A utility-driven surveillance approach to trade-off security and privacy
暂无分享,去创建一个
Klamer Schutte | Henri Bouma | Tommaso Mannucci | Albert G. Huizing | C. Lloyd | K. Schutte | H. Bouma | A. Huizing | T. Mannucci | C. Lloyd
[1] Liang Zhao,et al. Achieving Pareto-Optimal MI-Based Privacy-Utility Tradeoffs Under Full Data , 2018, IEEE Journal of Selected Topics in Signal Processing.
[2] An architecture for sensor modular autonomy for counter-UAS , 2018, Security + Defence.
[3] E. Rowland. Theory of Games and Economic Behavior , 1946, Nature.
[4] Paul A. Thomas,et al. Towards an autonomous sensor architecture for persistent area protection , 2016, Security + Defence.
[5] Xu Tang,et al. PyramidBox: A Context-assisted Single Shot Face Detector , 2018, ECCV.
[6] Shuo Yang,et al. WIDER FACE: A Face Detection Benchmark , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[7] Gabriel C. Birch,et al. History and Evolution of the Johnson Criteria. , 2015 .
[8] Ross B. Girshick,et al. Mask R-CNN , 2017, 1703.06870.
[9] Henri Bouma,et al. Long-term behavior understanding based on the expert-based combination of short-term observations in high-resolution CCTV , 2016, Security + Defence.
[10] Henri Bouma,et al. Flexible human-definable automatic behavior analysis for suspicious activity detection in surveillance cameras to protect critical infrastructures , 2018, Security + Defence.
[11] Pietro Perona,et al. Microsoft COCO: Common Objects in Context , 2014, ECCV.
[12] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[13] John R. Boyd,et al. The Essence of Winning and Losing , 2012 .
[14] J. Pratt. RISK AVERSION IN THE SMALL AND IN THE LARGE11This research was supported by the National Science Foundation (grant NSF-G24035). Reproduction in whole or in part is permitted for any purpose of the United States Government. , 1964 .