-
1
-
-
42449119809
-
Dredging up the past: Lifelogging, memory, and surveillance
-
A. Allen, “Dredging up the past: Lifelogging, memory, and surveillance,” The University of Chicago Law Review, pp. 47–74, 2008.
-
(2008)
The University of Chicago Law Review
, pp. 47-74
-
-
Allen, A.1
-
4
-
-
84861670523
-
Technical challenges in location-aware video surveillance privacy
-
Springer
-
J. Brassil, “Technical challenges in location-aware video surveillance privacy,” in Protecting Privacy in Video Surveillance. Springer, 2009, pp. 91–113.
-
(2009)
Protecting Privacy in Video Surveillance
, pp. 91-113
-
-
Brassil, J.1
-
5
-
-
80755167433
-
-
Technische Universität Darmstadt, Technical Report TR-2011-04, Apr
-
S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, and A.-R. Sadeghi, “XManDroid: A new Android evolution to mitigate privilege escalation attacks,” Technische Universität Darmstadt, Technical Report TR-2011-04, Apr. 2011.
-
(2011)
XManDroid: A new Android evolution to mitigate privilege escalation attacks
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
-
6
-
-
84888341014
-
Towards taming privilege-escalation attacks on Android
-
Feb
-
S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry, “Towards taming privilege-escalation attacks on Android,” in 19th Annual Network & Distributed System Security Symposium (NDSS), Feb. 2012.
-
(2012)
19th Annual Network & Distributed System Security Symposium (NDSS)
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
Shastry, B.6
-
7
-
-
84969248210
-
Privacy protection for life-log video
-
J. Chaudhari, S. Cheung, and M. Venkatesh, “Privacy protection for life-log video,” in IEEE Workshop on Signal Processing Applications for Public Security and Forensics, 2007, pp. 1–5.
-
(2007)
IEEE Workshop on Signal Processing Applications for Public Security and Forensics
, pp. 1-5
-
-
Chaudhari, J.1
Cheung, S.2
Venkatesh, M.3
-
9
-
-
84867449261
-
Automatically characterizing places with opportunistic crowdsensing using smartphones
-
Y. Chon, N. Lane, F. Li, H. Cha, and F. Zhao, “Automatically characterizing places with opportunistic crowdsensing using smartphones,” in ACM Conference on Ubiquitous Computing, 2012, pp. 481–490.
-
(2012)
ACM Conference on Ubiquitous Computing
, pp. 481-490
-
-
Chon, Y.1
Lane, N.2
Li, F.3
Cha, H.4
Zhao, F.5
-
10
-
-
84870151992
-
Crepe: context-related policy enforcement for Android
-
M. Conti, V. T. N. Nguyen, and B. Crispo, “Crepe: context-related policy enforcement for Android,” in International Conference on Information Security, 2011, pp. 331–345.
-
(2011)
International Conference on Information Security
, pp. 331-345
-
-
Conti, M.1
Nguyen, V. T. N.2
Crispo, B.3
-
12
-
-
84884408136
-
Quire: Lightweight provenance for smart phone operating systems
-
abs/1102.2445
-
M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. S. Wallach, “Quire: Lightweight provenance for smart phone operating systems,” CoRR, vol. abs/1102.2445, 2011.
-
(2011)
CoRR
-
-
Dietz, M.1
Shekhar, S.2
Pisetsky, Y.3
Shu, A.4
Wallach, D. S.5
-
13
-
-
74049093505
-
Evaluation of gist descriptors for web-scale image search
-
M. Douze, H. Jegou, H. Sandhawalia, L. Amsaleg, and C. Schmid, “Evaluation of gist descriptors for web-scale image search,” in ACM International Conference on Image and Video Retrieval, 2009.
-
(2009)
ACM International Conference on Image and Video Retrieval
-
-
Douze, M.1
Jegou, H.2
Sandhawalia, H.3
Amsaleg, L.4
Schmid, C.5
-
15
-
-
79955570859
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth, “TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones,” in USENIX Conference on Operating Systems Design and Implementation, 2010, pp. 1–6.
-
(2010)
USENIX Conference on Operating Systems Design and Implementation
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L. P.4
Jung, J.5
McDaniel, P.6
Sheth, A. N.7
-
16
-
-
60049083121
-
-
Pennsylvania State University, Tech. Rep. NAS-TR-0094-2008
-
W. Enck, M. Ongtang, and P. McDaniel, “Mitigating Android software misuse before it happens,” Pennsylvania State University, Tech. Rep. NAS-TR-0094-2008, 2008.
-
(2008)
Mitigating Android software misuse before it happens
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
17
-
-
50949133669
-
Liblinear: A library for large linear classification
-
R. Fan, K. Chang, C. Hsieh, X. Wang, and C. Lin, “Liblinear: A library for large linear classification,” The Journal of Machine Learning Research, vol. 9, pp. 1871–1874, 2008.
