0Gaviria Rojas Sudnya Diamos Greg Diamos Lynn He Douwe Kiela David Jurado David Kanter et\u00a0al. 2022. DataPerf: Benchmarks for Data-Centric AI Development. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2207.10062 (2022)."},{"key":"e_1_3_3_2_33_2","volume-title":"International Conference on Learning Representations","author":"Mishra Nikhil","year":"2018","unstructured":"Nikhil Mishra, Mostafa Rohaninejad, Xi Chen, and Pieter Abbeel. 2018. A Simple Neural Attentive Meta-Learner. In International Conference on Learning Representations."},{"key":"e_1_3_3_2_34_2","volume-title":"Advances in Neural Information Processing Systems","author":"Oreshkin Boris","year":"2018","unstructured":"Boris Oreshkin, Pau Rodr\u00edguez\u00a0L\u00f3pez, and Alexandre Lacoste. 2018. TADAM: Task dependent adaptive metric for improved few-shot learning. In Advances in Neural Information Processing Systems, Vol.\u00a031."},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS48705.2020.9074460"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"crossref","unstructured":"Claudia Peersman Christian Schulze Awais Rashid Margaret Brennan and Carl Fischer. 2016. iCOP: Live forensics to reveal previously unknown criminal media on P2P networks. Digital Investigation 18 (2016) 50\u201364.","DOI":"10.1016\/j.diin.2016.07.002"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2010.74"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2012.71"},{"key":"e_1_3_3_2_39_2","unstructured":"Neoklis Polyzotis and Matei Zaharia. 2021. What Can Data-Centric AI Learn from Data and ML Engineering? arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2112.06439 (2021)."},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00822"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206537"},{"key":"e_1_3_3_2_42_2","volume-title":"International conference on learning representations","author":"Ravi Sachin","year":"2016","unstructured":"Sachin Ravi and Hugo Larochelle. 2016. Optimization as a model for few-shot learning. In International conference on learning representations."},{"key":"e_1_3_3_2_43_2","volume-title":"International Conference on Learning Representations","author":"Rusu Andrei\u00a0A.","year":"2019","unstructured":"Andrei\u00a0A. Rusu, Dushyant Rao, Jakub Sygnowski, Oriol Vinyals, Razvan Pascanu, Simon Osindero, and Raia Hadsell. 2019. Meta-Learning with Latent Embedding Optimization. In International Conference on Learning Representations."},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7026079"},{"key":"e_1_3_3_2_45_2","volume-title":"International Conference on Learning Representations","author":"Satorras Victor\u00a0Garcia","year":"2018","unstructured":"Victor\u00a0Garcia Satorras and Joan\u00a0Bruna Estrach. 2018. Few-Shot Learning with Graph Neural Networks. In International Conference on Learning Representations."},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"crossref","unstructured":"Christoph Schr\u00f6er Felix Kruse and Jorge\u00a0Marx G\u00f3mez. 2021. A Systematic Literature Review on Applying CRISP-DM Process Model. Procedia Computer Science 181 (2021) 526\u2013534.","DOI":"10.1016\/j.procs.2021.01.199"},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/2578726.2578772"},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"crossref","unstructured":"Hongje Seong Junhyuk Hyun and Euntai Kim. 2020. Fosnet: An end-to-end trainable deep neural network for scene recognition. IEEE Access 8 (2020) 82066\u201382077.","DOI":"10.1109\/ACCESS.2020.2989863"},{"key":"e_1_3_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.5555\/946247.946751"},{"key":"e_1_3_3_2_50_2","volume-title":"Advances in Neural Information Processing Systems","author":"Snell Jake","year":"2017","unstructured":"Jake Snell, Kevin Swersky, and Richard Zemel. 2017. Prototypical Networks for Few-shot Learning. In Advances in Neural Information Processing Systems, Vol.\u00a030."},{"key":"e_1_3_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.02588"},{"key":"e_1_3_3_2_52_2","doi-asserted-by":"crossref","unstructured":"Clare Strickland Juliane\u00a0A Kloess and Michael Larkin. 