{"id":"https://openalex.org/W4385187363","doi":"https://doi.org/10.1109/iwcmc58020.2023.10182780","title":"Defending Emotional Privacy with Adversarial Machine Learning for Social Good","display_name":"Defending Emotional Privacy with Adversarial Machine Learning for Social Good","publication_year":2023,"publication_date":"2023-06-19","ids":{"openalex":"https://openalex.org/W4385187363","doi":"https://doi.org/10.1109/iwcmc58020.2023.10182780"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc58020.2023.10182780","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iwcmc58020.2023.10182780","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073226993","display_name":"Shawqi Al-Maliki","orcid":"https://orcid.org/0000-0002-6738-2352"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":true,"raw_author_name":"Shawqi Al-Maliki","raw_affiliation_strings":["College of Science and Engineering, Hamad Bin Khalifa University,Information and Computing Technology (ICT) Division,Doha,Qatar,34110"],"affiliations":[{"raw_affiliation_string":"College of Science and Engineering, Hamad Bin Khalifa University,Information and Computing Technology (ICT) Division,Doha,Qatar,34110","institution_ids":["https://openalex.org/I4210144839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037234286","display_name":"Mohamed Abdallah","orcid":"https://orcid.org/0000-0002-3261-7588"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Mohamed Abdallah","raw_affiliation_strings":["College of Science and Engineering, Hamad Bin Khalifa University,Information and Computing Technology (ICT) Division,Doha,Qatar,34110"],"affiliations":[{"raw_affiliation_string":"College of Science and Engineering, Hamad Bin Khalifa University,Information and Computing Technology (ICT) Division,Doha,Qatar,34110","institution_ids":["https://openalex.org/I4210144839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037574053","display_name":"Junaid Qadir","orcid":"https://orcid.org/0000-0001-9466-2475"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Junaid Qadir","raw_affiliation_strings":["Qatar University,College of Engineering,Department of Computer Science and Engineering,Doha,Qatar","Department of Computer Science and Engineering, College of Engineering, Qatar University, Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Qatar University,College of Engineering,Department of Computer Science and Engineering,Doha,Qatar","institution_ids":["https://openalex.org/I60342839"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, College of Engineering, Qatar University, Doha, Qatar","institution_ids":["https://openalex.org/I60342839"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008695053","display_name":"Ala Al\u2010Fuqaha","orcid":"https://orcid.org/0000-0002-0903-1204"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Ala Al-Fuqaha","raw_affiliation_strings":["College of Science and Engineering, Hamad Bin Khalifa University,Information and Computing Technology (ICT) Division,Doha,Qatar,34110"],"affiliations":[{"raw_affiliation_string":"College of Science and Engineering, Hamad Bin Khalifa University,Information and Computing Technology (ICT) Division,Doha,Qatar,34110","institution_ids":["https://openalex.org/I4210144839"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5073226993"],"corresponding_institution_ids":["https://openalex.org/I4210144839"],"apc_list":null,"apc_paid":null,"fwci":0.3497,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.64270383,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":"1807","issue":null,"first_page":"345","last_page":"350"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12268","display_name":"Deception detection and forensic psychology","score":0.9801999926567078,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9800000190734863,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8407384157180786},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6736952066421509},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6558926105499268},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.6053915023803711},{"id":"https://openalex.org/keywords/chaining","display_name":"Chaining","score":0.5812197327613831},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5750572085380554},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5308184623718262},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.5160269737243652},{"id":"https://openalex.org/keywords/false-accusation","display_name":"False accusation","score":0.48160097002983093},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.31341463327407837},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.17936542630195618},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.13055112957954407}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8407384157180786},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6736952066421509},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6558926105499268},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.6053915023803711},{"id":"https://openalex.org/C49020025","wikidata":"https://www.wikidata.org/wiki/Q1059099","display_name":"Chaining","level":2,"score":0.5812197327613831},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5750572085380554},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5308184623718262},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.5160269737243652},{"id":"https://openalex.org/C59577422","wikidata":"https://www.wikidata.org/wiki/Q10265143","display_name":"False