E. Ayday, M. Humbert10, ]. F. Beato, I. Ion, S. Capkun et al., Inference attacks against kin genomic privacy For some eyes only: protecting online information sharing Collaborative joint content sharing for online social networks, Proc. of CODASPY. ACM, 2013. [11] Proc. of PERCOM, 2014.

A. Besmer, H. Richter-lipford13, ]. G. Bicz, ?. A?k, and P. H. Chia, Moving beyond untagging, Proceedings of the 28th international conference on Human factors in computing systems, CHI '10, 2010.
DOI : 10.1145/1753326.1753560

R. Bost, R. A. Popa, S. Tu, and S. Goldwasser, Machine Learning Classification over Encrypted Data, Proceedings 2015 Network and Distributed System Security Symposium, 2015.
DOI : 10.14722/ndss.2015.23241

URL : http://eprint.iacr.org/2014/331.pdf

H. Cho and A. Filippova, Networked Privacy Management in Facebook: A Mixed-Methods and Multinational Study, Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, CSCW '16, 2016.
DOI : 10.1016/j.chb.2014.03.010

E. De-cristofaro, C. Soriente, G. Tsudik, and A. Williams, Hummingbird: Privacy at the Time of Twitter, 2012 IEEE Symposium on Security and Privacy, 2012.
DOI : 10.1109/SP.2012.26

R. Dey, C. Tang, K. Ross, and N. Saxena, Estimating age privacy leakage in online social networks, 2012 Proceedings IEEE INFOCOM, 2012.
DOI : 10.1109/INFCOM.2012.6195711

URL : http://cis.poly.edu/~ratan/facebookusersagepapershort.pdf

S. Egelman, M. Harbach, and E. Peer, Behavior Ever Follows Intention?, Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, CHI '16, 2016.
DOI : 10.1016/j.ijhcs.2013.09.002

URL : http://dl.acm.org/ft_gateway.cfm?id=2858265&type=pdf

S. Egelman and E. Peer, Scaling the Security Wall, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI '15, 2015.
DOI : 10.1080/10705519609540042

A. J. Feldman, A. Blankstein, M. J. Freedman, and E. W. Felten, Social networking with frientegrity: privacy and integrity with an untrusted provider, Proc. of USENIX, 2012.

A. Frome, G. Cheung, A. Abdulkader, M. Zennaro, B. Wu et al., Large-scale privacy protection in Google Street View, 2009 IEEE 12th International Conference on Computer Vision, 2009.
DOI : 10.1109/ICCV.2009.5459413

S. Gnesi, I. Matteucci, C. Moiso, P. Mori, M. Petrocchi et al., My Data, Your Data, Our Data: Managing Privacy Preferences in Multiple Subjects Personal Data, Proc. of APF, 2014.
DOI : 10.1007/978-3-319-06749-0_11

N. S. Good, Designing for informed consent: A multi-domain, interdisciplinary analysis of the technological means to provide informed consent, in order to manage users' privacy and security, 2008.

Y. Guo, L. Zhang, and X. Chen, Collaborative privacy management, Proceedings of the ACM MobiCom workshop on Security and privacy in mobile environments, SPME '14, 2014.
DOI : 10.1145/2646584.2646590

J. He, B. Liu, D. Kong, X. Bao, N. Wang et al., PUPPIES: Transformation-Supported Personalized Privacy Preserving Partial Image Sharing, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp.2015-2022, 2015.
DOI : 10.1109/DSN.2016.40

C. Holz, S. Buthpitiya, and M. Knaust, Bodyprint, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI '15, 2015.
DOI : 10.1145/2207676.2208577

H. Hu and G. Ahn, Multiparty Authorization Framework for Data Sharing in Online Social Networks, Proc. of CODASPY, 2011.
DOI : 10.1007/978-3-642-22348-8_5

URL : https://hal.archives-ouvertes.fr/hal-01586571

H. Hu, G. Ahn, and J. Jorgensen, Detecting and resolving privacy conflicts for collaborative data sharing in online social networks, Proceedings of the 27th Annual Computer Security Applications Conference on, ACSAC '11, 2011.
DOI : 10.1145/2076732.2076747

G. B. Huang, M. Ramesh, T. Berg, and E. Learned-miller, Labeled faces in the wild: A database for studying face recognition in unconstrained environments, pp.7-49, 2007.

