-
2
-
-
84910623331
-
World-driven access control for continuous sensing
-
Franziska Roesner, David Molnar, Alexander Moshchuk, Tadayoshi Kohno, and Helen J. Wang. World-driven access control for continuous sensing. In ACM Conference on Computer and Communications Security (CCS), 2014.
-
(2014)
ACM Conference on Computer and Communications Security (CCS)
-
-
Roesner, F.1
Molnar, D.2
Moshchuk, A.3
Kohno, T.4
Wang, H.J.5
-
3
-
-
84979938897
-
What you mark is what apps see
-
Nisarg Raval, Animesh Srivastava, Ali Razeen, Kiron Lebeck, Ashwin Machanavajjhala, and Landon P. Cox. What you mark is what apps see. In ACM International Conference on Mobile Systems, Applications, and Services (Mobisys), 2016.
-
(2016)
ACM International Conference on Mobile Systems, Applications, and Services (Mobisys)
-
-
Raval, N.1
Srivastava, A.2
Razeen, A.3
Lebeck, K.4
Machanavajjhala, A.5
Cox, L.P.6
-
4
-
-
84914165766
-
Privacy.tag: Privacy concern expressed and respected
-
Cheng Bo, Guobin Shen, Jie Liu, Xiang-Yang Li, Yongguang Zhang, and Feng Zhao. Privacy.tag: Privacy concern expressed and respected. In ACM Conference on Embedded Networked Sensor Systems (Sensys), 2014.
-
(2014)
ACM Conference on Embedded Networked Sensor Systems (Sensys)
-
-
Bo, C.1
Shen, G.2
Liu, J.3
Li, X.-Y.4
Zhang, Y.5
Zhao, F.6
-
5
-
-
84908689805
-
Markit: Privacy markers for protecting visual secrets
-
Nisarg Raval, Animesh Srivastava, Kiron Lebeck, Landon P. Cox, and Ashwin Machanavajjhala. Markit: Privacy markers for protecting visual secrets. In UPSIDE, Workshop at ACM International Joint Conference on Pervasive and Ubiquitous Computing (Ubicomp), 2014.
-
(2014)
UPSIDE, Workshop at ACM International Joint Conference on Pervasive and Ubiquitous Computing (Ubicomp)
-
-
Raval, N.1
Srivastava, A.2
Lebeck, K.3
Cox, L.P.4
Machanavajjhala, A.5
-
11
-
-
4344675264
-
Region filling and object removal by exemplar-based image inpainting
-
September
-
Antonio Criminisi, Patrick Perez, , and Kentaro Toyama. Region filling and object removal by exemplar-based image inpainting. In IEEE Transactions on image processing, vol. 13, no. 9, September, 2004.
-
(2004)
IEEE Transactions on image processing
, vol.13
, Issue.9
-
-
Criminisi, A.1
Perez, P.2
Toyama, K.3
-
13
-
-
84959223360
-
Beyond frontal faces: Improving person recognition using multiple cues
-
Ning Zhang, Manohar Paluri, Yaniv Taigman, Rob Fergus, and Lubomir Bourdev. Beyond frontal faces: Improving person recognition using multiple cues. In Conference on Computer Vision and Pattern Recognition (CVPR), 2015.
-
(2015)
Conference on Computer Vision and Pattern Recognition (CVPR)
-
-
Zhang, N.1
Paluri, M.2
Taigman, Y.3
Fergus, R.4
Bourdev, L.5
-
15
-
-
85198028989
-
ImageNet: A large-scale hierarchical image database
-
J. Deng, W. Dong, R. Socher, L.-J. Li, K. Li, and L. Fei-Fei. ImageNet: A Large-Scale Hierarchical Image Database. Computer Vision and Pattern Recognition (CVPR), 2009.
