pith. sign in

arxiv: 2605.10229 · v1 · submitted 2026-05-11 · 💻 cs.CV · cs.CY

VPD-100K: Towards Generalizable and Fine-grained Visual Privacy Protection

Pith reviewed 2026-05-12 03:35 UTC · model grok-4.3

classification 💻 cs.CV cs.CY
keywords visual privacy protectionfine-grained datasetVPD-100Kfrequency-enhanced detectionsensitive object annotationlive streaming privacysmall object detectionprivacy taxonomy
0
0 comments X

The pith

A 100,000-image dataset with 33 fine-grained privacy classes and a frequency module enables robust visual privacy detection.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper introduces VPD-100K, a dataset of 100,000 images annotated across four domains with 33 specific classes of sensitive visual content and more than 190,000 object instances. Existing privacy datasets are too small, coarsely labeled, and narrow in scope to handle the small objects and complex scenes common in everyday image sharing and live video. The authors add a lightweight module that processes frequency-domain signals through attention fusion and spectral gating to pick up subtle details that spatial pixel methods miss. Tests on image and streaming-video benchmarks show the combination improves detection performance. This matters because better tools could reduce accidental exposure of personal information in widely shared visual media.

Core claim

We present VPD-100K, a large-scale dataset containing 100,000 images annotated with 33 fine-grained classes organized into four primary domains—Human Presence, On-Screen Personally Identifiable Information, Physical Identifiers, and Location Indicators—along with over 190,000 object instances. Statistical properties include long-tailed class distributions, small object scales, and high visual complexity suited to unconstrained settings. We further introduce a frequency-enhanced lightweight module that applies frequency-domain attention fusion and adaptive spectral gating to capture sensitive details beyond what spatial intensity analysis provides. Experiments across diverse image and video-b

What carries the argument

The frequency-enhanced lightweight module, built from frequency-domain attention fusion and adaptive spectral gating, which shifts analysis from spatial pixels to frequency components to detect subtle privacy-sensitive patterns.

If this is right

  • Privacy detection models can now be trained on a dataset whose scale and granularity match the small-object and long-tailed statistics of real streaming video.
  • The frequency module allows detection systems to identify fine details of on-screen text, faces, and location cues that spatial-only networks overlook.
  • Applications such as live-stream moderation gain a practical path to reduce unintentional leakage across the four defined privacy domains.
  • Benchmarking privacy algorithms on VPD-100K provides a common reference that covers both still images and temporal video streams.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • If the taxonomy proves stable across cultures, the dataset could serve as a reference standard for measuring privacy leakage in new visual platforms.
  • The frequency-gating idea could be tested on related fine-detail tasks such as document redaction or medical-image anonymization.
  • Wider use of such datasets might shift industry practice toward routine privacy filtering before upload rather than after-the-fact removal.
  • A follow-up study could measure whether models trained on VPD-100K retain accuracy when the input distribution shifts to entirely new camera types or lighting conditions.

Load-bearing premise

The 33-class taxonomy accurately represents the sensitive information that appears in real unconstrained environments and the frequency module generalizes beyond the tested image and video benchmarks.

What would settle it

Train the frequency module on VPD-100K and evaluate it on a fresh collection of live-stream frames drawn from different platforms and regions; if detection recall for small or rare sensitive objects drops below current spatial baselines, the generalization claim would not hold.

Figures

Figures reproduced from arXiv: 2605.10229 by Bo Yin, Dianshu Liao, Enpu Zuo, Kaiwen Yang, Lanping Hu, Shidong Pan, Tianyi Zhang, Xiaobin Hu, Xiaoyu Sun, Yinsi Zhou.

