Cloak of Invisibility: Privacy-Friendly Photo Capturing and Sharing System
暂无分享,去创建一个
Yunhao Liu | Xiang-Yang Li | Kebin Liu | Lan Zhang | Xuan Ding | Cihang Liu | Yunhao Liu | Xiangyang Li | Xuan Ding | Kebin Liu | Cihang Liu | Lan Zhang
[1] Patrick Pérez,et al. Region filling and object removal by exemplar-based image inpainting , 2004, IEEE Transactions on Image Processing.
[2] Ming Yang,et al. DeepFace: Closing the Gap to Human-Level Performance in Face Verification , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[3] Yunhao Liu,et al. It starts with iGaze: visual attention driven networking with smart glasses , 2014, MobiCom.
[4] Jie Yang,et al. Push the limit of WiFi based localization for smartphones , 2012, Mobicom '12.
[5] B. S. Manjunath,et al. Unsupervised Segmentation of Color-Texture Regions in Images and Video , 2001, IEEE Trans. Pattern Anal. Mach. Intell..
[6] Chenshu Wu,et al. Automatic Radio Map Adaptation for Indoor Localization Using Smartphones , 2018, IEEE Transactions on Mobile Computing.
[7] Bernt Schiele,et al. Pedestrian detection in crowded scenes , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[8] Sharath Pankanti,et al. Enabling video privacy through computer vision , 2005, IEEE Security & Privacy Magazine.
[9] Jun Luo,et al. Person-Specific SIFT Features for Face Recognition , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[10] Emmanuel Bresson,et al. Provably authenticated group Diffie-Hellman key exchange , 2001, CCS '01.
[11] Yunhao Liu,et al. Message in a Sealed Bottle: Privacy Preserving Friending in Mobile Social Networks , 2015, IEEE Transactions on Mobile Computing.
[12] Xiang-Yang Li,et al. Privacy.tag: privacy concern expressed and respected , 2014, SenSys.
[13] Yvo Desmedt,et al. A Secure and Efficient Conference Key Distribution System (Extended Abstract) , 1994, EUROCRYPT.
[14] Aryya Gangopadhyay,et al. A privacy-preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms , 2006, The VLDB Journal.
[15] Jonathan Katz,et al. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.
[16] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[17] Yunhao Liu,et al. PIC: Enable Large-Scale Privacy Preserving Content-Based Image Search on Cloud , 2015, IEEE Transactions on Parallel and Distributed Systems.
[18] Norbert Krüger,et al. Face Recognition by Elastic Bunch Graph Matching , 1997, CAIP.
[19] Jiaqi Guo. Image Reconstruction based on Local feature Descriptors , 2011 .
[20] Charless C. Fowlkes,et al. Contour Detection and Hierarchical Image Segmentation , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[21] Safwat G. Zaky,et al. Fingerprint identification using graph matching , 1986, Pattern Recognit..
[22] Leonidas J. Guibas,et al. Graph Matching with Anchor Nodes: A Learning Approach , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.
[23] M. Turk,et al. Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.
[24] H. Kuhn. The Hungarian method for the assignment problem , 1955 .
[25] Paul A. Viola,et al. Robust Real-Time Face Detection , 2001, Proceedings Eighth IEEE International Conference on Computer Vision. ICCV 2001.
[26] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[27] Nikos Komodakis,et al. Image Completion Using Global Optimization , 2006, 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06).
[28] Yunhao Liu,et al. STPP: Spatial-Temporal Phase Profiling-Based Method for Relative RFID Tag Localization , 2017, IEEE/ACM Transactions on Networking.
[29] Mahadev Satyanarayanan,et al. Scalable crowd-sourcing of video from mobile devices , 2013, MobiSys '13.
[30] David J. Crandall,et al. Privacy behaviors of lifeloggers using wearable cameras , 2014, UbiComp.
[31] David K. Y. Yau,et al. Distributed collaborative key agreement and authentication protocols for dynamic peer groups , 2006, TNET.
[32] Bradley Malin,et al. Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.
[33] Taeho Jung,et al. Search me if you can: Privacy-preserving location query service , 2012, 2013 Proceedings IEEE INFOCOM.
[34] Nicole Immorlica,et al. Locality-sensitive hashing scheme based on p-stable distributions , 2004, SCG '04.
[35] Yunhao Liu,et al. Privacy-friendly photo capturing and sharing system , 2016, UbiComp.
[36] David J. Kriegman,et al. Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.
[37] Emmanuel Bresson,et al. Group Die-Hellman Key Exchange Secure Against Dictionary Attacks (Extended abstract) , 2002 .
[38] Yunhao Liu,et al. POP: Privacy-Preserving Outsourced Photo Sharing and Searching for Mobile Devices , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.