• Zhao C and Caragea C. (2023). Deep Gated Multi-modal Fusion for Image Privacy Prediction. ACM Transactions on the Web. 17:4. (1-24). Online publication date: 30-Nov-2023.

    https://doi.org/10.1145/3608446

  • Elagroudy P, Khamis M, Mathis F, Irmscher D, Sood E, Bulling A and Schmidt A. Impact of Privacy Protection Methods of Lifelogs on Remembered Memories. Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems. (1-10).

    https://doi.org/10.1145/3544548.3581565

  • Carvalho M, Ennaffi O, Chateau S and Bachir S. On the Design of Privacy-Aware Cameras: A Study on Deep Neural Networks. Computer Vision – ECCV 2022 Workshops. (223-237).

    https://doi.org/10.1007/978-3-031-25075-0_17

  • Hayes B, Barn R, Watling D and James A. (2022). Adolescent Perceptions of the Risks and Benefits of Social Networking Site Use. International Journal of Cyber Behavior, Psychology and Learning. 12:1. (1-22). Online publication date: 5-Aug-2022.

    https://doi.org/10.4018/IJCBPL.306646

  • Stangl A, Shiroma K, Davis N, Xie B, Fleischmann K, Findlater L and Gurari D. (2022). Privacy Concerns for Visual Assistance Technologies. ACM Transactions on Accessible Computing. 15:2. (1-43). Online publication date: 30-Jun-2022.

    https://doi.org/10.1145/3517384

  • Khamis M, Farzand H, Mumm M and Marky K. DeepFakes for Privacy: Investigating the Effectiveness of State-of-the-Art Privacy-Enhancing Face Obfuscation Methods. Proceedings of the 2022 International Conference on Advanced Visual Interfaces. (1-5).

    https://doi.org/10.1145/3531073.3531125

  • Stangl A, Shiroma K, Xie B, Fleischmann K and Gurari D. (2020). Visual Content Considered Private by People Who are Blind ASSETS '20: The 22nd International ACM SIGACCESS Conference on Computers and Accessibility. 10.1145/3373625.3417014. 9781450371032. (1-12). Online publication date: 26-Oct-2020.

    https://dl.acm.org/doi/10.1145/3373625.3417014

  • Tonge A and Caragea C. (2020). Image Privacy Prediction Using Deep Neural Networks. ACM Transactions on the Web. 14:2. (1-32). Online publication date: 19-Apr-2020.

    https://doi.org/10.1145/3386082

  • Zhong H, Li H, Squicciarini A, Rajtmajer S and Miller D. (2019). Toward Image Privacy Classification and Spatial Attribution of Private Content 2019 IEEE International Conference on Big Data (Big Data). 10.1109/BigData47090.2019.9006510. 978-1-7281-0858-2. (1351-1360).

    https://ieeexplore.ieee.org/document/9006510/

  • Tonge A and Caragea C. (2019). Privacy-aware Tag Recommendation for Accurate Image Privacy Prediction. ACM Transactions on Intelligent Systems and Technology. 10:4. (1-28). Online publication date: 31-Jul-2019.

    https://doi.org/10.1145/3335054

  • Tonge A and Caragea C. Dynamic Deep Multi-modal Fusion for Image Privacy Prediction. The World Wide Web Conference. (1829-1840).

    https://doi.org/10.1145/3308558.3313691

  • Elagroudy P, Khamis M, Mathis F, Irmscher D, Bulling A and Schmidt A. Can Privacy-Aware Lifelogs Alter Our Memories?. Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. (1-6).

    https://doi.org/10.1145/3290607.3313052

  • Malekhosseini R, Hosseinzadeh M and Navi K. (2018). An investigation into the requirements of privacy in social networks and factors contributing to users’ concerns about violation of their privacy. Social Network Analysis and Mining. 10.1007/s13278-018-0518-x. 8:1. Online publication date: 1-Dec-2018.

    http://link.springer.com/10.1007/s13278-018-0518-x

  • Keerthi Chandra D, Chowgule W, Fu Y and Lin D. (2018). RIPA: Real-Time Image Privacy Alert System 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC). 10.1109/CIC.2018.00029. 978-1-5386-9502-9. (136-145).

    https://ieeexplore.ieee.org/document/8537827/

  • Hu X, Hu D, Zheng S, Li W, Chen F, Shu Z and Wang L. (2018). How people share digital images in social networks. Multimedia Tools and Applications. 77:14. (18163-18185). Online publication date: 1-Jul-2018.

    https://doi.org/10.1007/s11042-017-4402-x

  • Li Y, Vishwamitra N, Knijnenburg B, Hu H and Caine K. (2017). Effectiveness and Users' Experience of Obfuscation as a Privacy-Enhancing Technology for Sharing Photos. Proceedings of the ACM on Human-Computer Interaction. 1:CSCW. (1-24). Online publication date: 6-Dec-2017.