Figure 1
Figure 1. Figure 1: The overview of our taxonomy. our fine-grained privacy taxonomy and large-scale data. • Semi-Automatic Pipeline & Challenges. To efficiently handle the massive scale of 100k images, we employ a hybrid pipeline incorporating object detection and OCR to generate initial predictions (Monteiro et al., 2023). However, this process reveals that automated models fre￾quently struggle with the fine-grained nature o… view at source ↗
Figure 2
Figure 2. Figure 2: Class frequency distribution sorted by frequency. A square root scale is applied to ensure visual readability, accounting for the inherent long-tail characteristic of such datasets. 0 500 1000 1500 2000 2500 3000 Width 0 500 1000 1500 2000 2500 3000 Height h/w ∈ [0.0, 0.6) h/w ∈ [0.6, 0.9) h/w ∈ [0.9, 1.2) h/w ∈ [1.2, 1.5) h/w ∈ [1.5, 2.0) 0 500 1000 1500 2000 2500 3000 [PITH_FULL_IMAGE:figures/full_fig_p… view at source ↗
Figure 3
Figure 3. Figure 3: Resolution scatter plots of DIPA2 (left) and our dataset (right). Each point corresponds to a single image, plotted by its width and height, and colored by aspect ratio (h/w). Compared to DIPA2, our dataset contains substantially more samples, exhibits noticeably higher overall resolution, and spans a wider range of aspect ratios. 0.00 0.05 0.10 0.15 0.20 0 5 10 Density Normalized object size Ours Dipa2 0.… view at source ↗
Figure 7
Figure 7. Figure 7: The YOLOv10 framework incorporating the frequency domain module within the Neck architecture. 3.2. Frequency-Domain Attention Fusion Module To explicitly enhance high-frequency signals during fea￾ture pyramid fusion process, we introduce the Frequency￾Domain Attention Fusion (FDAF) module into the high￾level semantic feature maps of the YOLOv10 neck. This module comprises two sub-processes: Fourier Spectra… view at source ↗
Figure 8
Figure 8. Figure 8: Visual performance of the proposed Frequency-Enhanced Mechanism [PITH_FULL_IMAGE:figures/full_fig_p007_8.png] view at source ↗
Figure 9
Figure 9. Figure 9: Privacy exposure in real-world live streaming scenarios identified by our tool. sults show that AP increases further by 2.4%, with a no￾table improvement in APS (small objects) (from 27.5% to 29.2%), which validates the hypothesis: not all frequency components are beneficial for privacy detection. LSG acts as an adaptive filter, suppressing high-frequency back￾ground noise interference while enhancing spec… view at source ↗
Figure 11
Figure 11. Figure 11: Visual performance of the proposed Frequency-Enhanced Mechanism. 13 [PITH_FULL_IMAGE:figures/full_fig_p013_11.png] view at source ↗
read the original abstract

Privacy protection has become a critical requirement in the era of ubiquitous visual data sharing, imposing higher demands on efficient and robust privacy detection algorithms. However, current robust detection models are severely hindered by the lack of comprehensive datasets. Existing privacy-oriented datasets often suffer from limited scale, coarse-grained annotations, and narrow domain coverage, failing to capture the intricate details of sensitive information in realworld environments. To bridge this gap, we present a large-scale, fine-grained Visual Privacy Dataset (VPD-100K), designed to facilitate generalized privacy detection. We establish a holistic taxonomy comprising four primary domains: Human Presence, On-Screen Personally Identifiable Information (PII), Physical Identifiers, and Location Indicators, containing 100,000 images annotated with 33 fine-grained classes and over 190,000 object instances. Statistical analysis reveals that our dataset features long-tailed distributions, small object scales, and high visual complexity. These characteristics make the dataset particularly valuable for demanding, unconstrained applications such as live streaming, where actors frequently face unintentional, realtime information leakage. Furthermore, we design an effective frequency-enhanced lightweight module consisting of frequency-domain attention fusion and adaptive spectral gating mechanism that breaks the limitations of spatial pixel intensity to better capture the subtle details of sensitive information. Extensive experiments conducted on both diverse image and streaming videos benchmarks consistently demonstrate the effectiveness of our VPD-100K dataset and the wellcurated frequency mechanism. The code and dataset are available at https://vpd-100k.github.io/.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

3 major / 2 minor

Summary. The manuscript introduces VPD-100K, a dataset of 100,000 images with 33 fine-grained classes spanning four domains (Human Presence, On-Screen PII, Physical Identifiers, Location Indicators) and over 190,000 instances, characterized by long-tailed distributions, small objects, and high complexity. It also proposes a lightweight frequency-enhanced module using frequency-domain attention fusion and adaptive spectral gating to capture subtle privacy cues beyond spatial pixel intensity. The central claim is that experiments on diverse image and streaming-video benchmarks demonstrate the effectiveness of both the dataset and module for generalizable privacy detection in unconstrained settings such as live streaming.

