References
[1]. D. Liu, X.S. Hua, M. Wang, and H.J. Zhang, (2010).
“Retagging Social Images Based on Visual and Semantic
Consistency”. in Proceedings of 19 ACM International
Conference on World Wide Web, pp.1149-1150.
[2]. R. Da Silva Torres and A. Falcao, (2006). “Contentbased
Image Retrieval: Theory and Applications”. Revista
de Informatics Teoricae Aplicada, Vol.2, No.13, pp.161-
185.
[3]. H. Lipford, A. Besmer, and J. Watson, (2008).
“Understanding Privacy Settings in Facebook with an
Audience View”. in Proceedings of Conference Usability,
Psychology, and Security.
[4]. Mitra Basu, (2002). “Gaussian-Based Edge-Detection
Methods-A Survey”. IEEE Transactions on Systems, Man,
and Cybernetics, Vol.135, No.3, pp.252-260.
[5]. Katherine Strater and Heather Richter Lipford, (2008).
“Strategies and Struggles with Privacy in an Online Social
Networking Community”. Proceedings of the 22 British
HCI Group Annual Conference on People and
Computers: Culture, Creativity, and Interaction, Vol.1, pp.111-119.
[6]. Ching-man Au Yeung, Lalana Kagal, Nicholas
Gibbins, and Nigel Shadbolt, (2009). “Providing Access
Control to Online Photo Albums Based on Tags and Linked
Data”. Retrieved from http://dig.csail.mit.edu/2008/
Papers/AAAI%20SSS%202009/paper.pdf
[7]. X. Su and T. M. Khoshgoftaar, (2009). “A Survey of
Collaborative Filtering Techniques”. Advances in Artificial
Intelligence, Vol.2009, pp.19.
[8]. Anna Cinzia Squicciarini, (2015). “Privacy Policy
Inference of User-Uploaded Images on Content Sharing
Sites”. IEEE Transactions on Knowledge and Data
Engineering, Vol.27, No.1.
[9]. Anna C. Squicciarini, Mohamed Shehab, and
Federica Paci, (2009). “Collective Privacy Management
in Social Networks”. Retrieved from http://www2009.
eprints.org/53/1/ p521.pdf
[10]. Sattarova Feruza Y. and Tao-hoon Kim, (2007). “IT
Security Review: Privacy, Protection, Access Control,
Assurance and System Security”. International Journal of
Multimedia and Ubiquitous Engineering, Vol.2, No.2,
pp.17-32.