메뉴 건너뛰기




Volumn , Issue , 2016, Pages 249-261

What you mark is what apps see

Author keywords

[No Author keywords available]

Indexed keywords

FEEDBACK;

EID: 84979938897     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2906388.2906405     Document Type: Conference Paper
Times cited : (49)

References (21)
  • 2
    • 0022808786 scopus 로고
    • A computational approach to edge detection
    • J. Canny. A computational approach to edge detection. TMAPI, 1986.
    • (1986) TMAPI
    • Canny, J.1
  • 6
    • 84872099372 scopus 로고    scopus 로고
    • Sensorsift: Balancing sensor data privacy and utility in automated face understanding
    • M. Enev, J. Jung, L. Bo, X. Ren, and T. Kohno. Sensorsift: Balancing sensor data privacy and utility in automated face understanding. ACSAC, 2012.
    • (2012) ACSAC
    • Enev, M.1    Jung, J.2    Bo, L.3    Ren, X.4    Kohno, T.5
  • 7
    • 84874829926 scopus 로고    scopus 로고
    • What you see is what they get: Protecting users from unwanted use of microphones, cameras, and other sensors
    • IEEE, May
    • J. Howell and S. Schechter. What you see is what they get: Protecting users from unwanted use of microphones, cameras, and other sensors. In Web 2.0 Security and Privacy. IEEE, May 2010.
    • (2010) Web 2.0 Security and Privacy.
    • Howell, J.1    Schechter, S.2
  • 8
    • 84979886229 scopus 로고    scopus 로고
    • Q. T. Inc
    • Q. T. Inc. Trepn Power Profiler. https://developer. qualcomm.com/software/trepn-power-profiler.
    • Trepn Power Profiler
  • 10
    • 84881254099 scopus 로고    scopus 로고
    • A scanner darkly: Protecting user privacy from perceptual applications
    • S. Jana, A. Narayanan, and V. Shmatikov. A Scanner Darkly: Protecting User Privacy from Perceptual Applications. In S & P, 2013.
    • (2013) S & P
    • Jana, S.1    Narayanan, A.2    Shmatikov, V.3
  • 12
    • 84856647875 scopus 로고    scopus 로고
    • Brisk: Binary robust invariant scalable keypoints
    • S. Leutenegger, M. Chli, and R. Siegwart. Brisk: Binary robust invariant scalable keypoints. In ICCV, 2011.
    • (2011) ICCV
    • Leutenegger, S.1    Chli, M.2    Siegwart, R.3
  • 13
    • 84959230795 scopus 로고    scopus 로고
    • Clustering of Static-Adaptive correspondences for deformable object tracking
    • G. Nebehay and R. Pflugfelder. Clustering of Static-Adaptive correspondences for deformable object tracking. In CVPR, 2015.
    • (2015) CVPR
    • Nebehay, G.1    Pflugfelder, R.2
  • 16
    • 51349121612 scopus 로고    scopus 로고
    • Respectful cameras: Detecting visual markers in real-time to address privacy concerns
    • J. Schiff, M. Meingast, D. Mulligan, S. Sastry, and K. Goldberg. Respectful cameras: Detecting visual markers in real-time to address privacy concerns. In IROS, 2007.
    • (2007) IROS
    • Schiff, J.1    Meingast, M.2    Mulligan, D.3    Sastry, S.4    Goldberg, K.5
  • 18
    • 0022267462 scopus 로고
    • Topological structural analysis of digitized binary images by border following
    • S. Suzuki and K. Abe. Topological structural analysis of digitized binary images by border following. Computer Vision, Graphics, and Image Processing, 1985.
    • (1985) Computer Vision Graphics and Image Processing
    • Suzuki, S.1    Abe, K.2
  • 19
    • 84907397922 scopus 로고    scopus 로고
    • PlaceAvoider: Steering first-person cameras away from sensitive spaces
    • R. Templeman, M. Korayem, D. Crandall, and A. Kapadia. PlaceAvoider: Steering first-person cameras away from sensitive spaces. In NDSS, 2014.
    • (2014) NDSS
    • Templeman, R.1    Korayem, M.2    Crandall, D.3    Kapadia, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.