-
(2009)
Computer Vision and Pattern Recognition (CVPR)
-
-
Deng, J.1
Dong, W.2
Socher, R.3
Li, L.-J.4
Li, K.5
Fei-Fei, L.6
-
16
-
-
84913555165
-
-
arXiv preprint arXiv: 1408.5093
-
Yangqing Jia, Evan Shelhamer, Jeff Donahue, Sergey Karayev, Jonathan Long, Ross Girshick, Sergio Guadarrama, and Trevor Darrell. Caffe: Convolutional architecture for fast feature embedding. arXiv preprint arXiv: 1408.5093, 2014.
-
(2014)
Caffe: Convolutional Architecture for Fast Feature Embedding
-
-
Jia, Y.1
Shelhamer, E.2
Donahue, J.3
Karayev, S.4
Long, J.5
Girshick, R.6
Guadarrama, S.7
Darrell, T.8
-
18
-
-
50949133669
-
LIBLINEAR: A library for large linear classification
-
Rong-En Fan, Kai-Wei Chang, Cho-Jui Hsieh, Xiang-Rui Wang, and Chih-Jen Lin. LIBLINEAR: A library for large linear classification. Journal of Machine Learning Research, 2008.
-
(2008)
Journal of Machine Learning Research
-
-
Fan, R.-E.1
Chang, K.-W.2
Hsieh, C.-J.3
Wang, X.-R.4
Lin, C.-J.5
-
19
-
-
0000277371
-
Public-key cryptosystems based on composite degree residuosity classes
-
Pascal Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology (EUROCRYPT), 1999.
-
(1999)
Advances in Cryptology (EUROCRYPT)
-
-
Paillier, P.1
-
22
-
-
22044454088
-
Computationally secure oblivious transfer
-
Moni Naor and Benny Pinkas. Computationally secure oblivious transfer. In Journal of Cryptology, 2005.
-
(2005)
Journal of Cryptology
-
-
Naor, M.1
Pinkas, B.2
-
24
-
-
84893321220
-
Fast cut-and-choose based protocols for malicious and covert adversaries
-
Yehuda Lindell. Fast cut-and-choose based protocols for malicious and covert adversaries. In Advances in Cryptology (CRYPTO), 2013.
-
(2013)
Advances in Cryptology (CRYPTO)
-
-
Lindell, Y.1
-
26
-
-
84979917934
-
-
CUDA. http://www.nvidia.com/object/cuda-home-new.html.
-
CUDA
-
-
-
27
-
-
84979872940
-
Color and contrast enhancement by controlled piecewise affine histogram equalization
-
Jose-Luis Lisani, Ana-Belen Petro, and Catalina Sbert. Color and Contrast Enhancement by Controlled Piecewise Affine Histogram Equalization. Image Processing On Line, 2: 243-265, 2012. http://dx.doi.org/10.5201/ipol.2012.lps-pae.
-
(2012)
Image Processing On Line
, vol.2
, pp. 243-265
-
-
Lisani, J.-L.1
Petro, A.-B.2
Sbert, C.3
-
28
-
-
84979892831
-
-
Caffe-Android-Lib. https://github.com/sh1r0/caffe-android-lib.
-
Caffe-Android-Lib
-
-
-
29
-
-
84979889669
-
-
Might Be Evil. http://mightbeevil.org/.
-
Might Be Evil
-
-
-
30
-
-
84979933336
-
-
A universal labeling tool: Sloth. https://cvhci.anthropomatik.kit.edu/~baeuml/projects/a-universal-labelingtool- for-computer-vision-sloth/.
-
A Universal Labeling Tool: Sloth
-
-
-
31
-
-
84870535218
-
-
Monsoon Power Monitor. https://www.msoon.com/LabEquipment/PowerMonitor.
-
Monsoon Power Monitor
-
-
-
33
-
-
84908568771
-
Privacy behaviors of lifeloggers using wearable cameras
-
Roberto Hoyle, Robert Templeman, Steven Armes, Denise Anthony, David Crandall, and Apu Kapadia. Privacy behaviors of lifeloggers using wearable cameras. In ACM International Joint Conference on Pervasive and Ubiquitous Computing (Ubicomp), 2014.
