Echizen: Framework based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing, Proceedings of 2013 IEEE International Conference on Systems, Man and Cybernetics, pp.455-461, 2013. ,
DOI : 10.1109/smc.2013.83
Venkatasubramanian: Privacy Protecting Data Collection in Media Spaces, Proceedings of the 12th annual ACM international conference on Multimedia, pp.48-55, 2004. ,
DOI : 10.1145/1027527.1027537
Privacy.tag, Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems, SenSys '14, pp.163-176, 2014. ,
DOI : 10.1145/2393347.2396460
URL : https://hal.archives-ouvertes.fr/hal-01377991
Mislove: Understanding and Specifying Social Access Control Lists, Proceedings of the Tenth Symposium On Usable Privacy and Security, pp.271-283, 2014. ,
The post that wasn't, Proceedings of the 2013 conference on Computer supported cooperative work, CSCW '13, pp.793-802, 2013. ,
DOI : 10.1145/2441776.2441865
Privacy Perceptions of Photo Sharing in Facebook, Proceedings of the Fourth Symposium on Usable Privacy and Security, 2008. ,
The Modern Day Baby Book, Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, CSCW '15, pp.1302-1312, 2015. ,
DOI : 10.1007/s00779-009-0218-7
Krishnamurthi: Oops, I did it again: mitigating repeated access control errors on facebook, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp.2295-2304, 2011. ,
Analysis of Facebook Friends Using Disclosure Level, 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp.471-474, 2014. ,
DOI : 10.1109/IIH-MSP.2014.124
"i read my Twitter the next morning and was astonished", Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '13, pp.3277-3286, 2013. ,
DOI : 10.1145/2470654.2466448
"I regretted the minute I pressed share", Proceedings of the Seventh Symposium on Usable Privacy and Security, SOUPS '11, p.10, 2011. ,
DOI : 10.1145/2078827.2078841
SnapMe if you can, Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, WiSec '13, pp.95-106, 2013. ,
DOI : 10.1145/2462096.2462113
A semantic context-aware privacy model for faceblock, Proceedings of the 2nd International Conference on Society , Privacy and the Semantic Web -Policy and Technology, pp.64-72, 2014. ,
Understanding OSN-based facial disclosure against face authentication systems, Proceedings of the 9th ACM symposium on Information, computer and communications security, ASIA CCS '14, pp.413-424, 2014. ,
DOI : 10.1145/2590296.2590315
Höppner: Offlinetags: a novel privacy approach to online photo sharing, Proceedings of CHI '14 Extended Abstracts on Human Factors in Computing Systems, pp.2179-2184, 2014. ,
What We Instagram: A First Analysis of Instagram Photo Content and User Types, Proceedings of the 8th International AAAI Conference on Weblogs and Social Media, 2014. ,
The Hidden Dimension, Leonardo, vol.6, issue.1, 1966. ,
DOI : 10.2307/1572461
Do not share!, Proceedings of the 1st ACM MobiCom workshop on Visible light communication systems, VLCS '14, pp.39-44, 2014. ,
DOI : 10.1145/2643164.2643168
Robust Real-Time Face Detection, International Journal of Computer Vision, vol.57, issue.2, pp.137-154, 2004. ,
DOI : 10.1023/B:VISI.0000013087.49260.fb
URL : http://csdl.computer.org/comp/proceedings/iccv/2001/1143/02/114320747.pdf