2023. An exploration of the personal experiences of digital forensics analysts who work with child sexual abuse material on a daily basis:\u201cyou cannot unsee the darker side of life\u201d. Frontiers in Psychology 14 (2023) 1142106.","DOI":"10.3389\/fpsyg.2023.1142106"},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533073"},{"key":"e_1_3_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00131"},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/3469096.3469867"},{"key":"e_1_3_3_2_56_2","unstructured":"U. K. Her Majesty\u2019s Government. 2021. Tackling Child Sexual Abuse Strategy."},{"key":"e_1_3_3_2_57_2","doi-asserted-by":"crossref","unstructured":"Pedro H.\u00a0V. Valois Jo\u00e3o Macedo Leo S.\u00a0F. Ribeiro Jefersson\u00a0A. dos Santos and Sandra Avila. 2025. Leveraging Self-Supervised Learning for Scene Classification in Child Sexual Abuse Imagery. Forensic Science International: Digital Investigation (2025).","DOI":"10.1016\/j.fsidi.2025.301918"},{"key":"e_1_3_3_2_58_2","unstructured":"Laurens vd Maaten and Geoffrey Hinton. 2008. Visualizing data using t-sne. Journal of machine learning research 9 (2008) 2579\u20132605."},{"key":"e_1_3_3_2_59_2","unstructured":"Oriol Vinyals Charles Blundell Timothy Lillicrap Koray Kavukcuoglu and Daan Wierstra. 2016. Matching networks for one shot learning. Advances in Neural Information Processing Systems 29 (2016) 3630\u20133638."},{"key":"e_1_3_3_2_60_2","doi-asserted-by":"crossref","unstructured":"Paulo Vitorino Sandra Avila Mauricio Perez and Anderson Rocha. 2018. Leveraging Deep Neural Networks to Fight Child Pornography in the Age of Social Media. Journal of Visual Communication and Image Representation 50 (2018) 303\u2013313.","DOI":"10.1016\/j.jvcir.2017.12.005"},{"key":"e_1_3_3_2_61_2","first-page":"129","volume-title":"XII Workshop de Vis\u00e3o Computational","author":"Vitorino Paulo","year":"2016","unstructured":"Paulo Vitorino, Sandra Avila, and Anderson Rocha. 2016. A Two-tier Image Representation Approach to Detecting Child Pornography. In XII Workshop de Vis\u00e3o Computational. 129\u2013134."},{"key":"e_1_3_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2012.25"},{"key":"e_1_3_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5539970"},{"key":"e_1_3_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00883"},{"key":"e_1_3_3_2_65_2","unstructured":"Andrew Young Stuart Campo and Stefaan Verhulst. 2019. Responsible Data for Children: Synthesis Report. (2019)."},{"key":"e_1_3_3_2_66_2","unstructured":"Daochen Zha Zaid\u00a0Pervaiz Bhat Kwei-Herng Lai Fan Yang Zhimeng Jiang Shaochen Zhong and Xia Hu. 2023. Data-Centric Artificial Intelligence: A Survey. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2303.10158 (2023)."},{"key":"e_1_3_3_2_67_2","unstructured":"Wanrong Zhang Olga Ohrimenko and Rachel Cummings. 2021. Attribute Privacy: Framework and Mechanisms. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2009.04013 (2021)."},{"key":"e_1_3_3_2_68_2","doi-asserted-by":"crossref","unstructured":"Bolei Zhou Agata Lapedriza Aditya Khosla Aude Oliva and Antonio Torralba. 2017. Places: A 10 million image database for scene recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence 40 6 (2017) 1452\u20131464.","DOI":"10.1109\/TPAMI.2017.2723009"}],"event":{"name":"FAccT '25: The 2025 ACM Conference on Fairness, Accountability, and Transparency","acronym":"FAccT '25","location":"Athens Greece"},"container-title":["Proceedings of the 2025 ACM Conference on Fairness, Accountability, and Transparency"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3715275.3732102","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T11:05:04Z","timestamp":1750763104000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3715275.3732102"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,23]]},"references-count":67,"alternative-id":["10.1145\/3715275.3732102","10.1145\/3715275"],"URL":"https:\/\/doi.org\/10.1145\/3715275.3732102","relation":{},"subject":[],"published":{"date-parts":[[2025,6,23]]},"assertion":[{"value":"2025-06-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}