暂无分享,去创建一个
Ang Li | Wei Du | Qinghua Li
[1] Helen J. Wang,et al. Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers , 2013, USENIX Security Symposium.
[2] Matthai Philipose,et al. Courteous glass , 2014, UbiComp Adjunct.
[3] Zheng Zhang,et al. MXNet: A Flexible and Efficient Machine Learning Library for Heterogeneous Distributed Systems , 2015, ArXiv.
[4] Azriel Rosenfeld,et al. Computer Vision , 1988, Adv. Comput..
[5] Donghoon Lee,et al. Face attribute classification using attribute-aware correlation map and gated convolutional neural networks , 2015, 2015 IEEE International Conference on Image Processing (ICIP).
[6] He Wang,et al. Visually Fingerprinting Humans without Face Recognition , 2015, MobiSys.
[7] Xiaogang Wang,et al. Deep Learning Face Attributes in the Wild , 2014, 2015 IEEE International Conference on Computer Vision (ICCV).
[8] Mehrbakhsh Nilashi,et al. Collaborative filtering recommender systems , 2013 .
[9] Yin Zhang,et al. Secure friend discovery in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.
[10] David J. Crandall,et al. Reactive security: responding to visual stimuli from wearable cameras , 2014, UbiComp Adjunct.
[11] Shree K. Nayar,et al. FaceTracer: A Search Engine for Large Collections of Images with Faces , 2008, ECCV.
[12] Qinghua Li,et al. PrivacyCamera: Cooperative Privacy-Aware Photographing with Mobile Phones , 2016, 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
[13] Yunhao Liu,et al. Privacy-friendly photo capturing and sharing system , 2016, UbiComp.
[14] Linda G. Shapiro,et al. Computer Vision , 2001 .
[15] Marwan Mattar,et al. Labeled Faces in the Wild: A Database forStudying Face Recognition in Unconstrained Environments , 2008 .
[16] Xiaoou Tang,et al. Learning Social Relation Traits from Face Images , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[17] Rajeev Gandhi,et al. Short paper: CHIPS: content-based heuristics for improving photo privacy for smartphones , 2014, WiSec '14.
[18] Vitaly Shmatikov,et al. A Scanner Darkly: Protecting User Privacy from Perceptual Applications , 2013, 2013 IEEE Symposium on Security and Privacy.
[19] Deirdre K. Mulligan,et al. Respectful cameras: detecting visual markers in real-time to address privacy concerns , 2007, 2007 IEEE/RSJ International Conference on Intelligent Robots and Systems.
[20] David J. Crandall,et al. PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces , 2014, NDSS.
[21] U. Hengartner,et al. NotiSense : An Urban Sensing Notification System To Improve Bystander Privacy , 2011 .
[22] Xiang-Yang Li,et al. Privacy.tag: privacy concern expressed and respected , 2014, SenSys.
[23] Yang Guo,et al. A survey on peer-to-peer video streaming systems , 2008, Peer-to-Peer Netw. Appl..
[24] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[25] Ashwin Machanavajjhala,et al. MarkIt: privacy markers for protecting visual secrets , 2014, UbiComp Adjunct.
[26] Jin H. Im,et al. Privacy , 2002, Encyclopedia of Information Systems.