-
(2008)
The Journal of Machine Learning Research
, vol.9
, pp. 1871-1874
-
-
Fan, R.1
Chang, K.2
Hsieh, C.3
Wang, X.4
Lin, C.5
-
19
-
-
85046879731
-
Permission re-delegation: attacks and defenses
-
A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin, “Permission re-delegation: attacks and defenses,” in Proceedings of the USENIX Conference on Security, 2011, pp. 22–22.
-
(2011)
Proceedings of the USENIX Conference on Security
, pp. 22-22
-
-
Felt, A. P.1
Wang, H. J.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
20
-
-
79958139322
-
Building Rome on a Cloudless Day
-
J.-M. Frahm, P. Georgel, D. Gallup, T. Johnson, R. Raguram, C. Wu, Y.-H. Jen, E. Dunn, B. Clipp, and S. Lazebnik, “Building Rome on a Cloudless Day,” in European Conference on Computer Vision, 2010.
-
(2010)
European Conference on Computer Vision
-
-
Frahm, J.-M.1
Georgel, P.2
Gallup, D.3
Johnson, T.4
Raguram, R.5
Wu, C.6
Jen, Y.-H.7
Dunn, E.8
Clipp, B.9
Lazebnik, S.10
-
21
-
-
0001944742
-
Similarity search in high dimensions via hashing
-
A. Gionis, P. Indyk, R. Motwani et al., “Similarity search in high dimensions via hashing,” in IEEE International Conference on Very Large Data Bases, vol. 99, 1999, pp. 518–529.
-
(1999)
IEEE International Conference on Very Large Data Bases
, vol.99
, pp. 518-529
-
-
Gionis, A.1
Indyk, P.2
Motwani, R.3
-
22
-
-
20444440033
-
Privacy management for portable recording devices
-
J. Halderman, B. Waters, and E. Felten, “Privacy management for portable recording devices,” in ACM Workshop on Privacy in the Electronic Society, 2004, pp. 16–24.
-
(2004)
ACM Workshop on Privacy in the Electronic Society
, pp. 16-24
-
-
Halderman, J.1
Waters, B.2
Felten, E.3
-
23
-
-
0035424017
-
Location systems for ubiquitous computing
-
Aug
-
J. Hightower and G. Borriello, “Location systems for ubiquitous computing,” Computer, vol. 34, no. 8, pp. 57–66, Aug. 2001.
-
(2001)
Computer
, vol.34
, Issue.8
, pp. 57-66
-
-
Hightower, J.1
Borriello, G.2
-
24
-
-
63049117754
-
Sensecam: a retrospective memory aid
-
S. Hodges, L. Williams, E. Berry, S. Izadi, J. Srinivasan, A. Butler, G. Smyth, N. Kapur, and K. Wood, “Sensecam: a retrospective memory aid,” in ACM Conference on Ubiquiotous Computing, 2006.
-
(2006)
ACM Conference on Ubiquiotous Computing
-
-
Hodges, S.1
Williams, L.2
Berry, E.3
Izadi, S.4
Srinivasan, J.5
Butler, A.6
Smyth, G.7
Kapur, N.8
Wood, K.9
-
25
-
-
79954510617
-
Homomorphic encryption-based secure sift for privacy-preserving feature extraction
-
C. Hsu, C. Lu, and S. Pei, “Homomorphic encryption-based secure sift for privacy-preserving feature extraction,” in IS&T/SPIE Electronic Imaging, 2011.
-
(2011)
IS&T/SPIE Electronic Imaging
-
-
Hsu, C.1
Lu, C.2
Pei, S.3
-
27
-
-
33845636578
-
A framework for vision based bearing only 3d slam
-
IEEE
-
P. Jensfelt, D. Kragic, J. Folkesson, and M. Bjorkman, “A framework for vision based bearing only 3d slam,” in Robotics and Automation, 2006. ICRA 2006. Proceedings 2006 IEEE International Conference on. IEEE, 2006, pp. 1944–1950.
-
(2006)
Robotics and Automation, 2006. ICRA 2006. Proceedings 2006 IEEE International Conference on
, pp. 1944-1950
-
-
Jensfelt, P.1
Kragic, D.2
Folkesson, J.3
Bjorkman, M.4
-
28
-
-
77953996139
-
I don’t mind being logged, but want to remain in control: a field study of mobile activity and context logging
-
T. Karkkainen, T. Vaittinen, and K. Vaananen-Vainio-Mattila, “I don’t mind being logged, but want to remain in control: a field study of mobile activity and context logging,” in SIGCHI Conference on Human Factors in Computing Systems, 2010, pp. 163–172.