Significance. If the generalizability claims hold, the work would meaningfully advance visual privacy protection in computer vision by supplying a large-scale, fine-grained resource that addresses scale, annotation granularity, and domain limitations of prior datasets, together with a module that targets frequency-domain cues for small or subtle sensitive content. The dataset's statistical properties (long tail, small scales) align directly with real-world leakage risks, and the open release of code and data would support further research.

major comments (3)
  1. [Abstract and §5 (Experiments)] Abstract and §5 (Experiments): the assertion that 'extensive experiments... consistently demonstrate the effectiveness' is unsupported by any reported quantitative metrics, error bars, baseline comparisons, or training/evaluation details for the frequency module, which is load-bearing for the effectiveness claim.
  2. [§4 (Method)] §4 (Method): no ablation isolating the adaptive spectral gating or frequency-domain attention fusion from standard spatial attention is provided, so it is unclear whether reported gains derive from the proposed mechanisms or from other architectural choices.
  3. [§5 (Experiments)] §5 (Experiments): absence of cross-dataset transfer results, out-of-distribution tests on long-tail or small-object cases, or failure-mode analysis leaves the generalizability claim (beyond VPD-100K splits and the paper's specific video benchmarks) without direct support.
minor comments (2)
  1. [Abstract] Abstract contains minor formatting issues: 'wellcurated' should read 'well-curated' and 'realtime' should read 'real-time'.
  2. [§3 (Dataset)] A table explicitly listing all 33 classes with short definitions or examples would improve clarity of the taxonomy in §3.

Simulated Author's Rebuttal

3 responses · 0 unresolved

We thank the referee for the constructive and detailed feedback. We address each major comment point by point below and commit to revisions that will strengthen the empirical support for our claims.

read point-by-point responses
  1. Referee: [Abstract and §5 (Experiments)] Abstract and §5 (Experiments): the assertion that 'extensive experiments... consistently demonstrate the effectiveness' is unsupported by any reported quantitative metrics, error bars, baseline comparisons, or training/evaluation details for the frequency module, which is load-bearing for the effectiveness claim.

    Authors: We acknowledge that the current presentation of results in the abstract and §5 does not sufficiently detail quantitative metrics, error bars, baseline comparisons, or training/evaluation protocols for the frequency-enhanced module. In the revised manuscript we will expand §5 with comprehensive tables reporting mAP, precision-recall, and F1 scores (including standard deviations over multiple runs), explicit baseline comparisons, and a dedicated subsection on the training and evaluation setup for the frequency module. These additions will directly substantiate the effectiveness claims. revision: yes

  2. Referee: [§4 (Method)] §4 (Method): no ablation isolating the adaptive spectral gating or frequency-domain attention fusion from standard spatial attention is provided, so it is unclear whether reported gains derive from the proposed mechanisms or from other architectural choices.

    Authors: We agree that isolating the contributions of adaptive spectral gating and frequency-domain attention fusion is necessary. We will add a new ablation study (either in §4 or as an extension of §5) that systematically compares the full module against variants without each component and against standard spatial attention baselines, reporting the incremental gains on the same benchmarks. This will clarify the source of the observed improvements. revision: yes

  3. Referee: [§5 (Experiments)] §5 (Experiments): absence of cross-dataset transfer results, out-of-distribution tests on long-tail or small-object cases, or failure-mode analysis leaves the generalizability claim (beyond VPD-100K splits and the paper's specific video benchmarks) without direct support.

