《工程(英文)》 >> 2018年 第4卷 第1期 doi: 10.1016/j.eng.2018.02.003
照片分享服务中的人际关系印象管理
a State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
b School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China
下一篇 上一篇
摘要
参考文献
[ 1 ] Hu H, Ahn GJ, Jorgensen J. Multiparty access control for online social networks: Model and mechanisms. IEEE Trans Knowl Data Eng 2013;25(7):1614–27. 链接1
[ 2 ] Zerr S, Siersdorfer S, Hare J, Demidova E. Privacy-aware image classification and search. In: Proceedings of the 35th International ACM SIGIR Conference on Research and Development in Information Retrieval; 2012 Aug 12–16; Portland, OR, USA; 2012. p. 35–44.
[ 3 ] Tran L, Kong D, Jin H, Liu J. Privacy-CNH: A framework to detect photo privacy with convolutional neural network using hierarchical features. In: Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence; 2016 Feb 12–17; Phoenix, AZ, USA; 2016. p. 1317–23. 链接1
[ 4 ] Tonge AK, Caragea C. Image privacy prediction using deep features. In: Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence; 2016 Feb 12–17; Phoenix, AZ, USA; 2016. p. 4266–7. 链接1
[ 5 ] Xu K, Guo Y, Guo L, Fang Y, Li X. My privacy my decision: Control of photo sharing on online social networks. IEEE Trans Depend Secure Comput 2015;14 (2):199–210. 链接1
[ 6 ] Ilia P, Polakis I, Athanasopoulos E, Maggi F, Ioannidis S. Face/off: Preventing privacy leakage from photos in social networks. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security; 2015 Oct 12–16; Denver, CO, USA; 2015. p. 35–44. 链接1
[ 7 ] Besmer A, Lipford HR. Moving beyond untagging: photo privacy in a tagged world. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems; 2010 Apr 10–15; Atlanta, GA, USA; 2010. p. 1563–72. 链接1
[ 8 ] Klemperer P, Liang Y, Mazurek M, Sleeper M, Ur B, Bauer L, et al. Tag, you can see it! Using tags for access control in photo sharing. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems; 2012 May 5–10; Austin, TX, USA; 2012. p. 377–86. 链接1
[ 9 ] Hoyle R, Templeman R, Anthony D, Crandall D, Kapadia A. Sensitive lifelogs: Aprivacy analysis of photos from wearable cameras. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems; 2015 Apr 18–23; Seoul, Korea; 2015. p. 1645–8. 链接1
[10] Yang Y, Ramanan D. Articulated pose estimation using flexible mixtures of parts. In: Proceedings of the 2011 IEEE Conference on Computer Vision and Pattern Recognition; 2011 Jun 20–25; Colorado Springs, CO, USA; 2011. p. 1385–92. 链接1
[11] Yang Y, Baker S, Kannan A, Ramanan D. Recognizing proxemics in personal photos. In: Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition; 2012; Jun 16–21; Providence, RI, USA; 2012. p. 3522–9. 链接1
[12] Fathi A, Hodgins JK, Rehg JM. Social interactions: A first-person perspective. In: Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition; 2012 Jun 16–21; Providence, RI, USA; 2012. p. 1226–33. 链接1
[13] Chakraborty I, Cheng H, Javed O. 3D visual proxemics: Recognizing human interactions in 3D from a single image. In: Proceedings of the 2013 IEEE Conference on Computer Vision and Pattern Recognition; 2013 Jun 23–28; Portland, OR, USA; 2013. p. 3406–13.
[14] Liu B, Gould S, Koller D. Single image depth estimation from predicted semantic labels. In: Proceedings of the 2010 IEEE Conference on Computer Vision and Pattern Recognition; 2010 Jun 13–18; San Francisco, CA, USA; 2010. 链接1
[15] Fesnin A, Gouet-Brunet V, Kominen S, Oria V, Sun J. Towards a privacy preserving personal photo album manager with semantic classification, indexing and querying capabilities. In: Proceedings of the 19th ACM International Conference on Multimedia; 2011 Nov 28–Dec 1; Scottsdale, AZ, USA; 2011. p. 835–6. 链接1
[16] Yang M, Yu Y, Bandara AK, Nuseibeh B. Adaptive sharing for online social networks: a trade-off between privacy risk and social benefit. In: Proceedings of the 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications; 2014 Sep 24–26; Beijing, China; 2014. p. 45–52. F. Li et al. / Engineering 4 (2018) 85–93 链接1
[17] Pang J, Zhang Y. A new access control scheme for facebook-style social networks. Comput Secur 2015;54:44–59. 链接1
[18] Palomar E, Gonzalez-Manzano L, Alcaide A, Galán Á. Implementing a privacy-enhanced attribute-based credential system for online social networks with co-ownership management. IET Inf Secur 2016;10(2):60–8. 链接1
[19] Squicciarini AC, Lin D, Sundareswaran S, Wede J. Privacy policy inference of user-uploaded images on content sharing sites. IEEE Trans Knowl Data Eng 2015;27(1):193–206. 链接1
[20] Kairam S, Kaye J, Guerra-Gomez JA, Shamma DA. Snap decisions? How users, content, and aesthetics interact to shape photo sharing behaviors. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems; 2016 May 7–12; San Jose, CA, USA; 2016. p. 113–24. 链接1
[21] Ni M, Zhang Y, Han W, Pang J. An empirical study on user access control in online social networks. In: Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies; 2016 Jun 6–8; Shanghai, China; 2016. p. 13–23. 链接1
[22] Goffman E. The presentation of self in everyday life. New York: Doubleday; 1959.
[23] Hall ET. The hidden dimension. New York: Doubleday; 1966.
[24] Besmer A, Lipford HR. Privacy perceptions of photo sharing in facebook. In: Proceedings of the Symposium on Usable Privacy and Security; 2008 Jul 23– 25; Pittsburgh, PA, USA; 2008. 链接1
[25] McAndrew FT, Jeong HS. Who does what on facebook? Age, sex, and relationship status as predictors of facebook use. Comput Human Behav 2012;28(6):2359–65. 链接1
[26] Fan H, Yang M, Cao Z, Jiang Y, Yin Q. Learning compact face representation: packing a face into an int32. In: Proceedings of the 22nd ACM International Conference on Multimedia; 2014 Nov 3–7; Orlando, FL, USA; 2014. p. 933–6. 链接1
[27] Hu H, Ahn GJ, Zhao Z, Yang D. Game theoretic analysis of multiparty access control in online social networks. In: Proceedings of the 19th ACM symposium on Access Control Models and Technologies; 2014 Jun 25–7; London, ON, Canada; 2014. p. 93–102. 链接1
[28] Taigman Y, Yang M, Ranzato M, Wolf L. Deepface: Closing the gap to human-level performance in face verification. In: Proceedings of the 2014 IEEE Conference on Computer Vision and Pattern Recognition; 2014 Jun 23–28; Columbus, OH, USA; 2014. p. 1701–8. 链接1