S. Ahern, D. Eckles, N. Good, S. King, M. Naaman et al., Over-exposed?, Proceedings of the SIGCHI conference on Human factors in computing systems , CHI '07, pp.357-366, 2007.
DOI : 10.1145/1240624.1240683

A. Besmer and H. Richter-lipford, Moving beyond untagging, Proceedings of the 28th international conference on Human factors in computing systems, CHI '10, 2010.
DOI : 10.1145/1753326.1753560

J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007.
DOI : 10.1109/SP.2007.11

URL : http://www.cs.berkeley.edu/~bethenco/oakland07cpabe.ps

I. Bilogrevic, K. Huguenin, B. Agir, M. Jadliwala, M. Gazaki et al., A machine-learning based approach to privacy-aware information-sharing in mobile social networks, Pervasive and Mobile Computing, vol.25, pp.125-142, 2016.
DOI : 10.1016/j.pmcj.2015.01.006

URL : https://hal.archives-ouvertes.fr/hal-01108962

D. Castro, S. Hickson, V. Bettadapura, E. Thomaz, G. Abowd et al., Predicting daily activities from egocentric images using deep learning, Proceedings of the 2015 ACM International Symposium on Wearable Computers, ISWC '15, 2015.
DOI : 10.1007/978-3-319-10590-1_53

URL : http://www.ethomaz.com/papers/c9.pdf

L. A. Cutillo, R. Molva, and M. Onen, Privacy preserving picture sharing, Proceedings of the Fifth Workshop on Social Network Systems, SNS '12, 2012.
DOI : 10.1145/2181176.2181182

C. Elkan, The foundations of cost-sensitive learning, Proceedings of the 17th International Joint Conference on Artificial Intelligence -Volume IJCAI'01, pp.973-978, 2001.

G. Friedland and R. Sommer, Cybercasing the joint: On the privacy implications of geo-tagging, Proceedings of the 5th USENIX Conference on Hot Topics in Security. pp. 1?8. HotSec'10, USENIX Association, 2010.

M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann et al., The WEKA data mining software, ACM SIGKDD Explorations Newsletter, vol.11, issue.1, pp.10-18, 2009.
DOI : 10.1145/1656274.1656278

H. Harkous, R. Rahman, and K. Aberer, C3P: Context-Aware Crowdsourced Cloud Privacy, Privacy Enhancing Technologies, Pets 2014, pp.102-122, 2014.
DOI : 10.1007/978-3-319-08506-7_6

URL : https://infoscience.epfl.ch/record/198473/files/C3P Context-Aware Crowdsourced Cloud Privacy - Camera Ready.pdf

Y. Hu and L. M. Kambhampati, What we Instagram: A first analysis of instagram photo content and user types, Proceedings of the 8th International Conference on Weblogs and Social Media, ICWSM 2014, pp.595-598, 2014.

P. Klemperer, Y. Liang, M. Mazurek, M. Sleeper, B. Ur et al., Tag, you can see it!, Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, CHI '12, pp.377-386, 2012.
DOI : 10.1145/2207676.2207728

J. A. Pesce, D. L. Casas, G. Rauber, and V. Almeida, Privacy attacks in social media using photo tagging networks, Proceedings of the 1st Workshop on Privacy and Security in Online Social Media, PSOSM '12, pp.1-4, 2012.
DOI : 10.1145/2185354.2185358

M. R. Ra, R. Govindan, and A. Ortega, P3: Toward privacy-preserving photo sharing, Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation, pp.515-528, 2013.

I. Smith, S. Consolvo, A. Lamarca, J. Hightower, J. Scott et al., Social Disclosure of Place: From Location Technology to Communication Practices, pp.134-151, 2005.
DOI : 10.1007/11428572_9

A. Tonge and C. Caragea, Image privacy prediction using deep features, Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016.

L. Tran, D. Kong, H. Jin, and J. Liu, Privacy-cnh: A framework to detect photo privacy with convolutional neural network using hierarchical features, Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016.

A. J. Viera and J. M. Garrett, Understanding interobserver agreement: the kappa statistic, Fam Med, vol.37, issue.5, pp.360-363, 2005.

J. Wiese, P. G. Kelley, L. F. Cranor, L. Dabbish, J. I. Hong et al., Are you close with me? are you nearby?, Proceedings of the 13th international conference on Ubiquitous computing, UbiComp '11, pp.197-206, 2011.
DOI : 10.1145/2030112.2030140

L. Yuan, P. Korshunov, and T. Ebrahimi, Secure JPEG scrambling enabling privacy in photo sharing, 2015 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), pp.1-6, 2015.
DOI : 10.1109/FG.2015.7285022

L. Yuan and T. Ebrahimi, Image transmorphing with JPEG, 2015 IEEE International Conference on Image Processing (ICIP), pp.3956-3960, 2015.
DOI : 10.1109/ICIP.2015.7351547

L. Yuan, P. Korshunov, and T. Ebrahimi, Privacy-preserving photo sharing based on a secure JPEG, 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp.185-190, 2015.
DOI : 10.1109/INFCOMW.2015.7179382

L. Yuan, D. Mcnally, A. Kupcu, and T. Ebrahimi, Privacy-preserving photo sharing based on a public key infrastructure, Proc. SPIE, 2015.
DOI : 10.1117/12.2190458

URL : https://infoscience.epfl.ch/record/210903/files/spie_2015_privacy_1.pdf

S. Zerr, S. Siersdorfer, J. Hare, and E. Demidova, Privacy-aware image classification and search, Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrieval, SIGIR '12, pp.35-44, 2012.
DOI : 10.1145/2348283.2348292