{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:12:48Z","timestamp":1730214768277,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1109\/dsn53405.2022.00058","type":"proceedings-article","created":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T20:18:34Z","timestamp":1658780314000},"page":"522-533","source":"Crossref","is-referenced-by-count":0,"title":["Background Buster: Peeking through Virtual Backgrounds in Online Video Calls"],"prefix":"10.1109","author":[{"given":"Mohd","family":"Sabra","sequence":"first","affiliation":[{"name":"University of Texas,San Antonio"}]},{"given":"Anindya","family":"Maiti","sequence":"additional","affiliation":[{"name":"University of Oklahoma"}]},{"given":"Murtuza","family":"Jadliwala","sequence":"additional","affiliation":[{"name":"University of Texas,San Antonio"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23060"},{"key":"ref32","first-page":"7137","article-title":"First order motion model for image animation","volume":"32","author":"siarohin","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref31","article-title":"Portrait of a privacy invasion: Detecting relationships through large-scale photo analysis","author":"shoshitaishvili","year":"2015","journal-title":"PETS"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23063"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/72"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.41"},{"year":"0","key":"ref10","article-title":"Using Zoom Backgrounds to Keep Your Privacy and Clean Up Your Space"},{"year":"0","key":"ref11","article-title":"Vicodo video calls archive"},{"year":"0","key":"ref12","article-title":"YouTube"},{"year":"0","key":"ref13","article-title":"Zoom"},{"year":"0","key":"ref14","article-title":"‘Zoombombing’ Becomes a Dangerous Organized Effort"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.20"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.25"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.28"},{"journal-title":"Learning OpenCV Computer Vision With the OpenCV Library","year":"2008","author":"bradski","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-08-051581-6.50065-9"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046769"},{"year":"0","key":"ref4","article-title":"ImageNet dataset"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3467816"},{"year":"0","key":"ref3","article-title":"Coronavirus prompts increased use of video chat platforms for work, connection"},{"year":"0","key":"ref6","article-title":"Open Broadcaster Software"},{"key":"ref29","first-page":"779","article-title":"You only look once: Unified, real-time object detection","author":"redmon","year":"2016","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"year":"0","key":"ref5","article-title":"Microsoft Teams"},{"year":"0","key":"ref8","article-title":"Skype"},{"year":"0","key":"ref7","article-title":"Rewatch"},{"year":"0","key":"ref2","article-title":"Cisco Webex vulnerabilities may enable attackers to covertly join meetings"},{"year":"0","key":"ref9","article-title":"Use a virtual background on Zoom calls for better privacy"},{"year":"0","key":"ref1","article-title":"500,000 Hacked Zoom Accounts Given Away For Free On The Dark Web"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/800031.808585"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00010"},{"article-title":"Rethinking atrous convolution for semantic image segmentation","year":"2017","author":"chen","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053005"},{"article-title":"Annotated image dataset of household objects from the robofei@home team","year":"2020","author":"meneghetti","key":"ref26"},{"key":"ref25","first-page":"740","article-title":"Microsoft coco: Common objects in context","author":"lin","year":"2014","journal-title":"European Conference on Computer Vision"}],"event":{"name":"2022 52nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","start":{"date-parts":[[2022,6,27]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2022,6,30]]}},"container-title":["2022 52nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9833551\/9833474\/09833657.pdf?arnumber=9833657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T20:04:45Z","timestamp":1660593885000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9833657\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/dsn53405.2022.00058","relation":{},"subject":[],"published":{"date-parts":[[2022,6]]}}}