J. Hubaux, S. Katzenbeisser, and B. Malin, Genomic data privacy and security, IEEE Security & Privacy, issue.5, 2017.

M. Humbert, E. Ayday, J. Hubaux, and A. Telenti, Quantifying Interdependent Risks in Genomic Privacy, ACM Transactions on Privacy and Security, vol.20, issue.1, 2017.
DOI : 10.1186/1472-6947-15-S5-S5

P. Ilia, B. Carminati, E. Ferrari, P. Fragopoulou, and S. Ioannidis, SAMPAC, Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, CODASPY '17, 2017.
DOI : 10.1109/ACSAC.2009.46

P. Ilia, I. Polakis, E. Athanasopoulos, F. Maggi, and S. Ioannidis, Face/Off, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, 2015.
DOI : 10.1109/INFCOMW.2014.6849291

H. Jia and H. Xu, Autonomous and Interdependent, Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, CHI '16, 2016.
DOI : 10.1016/j.chb.2014.03.010

H. Jégou, R. Tavenard, M. Douze, and L. Amsaleg, Searching in one billion vectors: Re-rank with source coding, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2011.
DOI : 10.1109/ICASSP.2011.5946540

P. G. Kelley, Conducting usable privacy & security studies with amazon's mechanical turk, Proc. of SOUPS, 2010.

A. Lampinen, V. Lehtinen, A. Lehmuskallio, and S. Tamminen, We're in it together, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, 2011.
DOI : 10.1145/1978942.1979420

F. Li, J. Yu, L. Zhang, Z. Sun, and M. Lv, A Privacy-Preserving Method for Photo Sharing in Instant Message Systems, Proceedings of the 2017 International Conference on Cryptography, Security and Privacy , ICCSP '17, 2017.
DOI : 10.1145/3058060.3058081

C. Mallauran, J. Dugelay, F. Perronnin, and C. Garcia, Online face detection and user authentication, Proceedings of the 13th annual ACM international conference on Multimedia , MULTIMEDIA '05, 2005.
DOI : 10.1145/1101149.1101185

A. Mislove, B. Viswanath, K. P. Gummadi, and P. Druschel, You are who you know, Proceedings of the third ACM international conference on Web search and data mining, WSDM '10, 2010.
DOI : 10.1145/1718487.1718519

L. Muda, M. Begam, and I. Elamvazuthi, Voice recognition algorithms using mel frequency cepstral coefficient (mfcc) and dynamic time warping (dtw) techniques, 2010.

J. Määttä, A. Hadid, and M. Pietikäinen, Face spoofing detection from single images using texture and local shape analysis, IET biometrics, 2012.

A. Nguyen, J. Yosinski, and J. Clune, Deep neural networks are easily fooled: High confidence predictions for unrecognizable images, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015.
DOI : 10.1109/CVPR.2015.7298640

URL : http://yosinski.com/media/papers/Nguyen__2014__arXiv__Deep_Neural_Networks_are_Easily_Fooled.pdf

K. Niinuma and A. K. Jain, Continuous user authentication using temporal information, Biometric Technology for Human Identification VII, 2010.
DOI : 10.1117/12.847886

URL : http://biometrics.cse.msu.edu/Publications/Face/NiinumaJain_ContinuousAuth_SPIE10.pdf

H. Nissenbaum, Privacy in context: Technology, policy, and the integrity of social life, 2009.

K. Olejnik, I. Dacosta, J. Soares-machado, K. Huguenin, M. E. Khan et al., SmarPer: Context-Aware and Automatic Runtime-Permissions for Mobile Devices, 2017 IEEE Symposium on Security and Privacy (SP), 2017.
DOI : 10.1109/SP.2017.25

URL : https://hal.archives-ouvertes.fr/hal-01489684

A. Olteanu, K. Huguenin, R. Shokri, M. Humbert, and J. Hubaux, Quantifying Interdependent Privacy Risks with Location Data, IEEE Transactions on Mobile Computing, vol.16, issue.3, 2017.
DOI : 10.1109/TMC.2016.2561281

URL : https://hal.archives-ouvertes.fr/hal-01266229

A. Ratikan and M. Shikida, Privacy protection based privacy conflict detection and solution in online social networks Revenge porn - the ugly side of social media Online, https://www.thetimes.co.uk/article/ its-destroying-the-lives-of-17-year-olds Revenge porn: Image-based abuse hits one in five Australians Military women ask Facebook to do more to stop revenge porn, Proc. of HAS, 2014.

