I-Pic: A Platform for Privacy-Compliant Image Capture
暂无分享,去创建一个
Seong Joon Oh | Bernt Schiele | Mario Fritz | Paarijaat Aditya | Bobby Bhattacharjee | Peter Druschel | Rodrigo Benenson | Rijurekha Sen | Tong Tong Wu | P. Druschel | Mario Fritz | B. Schiele | Rodrigo Benenson | Paarijaat Aditya | Rijurekha Sen | Bobby Bhattacharjee | Tongyu Wu
[1] Ashwin Machanavajjhala,et al. What You Mark is What Apps See , 2016, MobiSys.
[2] Xiang-Yang Li,et al. Privacy.tag: privacy concern expressed and respected , 2014, SenSys.
[3] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[4] Jose Luis Lisani,et al. Color and Contrast Enhancement by Controlled Piecewise Affine Histogram Equalization , 2012, Image Process. Line.
[5] Yehuda Lindell. Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries , 2013, CRYPTO.
[6] Trevor Darrell,et al. Caffe: Convolutional Architecture for Fast Feature Embedding , 2014, ACM Multimedia.
[7] Patrick Pérez,et al. Region filling and object removal by exemplar-based image inpainting , 2004, IEEE Transactions on Image Processing.
[8] Fei-Fei Li,et al. ImageNet: A large-scale hierarchical image database , 2009, 2009 IEEE Conference on Computer Vision and Pattern Recognition.
[9] Subhransu Maji,et al. Describing people: A poselet-based approach to attribute classification , 2011, 2011 International Conference on Computer Vision.
[10] Ming Yang,et al. DeepFace: Closing the Gap to Human-Level Performance in Face Verification , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[11] Vitaly Shmatikov,et al. A Scanner Darkly: Protecting User Privacy from Perceptual Applications , 2013, 2013 IEEE Symposium on Security and Privacy.
[12] Yuval Ishai,et al. Extending Oblivious Transfers Efficiently , 2003, CRYPTO.
[13] Jian-Huang Lai,et al. Security algorithm of face recognition based on local binary pattern and random projection , 2010, IEEE ICCI.
[14] Moni Naor,et al. Computationally Secure Oblivious Transfer , 2004, Journal of Cryptology.
[15] Deva Ramanan,et al. Face detection, pose estimation, and landmark localization in the wild , 2012, 2012 IEEE Conference on Computer Vision and Pattern Recognition.
[16] Helen J. Wang,et al. Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers , 2013, USENIX Security Symposium.
[17] Chih-Jen Lin,et al. LIBLINEAR: A Library for Large Linear Classification , 2008, J. Mach. Learn. Res..
[18] Bart Goethals,et al. On Private Scalar Product Computation for Privacy-Preserving Data Mining , 2004, ICISC.
[19] Erik Learned-Miller,et al. Labeled Faces in the Wild : Updates and New Reporting Procedures , 2014 .
[20] Per A. Hallgren,et al. InnerCircle: A parallelizable decentralized privacy-preserving location proximity protocol , 2015, 2015 13th Annual Conference on Privacy, Security and Trust (PST).
[21] Jonathan Katz,et al. Efficient Privacy-Preserving Biometric Identification , 2011, NDSS.
[22] Ning Zhang,et al. Beyond frontal faces: Improving Person Recognition using multiple cues , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[23] Ashwin Machanavajjhala,et al. MarkIt: privacy markers for protecting visual secrets , 2014, UbiComp Adjunct.
[24] Helen J. Wang,et al. Operating System Support for Augmented Reality Applications , 2013, HotOS.
[25] Konstantinos N. Plataniotis,et al. An Analysis of Random Projection for Changeable and Privacy-Preserving Biometric Verification , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[26] Seong Joon Oh,et al. Person Recognition in Personal Photo Collections , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[27] Luc Van Gool,et al. Face Detection without Bells and Whistles , 2014, ECCV.
[28] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[29] Matthai Philipose,et al. Courteous glass , 2014, UbiComp Adjunct.
[30] Li Zhang,et al. Controllable face privacy , 2015, FG.
[31] Helen J. Wang,et al. World-Driven Access Control for Continuous Sensing , 2014, CCS.
[32] David J. Crandall,et al. Privacy behaviors of lifeloggers using wearable cameras , 2014, UbiComp.
[33] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[34] Alec Wolman,et al. Zero-effort payments: design, deployment, and lessons , 2014, UbiComp.
[35] Trevor Darrell,et al. PANDA: Pose Aligned Networks for Deep Attribute Modeling , 2013, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[36] Tadayoshi Kohno,et al. In situ with bystanders of augmented reality glasses: perspectives on recording and privacy-mediating technologies , 2014, CHI.