Constructing Distributed Hippocratic Video Databases for Privacy-Preserving Online Patient Training and Counseling
暂无分享,去创建一个
Jianping Fan | Yuli Gao | Noboru Babaguchi | Jinye Peng | Hangzai Luo | Jinye Peng | Yuli Gao | Hangzai Luo | N. Babaguchi | Jianping Fan
[1] Thomas Serre,et al. Hierarchical Classification and Feature Reduction for Fast Face Detection , 2005 .
[2] Charu C. Aggarwal,et al. On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.
[3] Bernhard Schölkopf,et al. Fast Approximation of Support Vector Kernel Expansions, and an Interpretation of Clustering as Approximation in Feature Spaces , 1998, DAGM-Symposium.
[4] John Platt,et al. Probabilistic Outputs for Support vector Machines and Comparisons to Regularized Likelihood Methods , 1999 .
[5] Thomas Serre,et al. Hierarchical classification and feature reduction for fast face detection with support vector machines , 2003, Pattern Recognit..
[6] Moni Naor,et al. Anti-persistence: history independent data structures , 2001, STOC '01.
[7] Anne Adams,et al. Users' perception of privacy in multimedia communication , 1999, CHI Extended Abstracts.
[8] Bradley Malin,et al. Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.
[9] R. Weiss. Bayesian sample size calculations for hypothesis testing , 1997 .
[10] Ramakrishnan Srikant,et al. Hippocratic Databases , 2002, VLDB.
[11] Joydeep Ghosh,et al. Privacy-preserving distributed clustering using generative models , 2003, Third IEEE International Conference on Data Mining.
[12] Daniele Micciancio,et al. Oblivious data structures: applications to cryptography , 1997, STOC '97.
[13] Paul A. Viola,et al. Robust Real-Time Face Detection , 2001, International Journal of Computer Vision.
[14] John Shawe-Taylor,et al. Canonical Correlation Analysis: An Overview with Application to Learning Methods , 2004, Neural Computation.
[15] C. Adcock. Sample size determination : a review , 1997 .
[16] Yuval Ishai,et al. Protecting data privacy in private information retrieval schemes , 1998, STOC '98.
[17] D. Lindley. The choice of sample size , 1997 .
[18] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[19] Nalini Venkatasubramanian,et al. Privacy protecting data collection in media spaces , 2004, MULTIMEDIA '04.
[20] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[21] Isabelle Guyon,et al. What Size Test Set Gives Good Error Rate Estimates? , 1998, IEEE Trans. Pattern Anal. Mach. Intell..
[22] Rathindra Sarathy,et al. Security of random data perturbation methods , 1999, TODS.
[23] Jianping Fan,et al. ClassView: hierarchical video shot classification, indexing, and accessing , 2004, IEEE Transactions on Multimedia.
[24] Shahram Ebadollahi,et al. Echocardiogram videos: summarization, temporal segmentation and browsing , 2002, Proceedings. International Conference on Image Processing.
[25] Jianping Fan,et al. Automatic image segmentation by integrating color-edge extraction and seeded region growing , 2001, IEEE Trans. Image Process..
[26] Alexandre V. Evfimievski,et al. Information sharing across private databases , 2003, SIGMOD '03.
[27] David G. Stork,et al. Computer Manual in MATLAB to Accompany Pattern Classification, Second Edition , 2004 .
[28] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[29] Christopher Edwards,et al. The effects of filtered video on awareness and privacy , 2000, CSCW '00.
[30] Noboru Babaguchi,et al. Privacy protecting visual processing for secure video surveillance , 2008, 2008 15th IEEE International Conference on Image Processing.
[31] Jianping Fan,et al. A novel approach for privacy-preserving video sharing , 2005, CIKM '05.
[32] John R. Smith,et al. Large-scale concept ontology for multimedia , 2006, IEEE MultiMedia.
[33] Sharath Pankanti,et al. Blinkering Surveillance: Enabling Video Privacy through Computer Vision , 2004 .
[34] Christiane Fellbaum,et al. Book Reviews: WordNet: An Electronic Lexical Database , 1999, CL.
[35] Chong K. Liew,et al. A data distortion by probability distribution , 1985, TODS.
[36] Jaideep Vaidya,et al. Privacy-preserving indexing of documents on the network , 2003, The VLDB Journal.
[37] L. Sweeney,et al. Preserving Privacy by De-identifying Facial Images , 2003 .
[38] Brian D. Ripley,et al. Neural Networks and Related Methods for Classification , 1994 .