accusation","level":2,"score":0.48160097002983093},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.31341463327407837},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.17936542630195618},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.13055112957954407},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iwcmc58020.2023.10182780","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iwcmc58020.2023.10182780","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},{"id":"pmh:oai:qspace.qu.edu.qa:10576/66064","is_oa":false,"landing_page_url":"http://hdl.handle.net/10576/66064","pdf_url":null,"source":{"id":"https://openalex.org/S4306400014","display_name":"Qatar University QSpace (Qatar University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I60342839","host_organization_name":"Qatar University","host_organization_lineage":["https://openalex.org/I60342839"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7099999785423279,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W9657784","https://openalex.org/W1673923490","https://openalex.org/W1945616565","https://openalex.org/W2243397390","https://openalex.org/W2745497104","https://openalex.org/W2963857521","https://openalex.org/W2983044655","https://openalex.org/W3003926725","https://openalex.org/W3005680577","https://openalex.org/W3009542902","https://openalex.org/W3035742266","https://openalex.org/W3082511295","https://openalex.org/W3103836116","https://openalex.org/W3122081138","https://openalex.org/W3132832816","https://openalex.org/W3189813398","https://openalex.org/W4206857759","https://openalex.org/W4287393093","https://openalex.org/W4298312696","https://openalex.org/W4300511536","https://openalex.org/W4301880089","https://openalex.org/W6637162671","https://openalex.org/W6640425456","https://openalex.org/W6719080892","https://openalex.org/W6752654261","https://openalex.org/W6752946794","https://openalex.org/W6757378552","https://openalex.org/W6773506501","https://openalex.org/W6774314701","https://openalex.org/W6774469542","https://openalex.org/W6779945560","https://openalex.org/W6780116240","https://openalex.org/W6788183126","https://openalex.org/W6790138817"],"related_works":["https://openalex.org/W3048732067","https://openalex.org/W4383468834","https://openalex.org/W2900159906","https://openalex.org/W4384648009","https://openalex.org/W4283221438","https://openalex.org/W4287828318","https://openalex.org/W2406556600","https://openalex.org/W4380352238","https://openalex.org/W3126470649","https://openalex.org/W2930249865"],"abstract_inverted_index":{"Protecting":[0],"the":[1,86,205,213,219,231,238],"privacy":[2,34,38,83,133,202],"of":[3,88,157,208,230],"personal":[4,144],"information,":[5],"including":[6],"emotions,":[7],"is":[8,85],"essential,":[9],"and":[10,59,64,141,145,171,191],"organizations":[11,22,44,129],"must":[12,61],"comply":[13],"with":[14,204],"relevant":[15],"regulations":[16],"to":[17,71,99,106,162,200,212],"ensure":[18],"privacy.":[19,74,147],"Unfortunately,":[20],"some":[21],"do":[23],"not":[24],"respect":[25],"these":[26],"regulations,":[27],"or":[28],"they":[29],"lack":[30],"transparency,":[31],"leaving":[32],"human":[33,73,132],"at":[35],"risk.":[36],"These":[37],"violations":[39,84],"often":[40],"occur":[41],"when":[42],"unauthorized":[43],"misuse":[45],"machine":[46],"learning":[47],"(ML)":[48],"technology,":[49,110,137],"such":[50,111],"as":[51,112],"facial":[52],"expression":[53],"recognition":[54],"(FER)":[55],"systems.":[56],"Therefore,":[57],"researchers":[58],"practitioners":[60],"take":[62],"action":[63],"use":[65,87],"ML":[66,90,101,109,122,136,159],"technology":[67,170],"for":[68,91,123],"social":[69,92,124],"good":[70],"protect":[72,142],"One":[75],"emerging":[76],"research":[77],"area":[78],"that":[79,167,196],"can":[80,103,127],"help":[81],"address":[82],"adversarial":[89,121],"good.":[93],"Evasion":[94],"attacks,":[95],"which":[96],"are":[97],"used":[98],"fool":[100,206,220],"systems,":[102,140],"be":[104],"repurposed":[105],"prevent":[107,128],"misused":[108,169],"ML-based":[113],"FER,":[114],"from":[115,130,174],"recognizing":[116],"true":[117,176],"emotions.":[118,177],"By":[119],"leveraging":[120],"good,":[125],"we":[126,151,183],"violating":[131],"by":[134,223],"misusing":[135],"particularly":[138],"FER":[139],"individuals'":[143],"emotional":[146,201],"In":[148,216],"this":[149],"work,":[150],"propose":[152],"an":[153],"approach":[154],"called":[155],"Chaining":[156],"Adversarial":[158],"Attacks":[160],"(CAA)":[161],"create":[163],"a":[164],"robust":[165],"attack":[166],"fools":[168],"prevents":[172],"it":[173],"detecting":[175],"To":[178],"validate":[179],"our":[180,217],"proposed":[181],"approach,":[182],"conduct":[184],"extensive":[185],"experiments":[186],"using":[187],"various":[188],"evaluation":[189],"metrics":[190],"baselines.":[192],"Our":[193],"results":[194],"show":[195],"CAA":[197],"significantly":[198],"contributes":[199],"preservation,":[203],"rate":[207,221],"emotions":[209],"increasing":[210],"proportionally":[211],"chaining":[214,228,232],"length.":[215],"experiments,":[218],"increases":[222],"48%":[224],"in":[225],"each":[226],"subsequent":[227],"stage":[229],"targeted":[233],"attacks":[234],"(CTA)":[235],"while":[236],"keeping":[237],"perturbations":[239],"imperceptible":[240],"($\\epsilon":[241],"=":[242],"0.0001$).":[243]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-24T23:09:58.560324","created_date":"2025-10-10T00:00:00"}