    Authors: The referee correctly notes that broader generalizability requires additional evidence beyond the current benchmarks. In the revised §5 we will include cross-dataset transfer experiments (training on VPD-100K and evaluating on external privacy datasets), targeted OOD tests on long-tailed and small-object subsets, and a failure-mode analysis section. These results will provide direct support for the generalizability claims. revision: yes

Circularity Check

0 steps flagged

No significant circularity; claims rest on new dataset collection and independent module design

full rationale

The paper collects a new VPD-100K dataset with 100,000 images and 33-class annotations from scratch and introduces a frequency-enhanced module (frequency-domain attention fusion plus adaptive spectral gating) as a standalone architectural component. No equations, fitted parameters renamed as predictions, or self-citation chains appear in the provided text that reduce the effectiveness claims to definitional equivalence or construction from the inputs themselves. Experiments on the authors' dataset plus streaming-video benchmarks constitute standard empirical validation rather than any load-bearing reduction by construction.

Axiom & Free-Parameter Ledger

0 free parameters · 0 axioms · 0 invented entities

Abstract-only review provides no explicit equations or implementation details, so no free parameters, axioms, or invented entities can be identified with certainty; the frequency-domain components are described at a conceptual level only.

pith-pipeline@v0.9.0 · 5598 in / 1173 out tokens · 47322 ms · 2026-05-12T03:35:48.129780+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Lean theorems connected to this paper

Citations machine-checked in the Pith Canon. Every link opens the source theorem in the public Lean library.

What do these tags mean?
matches
The paper's claim is directly supported by a theorem in the formal canon.
supports
The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
extends
The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
uses
The paper appears to rely on the theorem as machinery.
contradicts
The paper's claim conflicts with a theorem or certificate in the canon.
unclear
Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.

Reference graph

Works this paper leans on

102 extracted references · 102 canonical work pages

  1. [1]

    Proceedings of the 2016 ACM on international conference on multimedia retrieval , pages=

    Personalized privacy-aware image classification , author=. Proceedings of the 2016 ACM on international conference on multimedia retrieval , pages=

  2. [2]

    Proceedings of the IEEE international conference on computer vision , pages=

    Towards a visual privacy advisor: Understanding and predicting privacy risks in images , author=. Proceedings of the IEEE international conference on computer vision , pages=

  3. [3]

    Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition , pages=

    Connecting pixels to privacy and utility: Automatic redaction of private information in images , author=. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition , pages=

  4. [4]

    Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition , pages=

    Vizwiz-priv: A dataset for recognizing the presence and purpose of private visual information in images taken by blind people , author=. Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition , pages=

  5. [5]

    Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems , pages=

    Disability-first design and creation of a dataset showing private visual information collected with people who are blind , author=. Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems , pages=

  6. [6]

    Companion Proceedings of the 28th International Conference on Intelligent User Interfaces , pages=

    DIPA: An Image Dataset with Cross-cultural Privacy Concern Annotations , author=. Companion Proceedings of the 28th International Conference on Intelligent User Interfaces , pages=

  7. [7]

    2024 , journal =

    Xu, Anran and Zhou, Zhongyi and Miyazaki, Kakeru and Yoshikawa, Ryo and Hosio, Simo and Yatani, Koji , title =. 2024 , journal =

  8. [8]

    Proceedings of the International AAAI Conference on Web and Social Media , volume=

    SensitivAlert: Image Sensitivity Prediction in Online Social Networks Using Transformer-Based Deep Learning Models , author=. Proceedings of the International AAAI Conference on Web and Social Media , volume=

  9. [9]

    2025 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) , pages=

    Biv-priv-seg: Locating private content in images taken by people with visual impairments , author=. 2025 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) , pages=. 2025 , organization=

  10. [10]

    2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE) , pages=

    Characterizing sensor leaks in android apps , author=. 2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE) , pages=. 2021 , organization=

  11. [11]

    Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrieval , pages=

    Privacy-aware image classification and search , author=. Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrieval , pages=

  12. [12]

    IEEE Transactions on Information Forensics and Security , volume=

    iPrivacy: image privacy protection by identifying sensitive objects via deep multi-task learning , author=. IEEE Transactions on Information Forensics and Security , volume=. 2016 , publisher=

  13. [13]

    Proceedings of the International AAAI Conference on Web and Social Media , volume=