-
(2010)
SIGCHI Conference on Human Factors in Computing Systems
, pp. 163-172
-
-
Karkkainen, T.1
Vaittinen, T.2
Vaananen-Vainio-Mattila, K.3
-
30
-
-
84897480620
-
Solving avatar captchas automatically
-
M. Korayem, A. Mohamed, D. Crandall, and R. Yampolskiy, “Solving avatar captchas automatically,” in Advanced Machine Learning Technologies and Applications, 2012.
-
(2012)
Advanced Machine Learning Technologies and Applications
-
-
Korayem, M.1
Mohamed, A.2
Crandall, D.3
Yampolskiy, R.4
-
31
-
-
3042629822
-
Vision based topological markov localization
-
IEEE
-
J. Kosecká and F. Li, “Vision based topological markov localization,” in Robotics and Automation, 2004. Proceedings. ICRA’04. 2004 IEEE International Conference on, vol. 2. IEEE, 2004, pp. 1481–1486.
-
(2004)
Robotics and Automation, 2004. Proceedings. ICRA’04. 2004 IEEE International Conference on
, vol.2
, pp. 1481-1486
-
-
Kosecká, J.1
Li, F.2
-
32
-
-
78651451071
-
Personal positioning based on walking locomotion analysis with self-contained sensors and a wearable camera
-
M. Kourogi and T. Kurata, “Personal positioning based on walking locomotion analysis with self-contained sensors and a wearable camera,” in IEEE and ACM International Symposium on Mixed and Augmented Reality, 2003, pp. 103–112.
-
(2003)
IEEE and ACM International Symposium on Mixed and Augmented Reality
, pp. 103-112
-
-
Kourogi, M.1
Kurata, T.2
-
36
-
-
56749152232
-
Modeling and Recognition of Landmark Image Collections Using Iconic Scene Graphs
-
X. Li, C. Wu, C. Zach, S. Lazebnik, and J.-M. Frahm, “Modeling and Recognition of Landmark Image Collections Using Iconic Scene Graphs,” in European Conference on Computer Vision, 2008, pp. 427–440.
-
(2008)
European Conference on Computer Vision
, pp. 427-440
-
-
Li, X.1
Wu, C.2
Zach, C.3
Lazebnik, S.4
Frahm, J.-M.5
-
38
-
-
3042535216
-
Distinctive image features from scale-invariant keypoints
-
Nov
-
D. G. Lowe, “Distinctive image features from scale-invariant keypoints,” International Journal of Computer Vision, vol. 60, no. 2, pp. 91–110, Nov. 2004.
-
(2004)
International Journal of Computer Vision
, vol.60
, Issue.2
, pp. 91-110
-
-
Lowe, D. G.1
-
39
-
-
84866497422
-
Sensing meets mobile social networks: the design, implementation and evaluation of the cenceme application
-
E. Miluzzo, N. Lane, K. Fodor, R. Peterson, H. Lu, M. Musolesi, S. Eisenman, X. Zheng, and A. Campbell, “Sensing meets mobile social networks: the design, implementation and evaluation of the cenceme application,” in ACM Conference on Embedded Network Sensor Systems, 2008, pp. 337–350.
-
(2008)
ACM Conference on Embedded Network Sensor Systems
, pp. 337-350
-
-
Miluzzo, E.1
Lane, N.2
Fodor, K.3
Peterson, R.4
Lu, H.5
Musolesi, M.6
Eisenman, S.7
Zheng, X.8
Campbell, A.9
-
40
-
-
77954487766
-
Apex: Extending Android permission model and enforcement with user-defined runtime constraints
-
M. Nauman, S. Khan, and X. Zhang, “Apex: Extending Android permission model and enforcement with user-defined runtime constraints,” in ACM Symposium on Information, Computer and Communications Security, 2010, pp. 328–332.
-
(2010)
ACM Symposium on Information, Computer and Communications Security
, pp. 328-332
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
41
-
-
0035328421
-
Modeling the shape of the scene: A holistic representation of the spatial envelope
-
A. Oliva and A. Torralba, “Modeling the shape of the scene: A holistic representation of the spatial envelope,” International Journal of Computer Vision, vol. 42, no. 3, pp. 145–175, 2001.
-
(2001)
International Journal of Computer Vision
, vol.42
, Issue.3
, pp. 145-175
-
-
Oliva, A.1
Torralba, A.2
-
42
-
-
78751555807
-
Porscha: Policy oriented secure content handling in Android
-
M. Ongtang, K. Butler, and P. McDaniel, “Porscha: Policy oriented secure content handling in Android,” in Annual Computer Security Applications Conference, 2010, pp. 221–230.
-
(2010)
Annual Computer Security Applications Conference
, pp. 221-230
-
-
Ongtang, M.1
Butler, K.2
McDaniel, P.3
-
44
-
-
78751498804
-
Paranoid Android: Versatile protection for smartphones
-
G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos, “Paranoid Android: Versatile protection for smartphones,” in Annual Computer Security Applications Conference, 2010, pp. 347–356.