D. A. Reynolds, An overview of automatic speaker recognition technology, Proc. of ICASSP, 2002.
DOI : 10.1109/icassp.2002.1004813

J. Ross, L. Irani, M. Silberman, A. Zaldivar, and B. Tomlinson, Who are the crowdworkers?, Proceedings of the 28th of the international conference extended abstracts on Human factors in computing systems, CHI EA '10, 2010.
DOI : 10.1145/1753846.1753873

S. R. Savage, Characterizing the Risks and Harms of Linking Genomic Information to Individuals, IEEE Security & Privacy, vol.15, issue.5, 2017.
DOI : 10.1109/MSP.2017.3681064

F. Schroff, D. Kalenichenko, and J. Philbin, FaceNet: A unified embedding for face recognition and clustering, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015.
DOI : 10.1109/CVPR.2015.7298682

URL : http://arxiv.org/abs/1503.03832

A. Sotirakopoulos, K. Hawkey, and K. Beznosov, On the challenges in usable security lab studies, Proceedings of the Seventh Symposium on Usable Privacy and Security, SOUPS '11, 2011.
DOI : 10.1145/2078827.2078831

A. C. Squicciarini, M. Shehab, and J. Wede, Privacy policies for shared content in social network sites, Proc. of VLDB, 2010.
DOI : 10.1007/s00778-010-0193-7

A. C. Squicciarini, M. Shehab, and F. Paci, Collective privacy management in social networks, Proceedings of the 18th international conference on World wide web, WWW '09, 2009.
DOI : 10.1145/1526709.1526780

URL : http://www.sis.uncc.edu/%7Emshehab/papers/www09.pdf

J. M. Such and N. Criado, Resolving Multi-Party Privacy Conflicts in Social Media, IEEE Transactions on Knowledge and Data Engineering, vol.28, issue.7, 2016.
DOI : 10.1109/TKDE.2016.2539165

URL : http://arxiv.org/pdf/1507.04642

J. M. Such, J. Porter, S. Preibusch, and A. Joinson, Photo Privacy Conflicts in Social Media, Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems , CHI '17, 2017.
DOI : 10.1002/asi.23299

Y. Taigman, M. Yang, M. Ranzato, and L. Wolf, Web-scale training for face identification, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015.
DOI : 10.1109/CVPR.2015.7298891

URL : http://arxiv.org/pdf/1406.5266.pdf

B. Thomee, D. A. Shamma, G. Friedland, B. Elizalde, K. Ni et al., YFCC100M, Communications of the ACM, vol.59, issue.2, 2016.
DOI : 10.1145/2559206.2559233

URL : http://dl.acm.org/ft_gateway.cfm?id=2812802&type=pdf

F. Tramèr, Z. Huang, J. Hubaux, and E. Ayday, Differential Privacy with Bounded Priors, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, 2015.
DOI : 10.1016/j.jbi.2014.01.008

H. Wang, X. Bao, R. R. Choudhury, and S. Nelakuditi, InSight, Proceedings of the 14th Workshop on Mobile Computing Systems and Applications, HotMobile '13, 2013.
DOI : 10.1145/2444776.2444786

URL : https://hal.archives-ouvertes.fr/hal-01286263

H. Wang, X. Bao, R. R. Choudhury, and S. Nelakuditi, Visually Fingerprinting Humans without Face Recognition, Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys '15, 2015.
DOI : 10.1145/954339.954342

P. Wijesekera, A. Baokar, L. Tsai, J. Reardon, S. Egelman et al., The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences, 2017 IEEE Symposium on Security and Privacy (SP), 2017.
DOI : 10.1109/SP.2017.51

P. Wisniewski, H. Lipford, and D. Wilson, Fighting for my space, Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, CHI '12, 2012.
DOI : 10.1145/2207676.2207761

D. J. Wu, T. Feng, M. Naehrig, and K. Lauter, Abstract, Proceedings on Privacy Enhancing Technologies, vol.28, issue.4, 2016.
DOI : 10.1515/popets-2016-0043

URL : https://hal.archives-ouvertes.fr/hal-00953003

H. Xu, Reframing privacy 2.0 in online social network, Pa. J. Const. L, 2011.

L. Yuan, Privacy-friendly photo sharing and relevant applications beyond, 2017.

L. Yuan and T. Ebrahimi, Image transmorphing with JPEG, 2015 IEEE International Conference on Image Processing (ICIP), 2015.
DOI : 10.1109/ICIP.2015.7351547

L. Yuan, J. Theytaz, and T. Ebrahimi, Context-dependent privacyaware photo sharing based on machine learning, Proc. of IFIP SEC, 2017.
DOI : 10.1007/978-3-319-58469-0_7

URL : https://hal.archives-ouvertes.fr/hal-01648998

M. Ziad, A. Alanwar, M. Alzantot, and M. Srivastava, CryptoImg: Privacy preserving processing over encrypted images, 2016 IEEE Conference on Communications and Network Security (CNS), 2016.
DOI : 10.1109/CNS.2016.7860550

URL : http://arxiv.org/abs/1609.00881