2018
DOI: 10.1109/tifs.2017.2787986
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image Sharing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
56
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 185 publications
(56 citation statements)
references
References 51 publications
0
56
0
Order By: Relevance
“…Additionally, they use the outcomes of such model to identify the most suitable privacy settings and/or blur sensitive objects automatically. This framework is further improved in [24], where the authors add a clustering-based approach to also incorporate trustworthiness of users being granted to see the images in the prediction model. Contrary to the above-mentioned works, in this paper we formally define the general task of content sensitivity analysis independently from the type of data to be analyzed.…”
Section: Related Workmentioning
confidence: 99%
“…Additionally, they use the outcomes of such model to identify the most suitable privacy settings and/or blur sensitive objects automatically. This framework is further improved in [24], where the authors add a clustering-based approach to also incorporate trustworthiness of users being granted to see the images in the prediction model. Contrary to the above-mentioned works, in this paper we formally define the general task of content sensitivity analysis independently from the type of data to be analyzed.…”
Section: Related Workmentioning
confidence: 99%
“…λ > 0 is the parameter to balance the influences of the two parts. The optimal solution to Equation (15), which is denoted as Q * 0 , naturally defines an affinity relationship that implies the pairwise similarities between features. In this way, the similarity S…”
Section: Fusion With Low-rank Representationmentioning
confidence: 99%
“…Traditional methods make use of multiple features by directly concatenating them, which is oversimplified. To solve this problem, researchers also apply manifold learning to combine different types of features [14,15].…”
Section: Introductionmentioning
confidence: 99%
“…Now-a-days such social imaging is more often for recruiting employees. Considering the career networking as a part of social event, such privacy is required in social networking while recruiting or searching for jobs on various web portals [23], [24]. Furthermore, we refrain ourselves to post check those clauses and agreements to verify the privacy preservation processes.…”
Section: Introductionmentioning
confidence: 99%