Security and privacy in perceptual computing
暂无分享,去创建一个
[1] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[2] Daniel McDuff,et al. Advancements in Noncontact, Multiparameter Physiological Measurements Using a Webcam , 2011, IEEE Transactions on Biomedical Engineering.
[3] Benjamin Livshits,et al. Fast: A Transducer-Based Language for Tree Manipulation , 2015, TOPL.
[4] Baptiste Gourdin. Framing Attacks on Smart Phones and Dumb Routers: Tap-jacking and Geo-localization Attacks , 2010, WOOT.
[5] Michael I. Jordan,et al. Latent Dirichlet Allocation , 2001, J. Mach. Learn. Res..
[6] Panagiotis G. Ipeirotis,et al. Running Experiments on Amazon Mechanical Turk , 2010, Judgment and Decision Making.
[7] Nuno Vasconcelos,et al. Privacy preserving crowd monitoring: Counting people without people models or tracking , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.
[8] Bradley Malin,et al. Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.
[9] Michael D. Buhrmester,et al. Amazon's Mechanical Turk , 2011, Perspectives on psychological science : a journal of the Association for Psychological Science.
[10] Tadayoshi Kohno,et al. A spotlight on security and privacy risks with future household robots: attacks and lessons , 2009, UbiComp.
[11] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[12] Tao Xie,et al. WHYPER: Towards Automating Risk Assessment of Mobile Applications , 2013, USENIX Security Symposium.
[13] John Krumm,et al. A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.
[14] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.
[15] M. Turk,et al. Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.
[16] Michael Isard,et al. Bundling features for large scale partial-duplicate web image search , 2009, CVPR.
[17] Vitaly Shmatikov,et al. The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 Websites , 2013, NDSS.
[18] Steven K. Feiner,et al. A touring machine: Prototyping 3D mobile augmented reality systems for exploring the urban environment , 1997, Digest of Papers. First International Symposium on Wearable Computers.
[19] Sharath Pankanti,et al. Blinkering Surveillance: Enabling Video Privacy through Computer Vision , 2004 .
[20] Brian Larson,et al. Peer Pressure: Distributed Recovery from Attacks in Peer-to-Peer Systems , 2002, NETWORKING Workshops.
[21] Ronald Azuma,et al. Recent Advances in Augmented Reality , 2001, IEEE Computer Graphics and Applications.
[22] Helen J. Wang,et al. Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers , 2013, USENIX Security Symposium.
[23] Tadayoshi Kohno,et al. Security and privacy for augmented reality systems , 2014, Commun. ACM.
[24] Ninghui Li,et al. Android permissions: a perspective combining risks and benefits , 2012, SACMAT '12.
[25] David J. Crandall,et al. PlaceRaider: Virtual Theft in Physical Spaces with Smartphones , 2012, NDSS.
[26] Alastair R. Beresford,et al. MockDroid: trading privacy for application functionality on smartphones , 2011, HotMobile '11.
[27] D. Hand,et al. Unsupervised Profiling Methods for Fraud Detection , 2002 .
[28] Touradj Ebrahimi,et al. Scrambling for Video Surveillance with Privacy , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[29] Petr Sojka,et al. Software Framework for Topic Modelling with Large Corpora , 2010 .
[30] Andy Harter,et al. Parameterisation of a stochastic model for human face identification , 1994, Proceedings of 1994 IEEE Workshop on Applications of Computer Vision.
[31] Dan Boneh,et al. Busting frame busting a study of clickjacking vulnerabilities on popular sites , 2010 .
[32] Benny Pinkas,et al. SCiFI - A System for Secure Face Identification , 2010, 2010 IEEE Symposium on Security and Privacy.
[33] Blair MacIntyre,et al. Browsing the Real-World Wide Web: Maintaining Awareness of Virtual Information in an AR Information Space , 2003, Int. J. Hum. Comput. Interact..
[34] Ronald Azuma,et al. A Survey of Augmented Reality , 1997, Presence: Teleoperators & Virtual Environments.
[35] Cynthia Dwork. The Differential Privacy Frontier , 2009 .
[36] Norman M. Sadeh,et al. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.
[37] Zhen Huang,et al. PScout: analyzing the Android permission specification , 2012, CCS.
[38] James C. Spohrer,et al. Information in Places , 1999, IBM Syst. J..
[39] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[40] Benjamin B. Kimia,et al. Deblurring Gaussian blur , 2015, Comput. Vis. Graph. Image Process..
[41] Jie Liu,et al. Mobile Apps: It's Time to Move Up to CondOS , 2011, HotOS.
[42] Ralph Gross,et al. Model-Based Face De-Identification , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[43] S. Penman. The articulation of price-earnings ratios and market-to-book ratios and the evaluation of growth , 1996 .
[44] Dirk Heylen,et al. Automatic Face Morphing for Transferring Facial Animation , 2003, Computer Graphics and Imaging.
[45] Helen J. Wang,et al. Operating System Support for Augmented Reality Applications , 2013, HotOS.
[46] Andrew W. Fitzgibbon,et al. KinectFusion: Real-time dense surface mapping and tracking , 2011, 2011 10th IEEE International Symposium on Mixed and Augmented Reality.
[47] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[48] Edoardo M. Airoldi,et al. Integrating Utility into Face De-identification , 2005, Privacy Enhancing Technologies.
[49] Paul C. van Oorschot,et al. A methodology for empirical analysis of permission-based security models and its application to android , 2010, CCS '10.
[50] Vitaly Shmatikov,et al. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks , 2014, NDSS.
[51] Jon Howell,et al. What You See is What They Get: Protecting users from unwanted use of microphones, cameras, and other sensors , 2010 .
[52] Quey-Jen Yeh. The Application of Data Envelopment Analysis in Conjunction with Financial Ratios for Bank Performance Evaluation , 1996 .
[53] Toby Sharp,et al. Real-time human pose recognition in parts from single depth images , 2011, CVPR.
[54] Helen J. Wang,et al. Clickjacking: Attacks and Defenses , 2012, USENIX Security Symposium.
[55] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[56] Vitaly Shmatikov,et al. A Scanner Darkly: Protecting User Privacy from Perceptual Applications , 2013, 2013 IEEE Symposium on Security and Privacy.
[57] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[58] Paul A. Viola,et al. Robust Real-time Object Detection , 2001 .
[59] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[60] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[61] Frank McSherry,et al. Privacy integrated queries: an extensible platform for privacy-preserving data analysis , 2009, SIGMOD Conference.
[62] Saikat Guha,et al. Koi: A Location-Privacy Platform for Smartphone Apps , 2012, NSDI.
[63] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[64] M. Calo. People Can Be So Fake: A New Dimension to Privacy and Technology Scholarship , 2009 .
[65] Helen J. Wang,et al. User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems , 2012, 2012 IEEE Symposium on Security and Privacy.
[66] Alessandra Gorla,et al. Checking app behavior against app descriptions , 2014, ICSE.
[67] David A. Wagner,et al. The Effectiveness of Application Permissions , 2011, WebApps.
[68] Jens Grubert,et al. Augmented Reality Browser Survey , 2012 .
[69] Gregory D. Abowd,et al. Cyberguide: A mobile context‐aware tour guide , 1997, Wirel. Networks.
[70] Bernhard Schölkopf,et al. Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.
[71] Ninghui Li,et al. Using probabilistic generative models for ranking risks of Android apps , 2012, CCS.
[72] Collin Jackson,et al. Regular expressions considered harmful in client-side XSS filters , 2010, WWW '10.
[73] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.