-
(2014)
ACM International Joint Conference on Pervasive and Ubiquitous Computing (Ubicomp)
-
-
Hoyle, R.1
Templeman, R.2
Armes, S.3
Anthony, D.4
Crandall, D.5
Kapadia, A.6
-
34
-
-
84900435254
-
Situ with bystanders of augmented reality glasses: Perspectives on recording and privacy-mediating technologies
-
Tamara Denning, Zakariya Dehlawi, and Tadayoshi Kohno. In situ with bystanders of augmented reality glasses: Perspectives on recording and privacy-mediating technologies. In ACM Conference on Human Factors in Computing Systems (CHI), 2014.
-
(2014)
ACM Conference on Human Factors in Computing Systems (CHI)
-
-
Denning, T.1
Dehlawi, Z.2
Kohno, T.3
-
36
-
-
85092792940
-
Operating system support for augmented reality applications
-
Loris D'Antoni, Alan Dunn, Suman Jana, Tadayoshi Kohno, Benjamin Livshits, David Molnar, Alexander Moshchuk, Eyal Ofek, Franziska Roesner, Scott Saponas, Margus Veanes, and Helen J. Wang. Operating system support for augmented reality applications. In Workshop on Hot Topics in Operating Systems (HotOS), 2013.
-
(2013)
Workshop on Hot Topics in Operating Systems (HotOS)
-
-
D'Antoni, L.1
Dunn, A.2
Jana, S.3
Kohno, T.4
Livshits, B.5
Molnar, D.6
Moshchuk, A.7
Ofek, E.8
Roesner, F.9
Saponas, S.10
Veanes, M.11
Wang, H.J.12
-
38
-
-
84910668443
-
Enabling fine-grained permissions for augmented reality applications with recognizers
-
Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, Helen J. Wang, and Eyal Ofek. Enabling fine-grained permissions for augmented reality applications with recognizers. In Usenix Security Symposium (Usenix Security), 2013.
-
(2013)
Usenix Security Symposium (Usenix Security)
-
-
Jana, S.1
Molnar, D.2
Moshchuk, A.3
Dunn, A.4
Livshits, B.5
Wang, H.J.6
Ofek, E.7
-
39
-
-
84908565957
-
Zero-effort payments: Design, deployment, and lessons
-
Christopher Smowton, Jacob R. Lorch, David Molnar, Stefan Saroiu, and Alec Wolman. Zero-effort payments: Design, deployment, and lessons. In Proceedings of the ACM International Joint Conference on Pervasive and UbiquitousComputing (UbiComp), 2014.
-
(2014)
Proceedings of the ACM International Joint Conference on Pervasive and UbiquitousComputing (UbiComp)
-
-
Smowton, C.1
Lorch, J.R.2
Molnar, D.3
Saroiu, S.4
Wolman, A.5
-
42
-
-
84911443783
-
PANDA: Pose aligned networks for deep attribute modeling
-
Ning Zhang, Manohar Paluri, Marc'Aurelio Ranzato, Trevor Darrell, and Lubomir D. Bourdev. PANDA: Pose aligned networks for deep attribute modeling. In Conference on Computer Vision and Pattern Recognition (CVPR), 2014.
-
(2014)
Conference on Computer Vision and Pattern Recognition (CVPR)
-
-
Zhang, N.1
Paluri, M.2
Ranzato, M.A.3
Darrell, T.4
Bourdev, L.D.5
-
44
-
-
77956684084
-
Plataniotis. An analysis of random projection for changeable and privacy-preserving biometric verification
-
Yongjin Wang and Konstantinos N. Plataniotis. An analysis of random projection for changeable and privacy-preserving biometric verification. IEEE Transactions on Systems, Man, and, Cybernetics: Part B: CYBERNETICS, Vol. 40, No. 5, 2010.
-
(2010)
IEEE Transactions on Systems, Man, and, Cybernetics: Part B: CYBERNETICS
, vol.40
, Issue.5
-
-
Wang, Y.1
Konstantinos, N.2
|