暂无分享,去创建一个
[1] Paul A. Viola,et al. Robust Real-Time Face Detection , 2001, International Journal of Computer Vision.
[2] Brent Waters,et al. Privacy management for portable recording devices , 2004, WPES '04.
[3] Vitaly Shmatikov,et al. A Scanner Darkly: Protecting User Privacy from Perceptual Applications , 2013, 2013 IEEE Symposium on Security and Privacy.
[4] Helen J. Wang,et al. World-Driven Access Control for Continuous Sensing , 2014, CCS.
[5] Deirdre K. Mulligan,et al. Respectful cameras: detecting visual markers in real-time to address privacy concerns , 2007, 2007 IEEE/RSJ International Conference on Intelligent Robots and Systems.
[6] Andrew Zisserman,et al. Deep Face Recognition , 2015, BMVC.
[7] Seong Joon Oh,et al. I-Pic: A Platform for Privacy-Compliant Image Capture , 2016, MobiSys.
[8] Azriel Rosenfeld,et al. Face recognition: A literature survey , 2003, CSUR.
[9] Mário Marques Fernandes,et al. ADVANCES IN FACE DETECTION AND FACIAL IMAGE ANALYSIS , 2018 .
[10] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[11] Noboru Babaguchi,et al. PriSurv: Privacy Protected Video Surveillance System Using Adaptive Visual Abstraction , 2008, MMM.
[12] Shengcai Liao,et al. Learning Face Representation from Scratch , 2014, ArXiv.
[13] Alessandro Acquisti,et al. Face Recognition and Privacy in the Age of Augmented Reality , 2014, J. Priv. Confidentiality.
[14] Matthai Philipose,et al. Courteous glass , 2014, UbiComp Adjunct.
[15] Zhenan Sun,et al. A Lightened CNN for Deep Face Representation , 2015, ArXiv.
[16] Ross B. Girshick,et al. Fast R-CNN , 2015, 1504.08083.
[17] Andrew Zisserman,et al. Hand detection using multiple proposals , 2011, BMVC.
[18] Allen G. Taylor,et al. What Is the Microsoft HoloLens , 2016 .
[19] David J. Crandall,et al. Privacy behaviors of lifeloggers using wearable cameras , 2014, UbiComp.
[20] Tadayoshi Kohno,et al. In situ with bystanders of augmented reality glasses: perspectives on recording and privacy-mediating technologies , 2014, CHI.
[21] R. Shaw. Recognition Markets and Visual Privacy , 2006 .
[22] Xiang-Yang Li,et al. Privacy.tag: privacy concern expressed and respected , 2014, SenSys.
[23] Trevor Darrell,et al. Caffe: Convolutional Architecture for Fast Feature Embedding , 2014, ACM Multimedia.
[24] Helen J. Wang,et al. Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers , 2013, USENIX Security Symposium.
[25] Gang Hua,et al. Labeled Faces in the Wild: A Survey , 2016 .
[26] Matti Pietikäinen,et al. Face Description with Local Binary Patterns: Application to Face Recognition , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[27] David J. Crandall,et al. Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras , 2015, CHI.
[28] Ashwin Machanavajjhala,et al. What You Mark is What Apps See , 2016, MobiSys.
[29] Kaiming He,et al. Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.