    Privacyalert: A dataset for image privacy prediction , author=. Proceedings of the International AAAI Conference on Web and Social Media , volume=

  14. [14]

    Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition , pages=

    Explaining models relating objects and privacy , author=. Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition , pages=

  15. [15]

    2020 25th International Conference on Pattern Recognition (ICPR) , pages=

    Privattnet: Predicting privacy risks in images using visual attention , author=. 2020 25th International Conference on Pattern Recognition (ICPR) , pages=. 2021 , organization=

  16. [16]

    Proceedings of the 13th Workshop on Privacy in the Electronic Society , pages=

    Privacy detective: Detecting private information and collective privacy behavior in a large social network , author=. Proceedings of the 13th Workshop on Privacy in the Electronic Society , pages=

  17. [17]

    arXiv preprint arXiv:2509.23680 , year=

    A First Look at Privacy Risks of Android Task-executable Voice Assistant Applications , author=. arXiv preprint arXiv:2509.23680 , year=

  18. [18]

    The 25th Privacy Enhancing Technologies Symposium , pages=

    Privacy bills of materials (pribom): A transparent privacy information inventory for collaborative privacy notice generation in mobile app development , author=. The 25th Privacy Enhancing Technologies Symposium , pages=. 2025 , organization=

  19. [19]

    Live Streaming Market Size, Share & Trends Analysis Report , year =

  20. [20]

    2025 , url =

    StreamsCharts: Platforms , author =. 2025 , url =

  21. [21]

    IEEE Transactions on Information Forensics and Security , volume=

    Personal privacy protection via irrelevant faces tracking and pixelation in video live streaming , author=. IEEE Transactions on Information Forensics and Security , volume=. 2020 , publisher=

  22. [22]

    Proceedings of the ACM SIGCOMM 2022 Conference , pages=

    Livenet: a low-latency video transport network for large-scale live streaming , author=. Proceedings of the ACM SIGCOMM 2022 Conference , pages=

  23. [23]

    I Spy: Addressing the Privacy Implications of Live Streaming Technology and the Current Inadequacies of the Law , author=. Colum. JL & Arts , volume=. 2017 , publisher=

  24. [24]

    Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision , pages=

    Liveseg: Unsupervised multimodal temporal segmentation of long livestream videos , author=. Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision , pages=

  25. [25]

    IEEE Internet of Things Journal , year=

    LiveVV: Human-Centered Live Volumetric Video Streaming System , author=. IEEE Internet of Things Journal , year=

  26. [26]

    arXiv preprint arXiv:2406.12736 , year=

    Beyond Visual Appearances: Privacy-sensitive Objects Identification via Hybrid Graph Reasoning , author=. arXiv preprint arXiv:2406.12736 , year=

  27. [27]

    2021 36th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW) , pages=

    A first look at security risks of android tv apps , author=. 2021 36th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW) , pages=. 2021 , organization=

  28. [28]

    ACM Transactions on Software Engineering and Methodology (TOSEM) , volume=

    Taming reflection: An essential step toward whole-program analysis of android apps , author=. ACM Transactions on Software Engineering and Methodology (TOSEM) , volume=. 2021 , publisher=

  29. [29]

    ACM Transactions on Software Engineering and Methodology , volume=

    Demystifying hidden sensitive operations in android apps , author=. ACM Transactions on Software Engineering and Methodology , volume=. 2023 , publisher=

  30. [30]

    arXiv preprint arXiv:2310.03256 , year=

    Toward One-Second Latency: Evolution of Live Media Streaming , author=. arXiv preprint arXiv:2310.03256 , year=

  31. [31]

    2024 , url =

    SVG Staff , title =. 2024 , url =

  32. [32]

    The Paper , year =

    The Paper , title =. The Paper , year =

  33. [33]

    I Am Concerned, But

    " I Am Concerned, But...": Streamers' Privacy Concerns and Strategies In Live Streaming Information Disclosure , author=. Proceedings of the ACM on Human-Computer Interaction , volume=. 2022 , publisher=

  34. [34]

    Data Protection in the EU , year =

  35. [35]

