On Detecting Hidden Wireless Cameras: A Traffic Pattern-based Approach
暂无分享,去创建一个
Wenyuan Xu | Xiaoyu Ji | Tianyang Lu | Yushi Cheng | Wenyuan Xu | Xiaoyu Ji | Yushi Cheng | Tianyang Lu
[1] David J. Crandall,et al. PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces , 2014, NDSS.
[2] Ashwin Ashok,et al. Do not share!: invisible light beacons for signaling preferences to privacy-respecting cameras , 2014, VLCS@MobiCom.
[3] Pierre Geurts,et al. Extremely randomized trees , 2006, Machine Learning.
[4] Xiaodong Lin,et al. Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems , 2009, IEEE Journal on Selected Areas in Communications.
[5] Louis Dunn Fielder,et al. ISO/IEC MPEG-2 Advanced Audio Coding , 1997 .
[6] Andrew W. Moore,et al. A Machine Learning Approach for Efficient Traffic Classification , 2007, 2007 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems.
[7] H. Lilliefors. On the Kolmogorov-Smirnov Test for Normality with Mean and Variance Unknown , 1967 .
[8] Wenyuan Xu,et al. DeWiCam: Detecting Hidden Wireless Cameras via Smartphones , 2018, AsiaCCS.
[9] Dario Rossi,et al. Revealing skype traffic: when randomness plays with you , 2007, SIGCOMM '07.
[10] A. M. Abdullah,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .
[11] Danny Bradbury. Hacking wifi the easy way , 2011, Netw. Secur..
[12] Shuang-Hua Yang,et al. Ipb-frame adaptive mapping mechanism for video transmission over IEEE 802.11e WLANs , 2014, CCRV.
[13] Heiko Schwarz,et al. Overview of the Scalable Video Coding Extension of the H.264/AVC Standard , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[14] Sebastian Zander,et al. A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification , 2006, CCRV.
[15] Giuseppe Anastasi,et al. QoS provided by the IEEE 802.11 wireless LAN to advanced data applications: a simulation analysis , 2000, Wirel. Networks.
[16] Jun Huang,et al. Detecting Wireless Spy Cameras Via Stimulating and Probing , 2018, MobiSys.
[17] Minqiang Jiang,et al. Improved frame-layer rate control for H.264 using MAD ratio , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).
[18] Marco Mellia,et al. Revealing skype traffic: when randomness plays with you , 2007, SIGCOMM 2007.
[19] Chi Zhang,et al. Automating Visual Privacy Protection Using a Smart LED , 2017, MobiCom.
[20] Arash Habibi Lashkari,et al. A survey on wireless security protocols (WEP, WPA and WPA2/802.11i) , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[21] David J. Crandall,et al. Enhancing Lifelogging Privacy by Detecting Screens , 2016, CHI.