{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:10:59Z","timestamp":1740132659328,"version":"3.37.3"},"reference-count":20,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1109\/mc.2023.3316696","type":"journal-article","created":{"date-parts":[[2024,3,6]],"date-time":"2024-03-06T18:53:50Z","timestamp":1709751230000},"page":"91-100","source":"Crossref","is-referenced-by-count":2,"title":["Video Surveillance and Privacy: A Solvable Paradox?"],"prefix":"10.1109","volume":"57","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2239-283X","authenticated-orcid":false,"given":"Rita","family":"Cucchiara","sequence":"first","affiliation":[{"name":"University of Modena and Reggio Emilia, Modena, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5125-4957","authenticated-orcid":false,"given":"Lorenzo","family":"Baraldi","sequence":"additional","affiliation":[{"name":"University of Modena and Reggio Emilia, Modena, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9640-9385","authenticated-orcid":false,"given":"Marcella","family":"Cornia","sequence":"additional","affiliation":[{"name":"University of Modena and Reggio Emilia, Modena, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1057-3374","authenticated-orcid":false,"given":"Sara","family":"Sarto","sequence":"additional","affiliation":[{"name":"Information and Communication Technologies, University of Modena and Reggio Emilia, Modena, Italy"}]}],"member":"263","reference":[{"key":"ref1","first-page":"548","article-title":"La privacy tra individuo e collettivit","volume":"5","author":"Rodot","year":"1974","journal-title":"Politica Diritto"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.7312\/gold91730-002"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/34.598236"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/mtas.2004.1273467"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45053-x_48"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2005.177"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5244\/c.23.91"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2011.247"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1017\/dmp.2015.42"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2016.2577031"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2016.91"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2017.143"},{"article-title":"UCF101: A dataset of 101 human actions classes from videos in the wild","year":"2012","author":"Soomro","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2019.00057"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr42600.2020.00723"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/cvprw53098.2021.00364"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2022.3148210"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr52688.2022.01953"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/globecom46510.2021.9685855"}],"container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/2\/10461644\/10461700.pdf?arnumber=10461700","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T02:32:11Z","timestamp":1709865131000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10461700\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":20,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/mc.2023.3316696","relation":{},"ISSN":["0018-9162","1558-0814"],"issn-type":[{"type":"print","value":"0018-9162"},{"type":"electronic","value":"1558-0814"}],"subject":[],"published":{"date-parts":[[2024,3]]}}}