What You Mark is What Apps See
暂无分享,去创建一个
Ashwin Machanavajjhala | Kiron Lebeck | Landon P. Cox | Ali Razeen | Nisarg Raval | Animesh Srivastava | Ashwin Machanavajjhala | Kiron Lebeck | Animesh Srivastava | Nisarg Raval | Ali Razeen
[1] Tadayoshi Kohno,et al. SensorSift: balancing sensor data privacy and utility in automated face understanding , 2012, ACSAC '12.
[2] John F. Canny,et al. A Computational Approach to Edge Detection , 1986, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[3] M. Vijay Venkatesh,et al. Privacy Protection for Life-log Video , 2007 .
[4] Jon Howell,et al. What You See is What They Get: Protecting users from unwanted use of microphones, cameras, and other sensors , 2010 .
[5] Vitaly Shmatikov,et al. A Scanner Darkly: Protecting User Privacy from Perceptual Applications , 2013, 2013 IEEE Symposium on Security and Privacy.
[6] Carlo Tomasi,et al. Good features to track , 1994, 1994 Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
[7] Deirdre K. Mulligan,et al. Respectful cameras: detecting visual markers in real-time to address privacy concerns , 2007, 2007 IEEE/RSJ International Conference on Intelligent Robots and Systems.
[8] David J. Crandall,et al. PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces , 2014, NDSS.
[9] David H. Douglas,et al. ALGORITHMS FOR THE REDUCTION OF THE NUMBER OF POINTS REQUIRED TO REPRESENT A DIGITIZED LINE OR ITS CARICATURE , 1973 .
[10] Ashwin Machanavajjhala,et al. MarkIt: privacy markers for protecting visual secrets , 2014, UbiComp Adjunct.
[11] Seong Joon Oh,et al. I-Pic: A Platform for Privacy-Compliant Image Capture , 2016, MobiSys.
[12] Helen J. Wang,et al. SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser , 2015, 2015 IEEE Symposium on Security and Privacy.
[13] Helen J. Wang,et al. World-Driven Access Control for Continuous Sensing , 2014, CCS.
[14] Helen J. Wang,et al. Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers , 2013, USENIX Security Symposium.
[15] Keiichi Abe,et al. Topological structural analysis of digitized binary images by border following , 1985, Comput. Vis. Graph. Image Process..
[16] Roland Siegwart,et al. BRISK: Binary Robust invariant scalable keypoints , 2011, 2011 International Conference on Computer Vision.
[17] Mani B. Srivastava,et al. ipShield: A Framework For Enforcing Context-Aware Privacy , 2014, NSDI.
[18] David J. Crandall,et al. ScreenAvoider: Protecting Computer Screens from Ubiquitous Cameras , 2014, ArXiv.
[19] Roman P. Pflugfelder,et al. Clustering of static-adaptive correspondences for deformable object tracking , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[20] J.-Y. Bouguet,et al. Pyramidal implementation of the lucas kanade feature tracker , 1999 .