Inference attacks against kin genomic privacy For some eyes only: protecting online information sharing Collaborative joint content sharing for online social networks, Proc. of CODASPY. ACM, 2013. [11] Proc. of PERCOM, 2014. ,
Moving beyond untagging, Proceedings of the 28th international conference on Human factors in computing systems, CHI '10, 2010. ,
DOI : 10.1145/1753326.1753560
Machine Learning Classification over Encrypted Data, Proceedings 2015 Network and Distributed System Security Symposium, 2015. ,
DOI : 10.14722/ndss.2015.23241
URL : http://eprint.iacr.org/2014/331.pdf
Networked Privacy Management in Facebook: A Mixed-Methods and Multinational Study, Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, CSCW '16, 2016. ,
DOI : 10.1016/j.chb.2014.03.010
Hummingbird: Privacy at the Time of Twitter, 2012 IEEE Symposium on Security and Privacy, 2012. ,
DOI : 10.1109/SP.2012.26
Estimating age privacy leakage in online social networks, 2012 Proceedings IEEE INFOCOM, 2012. ,
DOI : 10.1109/INFCOM.2012.6195711
URL : http://cis.poly.edu/~ratan/facebookusersagepapershort.pdf
Behavior Ever Follows Intention?, Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, CHI '16, 2016. ,
DOI : 10.1016/j.ijhcs.2013.09.002
URL : http://dl.acm.org/ft_gateway.cfm?id=2858265&type=pdf
Scaling the Security Wall, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI '15, 2015. ,
DOI : 10.1080/10705519609540042
Social networking with frientegrity: privacy and integrity with an untrusted provider, Proc. of USENIX, 2012. ,
Large-scale privacy protection in Google Street View, 2009 IEEE 12th International Conference on Computer Vision, 2009. ,
DOI : 10.1109/ICCV.2009.5459413
My Data, Your Data, Our Data: Managing Privacy Preferences in Multiple Subjects Personal Data, Proc. of APF, 2014. ,
DOI : 10.1007/978-3-319-06749-0_11
Designing for informed consent: A multi-domain, interdisciplinary analysis of the technological means to provide informed consent, in order to manage users' privacy and security, 2008. ,
Collaborative privacy management, Proceedings of the ACM MobiCom workshop on Security and privacy in mobile environments, SPME '14, 2014. ,
DOI : 10.1145/2646584.2646590
PUPPIES: Transformation-Supported Personalized Privacy Preserving Partial Image Sharing, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp.2015-2022, 2015. ,
DOI : 10.1109/DSN.2016.40
Bodyprint, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI '15, 2015. ,
DOI : 10.1145/2207676.2208577
Multiparty Authorization Framework for Data Sharing in Online Social Networks, Proc. of CODASPY, 2011. ,
DOI : 10.1007/978-3-642-22348-8_5
URL : https://hal.archives-ouvertes.fr/hal-01586571
Detecting and resolving privacy conflicts for collaborative data sharing in online social networks, Proceedings of the 27th Annual Computer Security Applications Conference on, ACSAC '11, 2011. ,
DOI : 10.1145/2076732.2076747
Labeled faces in the wild: A database for studying face recognition in unconstrained environments, pp.7-49, 2007. ,
Genomic data privacy and security, IEEE Security & Privacy, issue.5, 2017. ,
Quantifying Interdependent Risks in Genomic Privacy, ACM Transactions on Privacy and Security, vol.20, issue.1, 2017. ,
DOI : 10.1186/1472-6947-15-S5-S5
SAMPAC, Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, CODASPY '17, 2017. ,
DOI : 10.1109/ACSAC.2009.46
Face/Off, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, 2015. ,
DOI : 10.1109/INFCOMW.2014.6849291
Autonomous and Interdependent, Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, CHI '16, 2016. ,
DOI : 10.1016/j.chb.2014.03.010
Searching in one billion vectors: Re-rank with source coding, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2011. ,
DOI : 10.1109/ICASSP.2011.5946540
Conducting usable privacy & security studies with amazon's mechanical turk, Proc. of SOUPS, 2010. ,
We're in it together, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, 2011. ,
DOI : 10.1145/1978942.1979420
A Privacy-Preserving Method for Photo Sharing in Instant Message Systems, Proceedings of the 2017 International Conference on Cryptography, Security and Privacy , ICCSP '17, 2017. ,
DOI : 10.1145/3058060.3058081
Online face detection and user authentication, Proceedings of the 13th annual ACM international conference on Multimedia , MULTIMEDIA '05, 2005. ,
DOI : 10.1145/1101149.1101185
You are who you know, Proceedings of the third ACM international conference on Web search and data mining, WSDM '10, 2010. ,
DOI : 10.1145/1718487.1718519
Voice recognition algorithms using mel frequency cepstral coefficient (mfcc) and dynamic time warping (dtw) techniques, 2010. ,
Face spoofing detection from single images using texture and local shape analysis, IET biometrics, 2012. ,
