-
1
-
-
84979924149
-
I-pic: A platform for privacy-compliant image capture
-
P. Aditya, R. Sen, S. J. Oh, R. Benenson, B. Bhattacharjee, P. Druschel, T. T. Wu, M. Fritz, and B. Schiele. I-pic: A platform for privacy-compliant image capture. MobiSys, 2016.
-
(2016)
MobiSys
-
-
Aditya, P.1
Sen, R.2
Oh, S.J.3
Benenson, R.4
Bhattacharjee, B.5
Druschel, P.6
Wu, T.T.7
Fritz, M.8
Schiele, B.9
-
2
-
-
0022808786
-
A computational approach to edge detection
-
J. Canny. A computational approach to edge detection. TMAPI, 1986.
-
(1986)
TMAPI
-
-
Canny, J.1
-
3
-
-
85047890511
-
Ipshield: A framework for enforcing context-aware privacy
-
S. Chakraborty, C. Shen, K. R. Raghavan, Y. Shoukry, M. Millar, and M. Srivastava. ipshield: A framework for enforcing context-aware privacy. In NSDI, 2014.
-
(2014)
NSDI
-
-
Chakraborty, S.1
Shen, C.2
Raghavan, K.R.3
Shoukry, Y.4
Millar, M.5
Srivastava, M.6
-
6
-
-
84872099372
-
Sensorsift: Balancing sensor data privacy and utility in automated face understanding
-
M. Enev, J. Jung, L. Bo, X. Ren, and T. Kohno. Sensorsift: Balancing sensor data privacy and utility in automated face understanding. ACSAC, 2012.
-
(2012)
ACSAC
-
-
Enev, M.1
Jung, J.2
Bo, L.3
Ren, X.4
Kohno, T.5
-
7
-
-
84874829926
-
What you see is what they get: Protecting users from unwanted use of microphones, cameras, and other sensors
-
IEEE, May
-
J. Howell and S. Schechter. What you see is what they get: Protecting users from unwanted use of microphones, cameras, and other sensors. In Web 2.0 Security and Privacy. IEEE, May 2010.
-
(2010)
Web 2.0 Security and Privacy.
-
-
Howell, J.1
Schechter, S.2
-
8
-
-
84979886229
-
-
Q. T. Inc
-
Q. T. Inc. Trepn Power Profiler. https://developer. qualcomm.com/software/trepn-power-profiler.
-
Trepn Power Profiler
-
-
-
9
-
-
84910668443
-
Enabling fine-grained permissions for augmented reality applications with recognizers
-
S. Jana, D. Molnar, A. Moshchuk, A. Dunn, B. Livshits, H. J. Wang, and E. Ofek. Enabling Fine-Grained Permissions for Augmented Reality Applications With Recognizers. In USENIX Security, 2013.
-
(2013)
USENIX Security
-
-
Jana, S.1
Molnar, D.2
Moshchuk, A.3
Dunn, A.4
Livshits, B.5
Wang, H.J.6
Ofek, E.7
-
10
-
-
84881254099
-
A scanner darkly: Protecting user privacy from perceptual applications
-
S. Jana, A. Narayanan, and V. Shmatikov. A Scanner Darkly: Protecting User Privacy from Perceptual Applications. In S & P, 2013.
-
(2013)
S & P
-
-
Jana, S.1
Narayanan, A.2
Shmatikov, V.3
-
11
-
-
84979887147
-
Screenavoider: Protecting computer screens from ubiquitous cameras
-
M. Korayem, R. Templeman, D. Chen, D. J. Crandall, and A. Kapadia. Screenavoider: Protecting computer screens from ubiquitous cameras. CoRR, 2014.
-
(2014)
CoRR
-
-
Korayem, M.1
Templeman, R.2
Chen, D.3
Crandall, D.J.4
Kapadia, A.5
-
12
-
-
84856647875
-
Brisk: Binary robust invariant scalable keypoints
-
S. Leutenegger, M. Chli, and R. Siegwart. Brisk: Binary robust invariant scalable keypoints. In ICCV, 2011.
-
(2011)
ICCV
-
-
Leutenegger, S.1
Chli, M.2
Siegwart, R.3
-
13
-
-
84959230795
-
Clustering of Static-Adaptive correspondences for deformable object tracking
-
G. Nebehay and R. Pflugfelder. Clustering of Static-Adaptive correspondences for deformable object tracking. In CVPR, 2015.
-
(2015)
CVPR
-
-
Nebehay, G.1
Pflugfelder, R.2
-
14
-
-
84908689805
-
Markit: Privacy markers for protecting visual secrets
-
N. Raval, A. Srivastava, K. Lebeck, L. Cox, and A. Machanavajjhala. Markit: Privacy markers for protecting visual secrets. UbiComp '14 Adjunct, 2014.
-
(2014)
UbiComp '14 Adjunct
-
-
Raval, N.1
Srivastava, A.2
Lebeck, K.3
Cox, L.4
Machanavajjhala, A.5
-
15
-
-
84908679244
-
-
Technical Report MSR-TR-2014-67
-
F. Roesner, D. Molnar, A. Moshchuk, T. Kohno, and H. J. Wang. World-driven access control for continuous sensing. Technical Report MSR-TR-2014-67, 2014.
-
(2014)
World-Driven Access Control for Continuous Sensing
-
-
Roesner, F.1
Molnar, D.2
Moshchuk, A.3
Kohno, T.4
Wang, H.J.5
-
16
-
-
51349121612
-
Respectful cameras: Detecting visual markers in real-time to address privacy concerns
-
J. Schiff, M. Meingast, D. Mulligan, S. Sastry, and K. Goldberg. Respectful cameras: Detecting visual markers in real-time to address privacy concerns. In IROS, 2007.
-
(2007)
IROS
-
-
Schiff, J.1
Meingast, M.2
Mulligan, D.3
Sastry, S.4
Goldberg, K.5
-
18
-
-
0022267462
-
Topological structural analysis of digitized binary images by border following
-
S. Suzuki and K. Abe. Topological structural analysis of digitized binary images by border following. Computer Vision, Graphics, and Image Processing, 1985.
-
(1985)
Computer Vision Graphics and Image Processing
-
-
Suzuki, S.1
Abe, K.2
-
19
-
-
84907397922
-
PlaceAvoider: Steering first-person cameras away from sensitive spaces
-
R. Templeman, M. Korayem, D. Crandall, and A. Kapadia. PlaceAvoider: Steering first-person cameras away from sensitive spaces. In NDSS, 2014.
-
(2014)
NDSS
-
-
Templeman, R.1
Korayem, M.2
Crandall, D.3
Kapadia, A.4
-
20
-
-
84945183726
-
Surroundweb : Mitigating privacy concerns in a 3d web browser
-
May
-
J. Vilk, D. Molnar, E. Ofek, C. Rossbach, B. Livshits, A. Moshchuk, H. J. Wang, and R. Gal. Surroundweb : Mitigating privacy concerns in a 3d web browser. In IEEE Symposium on Security and Privacy, May 2015.
-
(2015)
IEEE Symposium on Security and Privacy
-
-
Vilk, J.1
Molnar, D.2
Ofek, E.3
Rossbach, C.4
Livshits, B.5
Moshchuk, A.6
Wang, H.J.7
Gal, R.8
|