Security-Preserving Live 3D Video Surveillance
暂无分享,去创建一个
Zhongze Tang | Huy Phan | Xianglong Feng | Sheng Wei | Bo Yuan | Yao Liu | Yao Liu
[1] M. Jarrahi,et al. To image, or not to image: class-specific diffractive cameras with all-optical erasure of undesired objects , 2022, eLight.
[2] Steve T. K. Jan,et al. It's Not What It Looks Like: Manipulating Perceptual Hashing based Applications , 2021, CCS.
[3] Amro Awad,et al. VR-Spy: A Side-Channel Attack on Virtual Key-Logging in VR Headsets , 2021, 2021 IEEE Virtual Reality and 3D User Interfaces (VR).
[4] Mohamed Khamis,et al. Fast and Secure Authentication in Virtual Reality Using Coordinated 3D Manipulation and Pointing , 2021, ACM Trans. Comput. Hum. Interact..
[5] H. Qi,et al. Landmark Breaker: Obstructing DeepFake By Disturbing Landmark Extraction , 2020, 2020 IEEE International Workshop on Information Forensics and Security (WIFS).
[6] Yi Xie,et al. VVSec: Securing Volumetric Video Streaming via Benign Use of Adversarial Perturbation , 2020, ACM Multimedia.
[7] Chin-Hui Lee,et al. Characterizing Speech Adversarial Examples Using Self-Attention U-Net Enhancement , 2020, ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[8] Qian Zhang,et al. EchoFace: Acoustic Sensor-Based Media Attack Detection for Face Authentication , 2020, IEEE Internet of Things Journal.
[9] Nicu Sebe,et al. First Order Motion Model for Image Animation , 2020, NeurIPS.
[10] Dimitrios Koutsonikolas,et al. How to Evaluate Mobile 360° Video Streaming Systems? , 2020, HotMobile.
[11] Onur Günlü,et al. Differential privacy for eye tracking with temporal correlations , 2020, IACR Cryptol. ePrint Arch..
[12] C. Hellge,et al. Low-latency cloud-based volumetric video streaming using head motion prediction , 2020, NOSSDAV.
[13] Bo Yuan,et al. CAG: A Real-time Low-cost Enhanced-robustness High-transferability Content-aware Adversarial Attack Generator , 2019, AAAI.
[14] Filip De Turck,et al. Towards 6DoF HTTP Adaptive Streaming Through Point Cloud Compression , 2019, ACM Multimedia.
[15] Chenchen Liu,et al. MASKER: Adaptive Mobile Security Enhancement against Automatic Speech Recognition in Eavesdropping , 2019, 2019 56th ACM/IEEE Design Automation Conference (DAC).
[16] Fan Ye,et al. Multi-Modal Face Authentication using Deep Visual and Acoustic Features , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[17] Feng Qian,et al. Toward Practical Volumetric Video Streaming on Commodity Smartphones , 2019, HotMobile.
[18] Chenchen Liu,et al. HAMPER: high-performance adaptive mobile security enhancement against malicious speech and image recognition , 2019, ASP-DAC.
[19] Xin Li,et al. LiveFace: A Multi-task CNN for Fast Face-Authentication , 2018, 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA).
[20] Jaemin Lim,et al. Pinto: Enabling Video Privacy for Commodity IoT Cameras , 2018, CCS.
[21] Lingxiao Wang,et al. Feature Learning for One-Shot Face Recognition , 2018, 2018 25th IEEE International Conference on Image Processing (ICIP).
[22] Stefanos Zafeiriou,et al. ArcFace: Additive Angular Margin Loss for Deep Face Recognition , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[23] Susanne Boll,et al. PrivacEye: privacy-preserving head-mounted eye tracking using egocentric scene image and eye movement features , 2018, ETRA.
[24] Alexei A. Efros,et al. The Unreasonable Effectiveness of Deep Features as a Perceptual Metric , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[25] Isay Katsman,et al. Generative Adversarial Perturbations , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[26] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[27] Tadayoshi Kohno,et al. Securing Augmented Reality Output , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[28] Bhiksha Raj,et al. SphereFace: Deep Hypersphere Embedding for Face Recognition , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[29] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[30] Jan-Michael Frahm,et al. Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos , 2016, USENIX Security Symposium.
[31] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[32] Sanjeev J. Koppal,et al. Sensor-level privacy for thermal cameras , 2016, 2016 IEEE International Conference on Computational Photography (ICCP).
[33] Yue Ming,et al. A unified 3D face authentication framework based on robust local mesh SIFT feature , 2016, Neurocomputing.
[34] Cyril Concolato,et al. MPEG-DASH for Low Latency and Hybrid Streaming Services , 2015, ACM Multimedia.
[35] Robert H. Deng,et al. Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication , 2015, CCS.
[36] Thomas Brox,et al. U-Net: Convolutional Networks for Biomedical Image Segmentation , 2015, MICCAI.
[37] Nikola Pavesic,et al. An overview of face de-identification in still images and videos , 2015, 2015 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG).
[38] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[39] Cyril Concolato,et al. DashCast, A Live DASH Streaming Server , 2013, MMSP 2013.
[40] Fei Peng,et al. An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos , 2013, IEEE Transactions on Information Forensics and Security.
[41] Helen J. Wang,et al. Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers , 2013, USENIX Security Symposium.
[42] Vitaly Shmatikov,et al. A Scanner Darkly: Protecting User Privacy from Perceptual Applications , 2013, 2013 IEEE Symposium on Security and Privacy.
[43] R I Hg,et al. An RGB-D Database Using Microsoft's Kinect for Windows for Face Detection , 2012, 2012 Eighth International Conference on Signal Image Technology and Internet Based Systems.
[44] Touradj Ebrahimi,et al. Subjective study of privacy filters in video surveillance , 2012, 2012 IEEE 14th International Workshop on Multimedia Signal Processing (MMSP).
[45] Iraj Sodagar,et al. The MPEG-DASH Standard for Multimedia Streaming Over the Internet , 2011, IEEE MultiMedia.
[46] Cyril Concolato,et al. GPAC: open source multimedia framework , 2007, ACM Multimedia.
[47] Suramya Tomar,et al. Converting video formats with FFmpeg , 2006 .
[48] Kassem Fawaz,et al. Kalεido: Real-Time Privacy Control for Eye-Tracking Systems , 2021, USENIX Security Symposium.
[49] Wenyao Xu,et al. OcuLock: Exploring Human Visual System for Authentication in Virtual Reality Head-mounted Display , 2020, NDSS.
[50] M. Westerlund. The Emergence of Deepfake Technology: A Review , 2019, Technology Innovation Management Review.
[51] Moustapha Cissé,et al. Countering Adversarial Images using Input Transformations , 2018, ICLR.
[52] Salah Bourennane,et al. Robust multimodal 2D and 3D face authentication using local feature fusion , 2016, Signal Image Video Process..
[53] David J. Crandall,et al. PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces , 2014, NDSS.
[54] Larry Li,et al. Time-of-Flight Camera - An Introduction , 2014 .
[55] Nguyen Minh Duc. Your face is NOT your password Face Authentication ByPassing Lenovo – Asus – Toshiba , 2009 .
[56] Minghua Chen,et al. Hiding privacy information in video surveillance system , 2005, IEEE International Conference on Image Processing 2005.