Deep neural networks are easily fooled: High confidence predictions for unrecognizable images, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015. ,
DOI : 10.1109/CVPR.2015.7298640
URL : http://yosinski.com/media/papers/Nguyen__2014__arXiv__Deep_Neural_Networks_are_Easily_Fooled.pdf
Continuous user authentication using temporal information, Biometric Technology for Human Identification VII, 2010. ,
DOI : 10.1117/12.847886
URL : http://biometrics.cse.msu.edu/Publications/Face/NiinumaJain_ContinuousAuth_SPIE10.pdf
Privacy in context: Technology, policy, and the integrity of social life, 2009. ,
SmarPer: Context-Aware and Automatic Runtime-Permissions for Mobile Devices, 2017 IEEE Symposium on Security and Privacy (SP), 2017. ,
DOI : 10.1109/SP.2017.25
URL : https://hal.archives-ouvertes.fr/hal-01489684
Quantifying Interdependent Privacy Risks with Location Data, IEEE Transactions on Mobile Computing, vol.16, issue.3, 2017. ,
DOI : 10.1109/TMC.2016.2561281
URL : https://hal.archives-ouvertes.fr/hal-01266229
Privacy protection based privacy conflict detection and solution in online social networks Revenge porn - the ugly side of social media Online, https://www.thetimes.co.uk/article/ its-destroying-the-lives-of-17-year-olds Revenge porn: Image-based abuse hits one in five Australians Military women ask Facebook to do more to stop revenge porn, Proc. of HAS, 2014. ,
An overview of automatic speaker recognition technology, Proc. of ICASSP, 2002. ,
DOI : 10.1109/icassp.2002.1004813
Who are the crowdworkers?, Proceedings of the 28th of the international conference extended abstracts on Human factors in computing systems, CHI EA '10, 2010. ,
DOI : 10.1145/1753846.1753873
Characterizing the Risks and Harms of Linking Genomic Information to Individuals, IEEE Security & Privacy, vol.15, issue.5, 2017. ,
DOI : 10.1109/MSP.2017.3681064
FaceNet: A unified embedding for face recognition and clustering, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015. ,
DOI : 10.1109/CVPR.2015.7298682
URL : http://arxiv.org/abs/1503.03832
On the challenges in usable security lab studies, Proceedings of the Seventh Symposium on Usable Privacy and Security, SOUPS '11, 2011. ,
DOI : 10.1145/2078827.2078831
Privacy policies for shared content in social network sites, Proc. of VLDB, 2010. ,
DOI : 10.1007/s00778-010-0193-7
Collective privacy management in social networks, Proceedings of the 18th international conference on World wide web, WWW '09, 2009. ,
DOI : 10.1145/1526709.1526780
URL : http://www.sis.uncc.edu/%7Emshehab/papers/www09.pdf
Resolving Multi-Party Privacy Conflicts in Social Media, IEEE Transactions on Knowledge and Data Engineering, vol.28, issue.7, 2016. ,
DOI : 10.1109/TKDE.2016.2539165
URL : http://arxiv.org/pdf/1507.04642
Photo Privacy Conflicts in Social Media, Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems , CHI '17, 2017. ,
DOI : 10.1002/asi.23299
Web-scale training for face identification, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015. ,
DOI : 10.1109/CVPR.2015.7298891
URL : http://arxiv.org/pdf/1406.5266.pdf
YFCC100M, Communications of the ACM, vol.59, issue.2, 2016. ,
DOI : 10.1145/2559206.2559233
URL : http://dl.acm.org/ft_gateway.cfm?id=2812802&type=pdf
Differential Privacy with Bounded Priors, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, 2015. ,
DOI : 10.1016/j.jbi.2014.01.008
InSight, Proceedings of the 14th Workshop on Mobile Computing Systems and Applications, HotMobile '13, 2013. ,
DOI : 10.1145/2444776.2444786
URL : https://hal.archives-ouvertes.fr/hal-01286263
Visually Fingerprinting Humans without Face Recognition, Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys '15, 2015. ,
DOI : 10.1145/954339.954342
The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences, 2017 IEEE Symposium on Security and Privacy (SP), 2017. ,
DOI : 10.1109/SP.2017.51
Fighting for my space, Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, CHI '12, 2012. ,
DOI : 10.1145/2207676.2207761
Abstract, Proceedings on Privacy Enhancing Technologies, vol.28, issue.4, 2016. ,
DOI : 10.1515/popets-2016-0043
URL : https://hal.archives-ouvertes.fr/hal-00953003
Reframing privacy 2.0 in online social network, Pa. J. Const. L, 2011. ,
Privacy-friendly photo sharing and relevant applications beyond, 2017. ,
Image transmorphing with JPEG, 2015 IEEE International Conference on Image Processing (ICIP), 2015. ,
DOI : 10.1109/ICIP.2015.7351547
Context-dependent privacyaware photo sharing based on machine learning, Proc. of IFIP SEC, 2017. ,
DOI : 10.1007/978-3-319-58469-0_7
URL : https://hal.archives-ouvertes.fr/hal-01648998
CryptoImg: Privacy preserving processing over encrypted images, 2016 IEEE Conference on Communications and Network Security (CNS), 2016. ,
DOI : 10.1109/CNS.2016.7860550
URL : http://arxiv.org/abs/1609.00881