    https://doi.org/10.1145/3134702

  • Squicciarini A, Novelli A, Lin D, Caragea C and Zhong H. (2017). From Tag to Protect: A Tag-Driven Policy Recommender System for Image Sharing 2017 15th Annual Conference on Privacy, Security and Trust (PST). 10.1109/PST.2017.00047. 978-1-5386-2487-6. (337-33709).

    https://ieeexplore.ieee.org/document/8476952/

  • Mohamed R, Idalino T and Chiasson S. When private and professional lives meet. Proceedings of the 8th International Conference on Social Media & Society. (1-5).

    https://doi.org/10.1145/3097286.3097334

  • Li Y, Vishwamitra N, Knijnenburg B, Hu H and Caine K. (2017). Blur vs. Block: Investigating the Effectiveness of Privacy-Enhancing Obfuscation for Images 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). 10.1109/CVPRW.2017.176. 978-1-5386-0733-6. (1343-1351).

    http://ieeexplore.ieee.org/document/8014910/

  • Squicciarini A, Caragea C and Balakavi R. (2017). Toward Automated Online Photo Privacy. ACM Transactions on the Web. 11:1. (1-29). Online publication date: 10-Apr-2017.

    https://doi.org/10.1145/2983644

  • Watson J, Lipford H and Besmer A. (2015). Mapping User Preference to Privacy Default Settings. ACM Transactions on Computer-Human Interaction. 22:6. (1-20). Online publication date: 14-Dec-2015.

    https://doi.org/10.1145/2811257

  • Angulo J and Ortlieb M. "WTH..!?!" experiences, reactions, and expectations related to online privacy panic situations. Proceedings of the Eleventh USENIX Conference on Usable Privacy and Security. (19-38).

    /doi/10.5555/3235866.3235869

  • Squicciarini A, Lin D, Sundareswaran S and Wede J. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites. IEEE Transactions on Knowledge and Data Engineering. 10.1109/TKDE.2014.2320729. 27:1. (193-206).

    http://ieeexplore.ieee.org/document/6807800/

  • Ashok A, Nguyen V, Gruteser M, Mandayam N, Yuan W and Dana K. Do not share!. Proceedings of the 1st ACM MobiCom workshop on Visible light communication systems. (39-44).

    https://doi.org/10.1145/2643164.2643168

  • Squicciarini A, Caragea C and Balakavi R. Analyzing images' privacy for the modern web. Proceedings of the 25th ACM conference on Hypertext and social media. (136-147).

    https://doi.org/10.1145/2631775.2631803

  • Wang Y, Leon P, Acquisti A, Cranor L, Forget A and Sadeh N. A field trial of privacy nudges for facebook. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. (2367-2376).

    https://doi.org/10.1145/2556288.2557413

  • Lanagan J and Smeaton A. (2012). Video digital libraries. International Journal on Digital Libraries. 12:4. (159-178). Online publication date: 1-Sep-2012.

    https://doi.org/10.1007/s00799-012-0078-z

  • Watson J, Besmer A and Lipford H. +Your circles. Proceedings of the Eighth Symposium on Usable Privacy and Security. (1-9).

    https://doi.org/10.1145/2335356.2335373

  • Wu A and Zhang X. Temporal sensitivity for location disclosure through mobile photo-sharing. Proceedings of the 1st international workshop on Mobile location-based service. (67-70).

    https://doi.org/10.1145/2025876.2025890

  • Wang Y, Norcie G, Komanduri S, Acquisti A, Leon P and Cranor L. "I regretted the minute I pressed share". Proceedings of the Seventh Symposium on Usable Privacy and Security. (1-16).

    https://doi.org/10.1145/2078827.2078841

  • Squicciarini A, Sundareswaran S, Lin D and Wede J. A3P. Proceedings of the 22nd ACM conference on Hypertext and hypermedia. (261-270).

    https://doi.org/10.1145/1995966.1996000

  • Squicciarini A, Xu H and Zhang X. (2011). CoPE: Enabling collaborative privacy management in online social networks. Journal of the American Society for Information Science and Technology. 62:3. (521-534). Online publication date: 1-Mar-2011.

    https://doi.org/10.1002/asi.21473

  • Sarvas R and Frohlich D. (2011). Digital Photo Adoption. From Snapshots to Social Media - The Changing Picture of Domestic Photography. 10.1007/978-0-85729-247-6_6. (103-137).

    http://link.springer.com/10.1007/978-0-85729-247-6_6

  • Wang Y and Kobsa A. Privacy in Online Social Networking at Workplace. Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 04. (975-978).

    https://doi.org/10.1109/CSE.2009.438

  • Lipford H, Hull G, Latulipe C, Besmer A and Watson J. Visible Flows. Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 04. (985-989).

    https://doi.org/10.1109/CSE.2009.241