-
(2010)
Annual Computer Security Applications Conference
, pp. 347-356
-
-
Portokalidis, G.1
Homburg, P.2
Anagnostakis, K.3
Bos, H.4
-
46
-
-
84874840847
-
User-driven access control: Rethinking permission granting in modern operating systems
-
F. Roesner, T. Kohno, A. Moshchuk, B. Parno, H. J. Wang, and C. Cowan, “User-driven access control: Rethinking permission granting in modern operating systems,” in IEEE Symposium on Security and Privacy, 2012, pp. 224–238.
-
(2012)
IEEE Symposium on Security and Privacy
, pp. 224-238
-
-
Roesner, F.1
Kohno, T.2
Moshchuk, A.3
Parno, B.4
Wang, H. J.5
Cowan, C.6
-
47
-
-
0034775930
-
Dynamic fine-grained localization in ad-hoc networks of sensors
-
A. Savvides, C. Han, and M. Strivastava, “Dynamic fine-grained localization in ad-hoc networks of sensors,” in International Conference on Mobile Computing and Networking, 2001, pp. 166–179.
-
(2001)
International Conference on Mobile Computing and Networking
, pp. 166-179
-
-
Savvides, A.1
Han, C.2
Strivastava, M.3
-
48
-
-
79952858532
-
Respectful cameras: Detecting visual markers in real-time to address privacy concerns
-
Springer
-
J. Schiff, M. Meingast, D. Mulligan, S. Sastry, and K. Goldberg, “Respectful cameras: Detecting visual markers in real-time to address privacy concerns,” in Protecting Privacy in Video Surveillance. Springer, 2009, pp. 65–89.
-
(2009)
Protecting Privacy in Video Surveillance
, pp. 65-89
-
-
Schiff, J.1
Meingast, M.2
Mulligan, D.3
Sastry, S.4
Goldberg, K.5
-
49
-
-
0036705925
-
Mobile robot localization and mapping with uncertainty using scale-invariant visual landmarks
-
S. Se, D. Lowe, and J. Little, “Mobile robot localization and mapping with uncertainty using scale-invariant visual landmarks,” International Journal of Robotics Research, vol. 21, no. 8, pp. 735–758, 2002.
-
(2002)
International Journal of Robotics Research
, vol.21
, Issue.8
, pp. 735-758
-
-
Se, S.1
Lowe, D.2
Little, J.3
-
50
-
-
20844442234
-
Vision-based global localization and mapping for mobile robots
-
S. Se, D. Lowe, and J. Little, “Vision-based global localization and mapping for mobile robots,” IEEE Transactions on Robotics, vol. 21, no. 3, pp. 364–375, 2005.
-
(2005)
IEEE Transactions on Robotics
, vol.21
, Issue.3
, pp. 364-375
-
-
Se, S.1
Lowe, D.2
Little, J.3
-
51
-
-
51849148010
-
Modeling the World from Internet Photo Collections
-
N. Snavely, S. Seitz, and R. Szeliski, “Modeling the World from Internet Photo Collections,” International Journal of Computer Vision, vol. 80, pp. 189–210, 2008.
-
(2008)
International Journal of Computer Vision
, vol.80
, pp. 189-210
-
-
Snavely, N.1
Seitz, S.2
Szeliski, R.3
-
52
-
-
85180406770
-
PlaceRaider: Virtual theft in physical spaces with smartphones
-
R. Templeman, Z. Rahman, D. Crandall, and A. Kapadia, “PlaceRaider: Virtual theft in physical spaces with smartphones,” in Network and Distributed System Security Symposium, 2013.
-
(2013)
Network and Distributed System Security Symposium
-
-
Templeman, R.1
Rahman, Z.2
Crandall, D.3
Kapadia, A.4
-
53
-
-
33646042901
-
Preventing camera recording by designing a capture-resistant environment
-
K. Truong, S. Patel, J. Summet, and G. Abowd, “Preventing camera recording by designing a capture-resistant environment,” in International Conference on Ubiquitous Computing, 2005, pp. 73–86.
-
(2005)
International Conference on Ubiquitous Computing
, pp. 73-86
-
-
Truong, K.1
Patel, S.2
Summet, J.3
Abowd, G.4
-
56
-
-
77955988947
-
Sun database: Large-scale scene recognition from abbey to zoo
-
J. Xiao, J. Hays, K. Ehinger, A. Oliva, and A. Torralba, “Sun database: Large-scale scene recognition from abbey to zoo,” in IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2010, pp. 3485–3492.
-
(2010)
IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
, pp. 3485-3492
-
-
Xiao, J.1
Hays, J.2
Ehinger, K.3
Oliva, A.4
Torralba, A.5
|