    Computer Optics , volume=

    MIDV-500: a dataset for identity document analysis and recognition on mobile devices in video stream , author=. Computer Optics , volume=. 2019 , publisher=

  36. [36]

    IET Intelligent Transport Systems , volume=

    An efficient and layout-independent automatic license plate recognition system based on the YOLO detector , author=. IET Intelligent Transport Systems , volume=. 2021 , publisher=

  37. [37]

    Ict Express , volume=

    Real-time license plate detection for non-helmeted motorcyclist using YOLO , author=. Ict Express , volume=. 2021 , publisher=

  38. [38]

    A Robust Real-Time Automatic License Plate Recognition Based on the

    R. A Robust Real-Time Automatic License Plate Recognition Based on the. International Joint Conference on Neural Networks (IJCNN) , volume =. 2018 , month =. doi:10.1109/IJCNN.2018.8489629 , issn =

  39. [39]

    WIDER FACE: A Face Detection Benchmark , Year =

    Yang, Shuo and Luo, Ping and Loy, Chen Change and Tang, Xiaoou , Booktitle =. WIDER FACE: A Face Detection Benchmark , Year =

  40. [40]

    arXiv preprint arXiv:2404.10518 , year=

    MobileNetV4-Universal Models for the Mobile Ecosystem , author=. arXiv preprint arXiv:2404.10518 , year=

  41. [41]

    2023 , url =

    Glenn Jocher and Ayush Chaurasia and Jing Qiu , title =. 2023 , url =

  42. [42]

    Frontiers of Data and Computing , year =

    Ma, Yanjun and Wang, Wei and Cao, Xinhai and Zhang, Yi and Xiao, Aoyang and Zhang, Wenming and Wang, Liang , title =. Frontiers of Data and Computing , year =

  43. [43]

    2018 9th International Conference on Information, Intelligence, Systems and Applications (IISA) , pages=

    Challenges in input preprocessing for mobile OCR applications: A realistic testing scenario , author=. 2018 9th International Conference on Information, Intelligence, Systems and Applications (IISA) , pages=. 2018 , organization=

  44. [44]

    Advanced Automated Document Processing Using Optical Character Recognition (OCR) , year=

    Agarwal, Disha and J, Jeevan and Manikandan, R Karthick and Ramith, N R and M L, Vandana , booktitle=. Advanced Automated Document Processing Using Optical Character Recognition (OCR) , year=

  45. [45]

    2025 , url =

    Ultralytics YOLO Documentation , author =. 2025 , url =

  46. [46]

    Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , year=

    Ren, Shaoqing and He, Kaiming and Girshick, Ross and Sun, Jian , journal=. Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , year=

  47. [47]

    Face Detection with the Faster R-CNN , year=

    Jiang, Huaizu and Learned-Miller, Erik , booktitle=. Face Detection with the Faster R-CNN , year=

  48. [48]

    IEEE Access , volume=

    Privacy protection in surveillance videos using block scrambling-based encryption and DCNN-based face detection , author=. IEEE Access , volume=. 2022 , publisher=

  49. [49]

    The Visual Computer , volume=

    YOLO-face: a real-time face detector , author=. The Visual Computer , volume=. 2021 , publisher=

  50. [50]

    Pattern Recognition , volume=

    Yolo-facev2: A scale and occlusion aware face detector , author=. Pattern Recognition , volume=. 2024 , publisher=

  51. [51]

    2024 International Technical Conference on Circuits/Systems, Computers, and Communications (ITC-CSCC) , pages=

    SnapSafe: Enabling Selective Image Privacy Through YOLO and AES-Protected Facial Encryption with QR Code , author=. 2024 International Technical Conference on Circuits/Systems, Computers, and Communications (ITC-CSCC) , pages=. 2024 , organization=

  52. [52]

    Future Internet , volume=

    Privacy-preserving object detection with secure convolutional neural networks for vehicular edge computing , author=. Future Internet , volume=. 2022 , publisher=

  53. [53]

    iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning , year=

    Yu, Jun and Zhang, Baopeng and Kuang, Zhengzhong and Lin, Dan and Fan, Jianping , journal=. iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning , year=

