{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:07:28Z","timestamp":1776110848201,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/cvprw.2018.00209","type":"proceedings-article","created":{"date-parts":[[2018,12,18]],"date-time":"2018-12-18T01:36:46Z","timestamp":1545097006000},"page":"1671-16716","source":"Crossref","is-referenced-by-count":12,"title":["Human Perceptions of Sensitive Content in Photos"],"prefix":"10.1109","author":[{"given":"Yifang","family":"Li","sequence":"first","affiliation":[]},{"given":"Wyatt","family":"Troutman","sequence":"additional","affiliation":[]},{"given":"Bart P.","family":"Knijnenburg","sequence":"additional","affiliation":[]},{"given":"Kelly","family":"Caine","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.63.2.111"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46478-7_31"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3078861.3078875"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.220"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996249"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2009.5459413"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1007\/978-3-540-88192-6_26","article-title":"Using data mining methods to predict personally identifiable information in emails","author":"geng","year":"2008","journal-title":"International Conference on Advanced Data Mining and Applications"},{"key":"ref13","year":"2018","journal-title":"Google street view Image acceptance & privacy policies"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173621"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.94.3.319"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702183"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813603"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2011.09.004"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858451"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPA.2012.6310454"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.2"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.398"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1179601.1179608"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526784"},{"key":"ref29","author":"sun","year":"2017","journal-title":"Natural and effective obfuscation by head inpainting"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753560"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2011.5771373"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/9780262029735.001.0001","author":"brunton","year":"2015","journal-title":"Obfuscation A User's Guide for Privacy and Protest"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240683"},{"key":"ref9","first-page":"111","article-title":"Examining social networking site behaviors: Photo sharing and impression management on facebook","volume":"6","author":"dorethy","year":"2014","journal-title":"International Review of Social Sciences and Humanities"},{"key":"ref1","author":"adams","year":"2007","journal-title":"Sharing privacy and trust issues for photo collections"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.3151331"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675149"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858417"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3134702"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2011.93"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1257\/jep.23.3.3"},{"key":"ref25","article-title":"Guide to protecting the confidentiality of personally identifiable information (pii)","author":"mccallister","year":"2010","journal-title":"Technical Report"}],"event":{"name":"2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)","location":"Salt Lake City, UT, USA","start":{"date-parts":[[2018,6,18]]},"end":{"date-parts":[[2018,6,22]]}},"container-title":["2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/8575058\/8575239\/08575370.pdf?arnumber=8575370","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T02:27:32Z","timestamp":1643250452000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/ieeexplore.ieee.org\/document\/8575370\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":33,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/cvprw.2018.00209","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}