  54. [54]

    ACM Computing Surveys (CSUR) , volume=

    When machine learning meets privacy: A survey and outlook , author=. ACM Computing Surveys (CSUR) , volume=. 2021 , publisher=

  55. [55]

    European Conference on Computer Vision , pages=

    Privacy-preserving face recognition with learnable privacy budgets in frequency domain , author=. European Conference on Computer Vision , pages=. 2022 , organization=

  56. [56]

    2024 , note =

    Sammy and Tommy , title =. 2024 , note =

  57. [57]

    2024 , note =

    Doug Barnard , title =. 2024 , note =

  58. [58]

    Sustainability , volume=

    How live streaming interactions and their visual stimuli affect users’ sustained engagement behaviour—a comparative experiment using live and virtual live streaming , author=. Sustainability , volume=. 2022 , publisher=

  59. [59]

    Social Computing and Social Media

    Understanding the gift-sending interaction on live-streaming video websites , author=. Social Computing and Social Media. Human Behavior: 9th International Conference, SCSM 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Part I 9 , pages=. 2017 , organization=

  60. [60]

    2024 , note =

    IBM , title =. 2024 , note =

  61. [61]

    2024 , note =

    Twitch , title =. 2024 , note =

  62. [62]

    2024 , note =

    YouTube , title =. 2024 , note =

  63. [63]

    2024 , note =

    TikTok , title =. 2024 , note =

  64. [64]

    2024 , note =

    Douyu , title =. 2024 , note =

  65. [65]

    Instagram Live - Connect with your audience in real time , url =

  66. [66]

    Zoom - Video Conferencing, Cloud Phone, Webinars, Chat, Virtual Events , url =

  67. [67]

    Microsoft Teams - Teamwork and Collaboration Software , url =

  68. [68]

    Tencent Meeting - Efficient Cloud Video Conferencing , url =

  69. [69]

    2016 , url =

    Cybersecurity Law of the People's Republic of China , author =. 2016 , url =

  70. [70]

    2021 , url =

    Personal Information Protection Law of the People's Republic of China , author =. 2021 , url =

  71. [71]

    Extended Abstracts of the CHI Conference on Human Factors in Computing Systems , pages=

    Examination of Users’ Privacy Issues in Live Streaming , author=. Extended Abstracts of the CHI Conference on Human Factors in Computing Systems , pages=

  72. [72]

    Proceedings of the ACM on Human-Computer Interaction , volume=

    Do Streamers Care about Bystanders' Privacy? An Examination of Live Streamers' Considerations and Strategies for Bystanders' Privacy Management , author=. Proceedings of the ACM on Human-Computer Interaction , volume=. 2023 , publisher=

  73. [73]

    Proceedings on Privacy Enhancing Technologies , year=

    Gig Work at What Cost? Exploring Privacy Risks of Gig Work Platform Participation in the US , author=. Proceedings on Privacy Enhancing Technologies , year=

  74. [74]

    General Data Protection Regulation (

  75. [75]

    California Consumer Privacy Act of 2018 (

  76. [76]

    Privacy as contextual integrity , author=. Wash. L. Rev. , volume=. 2004 , publisher=

  77. [77]

    Proceedings

    Security and privacy requirements analysis within a social setting , author=. Proceedings. 11th IEEE International Requirements Engineering Conference, 2003. , pages=. 2003 , organization=

  78. [78]

    Proceedings of the ACM on Human-Computer Interaction , volume=

    Tell me before you stream me: Managing information disclosure in video game live streaming , author=. Proceedings of the ACM on Human-Computer Interaction , volume=. 2018 , publisher=

  79. [79]

    arXiv preprint arXiv:2412.15228 , year=

    Image Privacy Protection: A Survey , author=. arXiv preprint arXiv:2412.15228 , year=

  80. [80]

    IEEE Transactions on Information Forensics and Security , volume=

    Privacy--enhancing face biometrics: A comprehensive survey , author=. IEEE Transactions on Information Forensics and Security , volume=. 2021 , publisher=

Showing first 80 references.