Viewer Experience of Obscuring Scene Elements in Photos to Enhance Privacy
暂无分享,去创建一个
David J. Crandall | Rakibul Hasan | Apu Kapadia | Kelly Caine | Roberto Hoyle | Eman T. Hassan | Yifang Li | Apu Kapadia | Kelly E. Caine | Roberto Hoyle | Rakibul Hasan | Yifang Li
[1] Ieee Xplore,et al. IEEE Transactions on Pattern Analysis and Machine Intelligence Information for Authors , 2022, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[2] Mario Fritz,et al. Ask Your Neurons: A Neural-Based Approach to Answering Questions about Images , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[3] Laura A. Dabbish,et al. Privacy Attitudes of Mechanical Turk Workers and the U.S. Public , 2014, SOUPS.
[4] Jiasen Lu,et al. Hierarchical Question-Image Co-Attention for Visual Question Answering , 2016, NIPS.
[5] Wei Shen,et al. Learning Residual Images for Face Attribute Manipulation , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[6] Milena M. Head,et al. Exploring human images in website design: a multi-method approach , 2009 .
[7] Matthew Lease,et al. Crowdsourcing for Usability Testing , 2012, ASIST.
[8] Ramesh Govindan,et al. P3: Toward Privacy-Preserving Photo Sharing , 2013, NSDI.
[9] Hovav Shacham,et al. On the (In)effectiveness of Mosaicing and Blurring as Tools for Document Redaction , 2016, Proc. Priv. Enhancing Technol..
[10] M. Khan,et al. SOCIOLINGVISTIKA/ SOCIOLINGUISTICS Academic Sojourners, Culture Shock and Intercultural Adaptation: a Trend Analysis , 2007 .
[11] Carman Neustaedter,et al. You are Being Watched: Bystanders' Perspective on the Use of Camera Devices in Public Spaces , 2016, CHI Extended Abstracts.
[12] Shengcai Liao,et al. A Fast and Accurate Unconstrained Face Detector , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[13] David J. Crandall,et al. Privacy behaviors of lifeloggers using wearable cameras , 2014, UbiComp.
[14] Masood Masoodian,et al. Sharing, privacy and trust issues for photo collections , 2007 .
[15] Shree K. Nayar,et al. Face swapping: automatically replacing faces in photographs , 2008, SIGGRAPH 2008.
[16] Ralph Gross,et al. Face De-identification , 2009, Protecting Privacy in Video Surveillance.
[17] Ivan Sikiric,et al. I Know That Person: Generative Full Body and Face De-identification of People in Images , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[18] David J. Crandall,et al. Cartooning for Enhanced Privacy in Lifelogging and Streaming Videos , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[19] William J. Doll,et al. The Measurement of End-User Computing Satisfaction , 1988, MIS Q..
[20] Alfred Kobsa,et al. Privacy preference modeling and prediction in a simulated campuswide IoT environment , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[21] Touradj Ebrahimi,et al. Using face morphing to protect privacy , 2013, 2013 10th IEEE International Conference on Advanced Video and Signal Based Surveillance.
[22] Ali Farhadi,et al. YOLO9000: Better, Faster, Stronger , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[23] Bill Tomlinson,et al. Who are the crowdworkers?: shifting demographics in mechanical turk , 2010, CHI Extended Abstracts.
[24] Sunny Consolvo,et al. Living in a glass house: a survey of private moments in the home , 2011, UbiComp '11.
[25] Noboru Babaguchi,et al. Facial expression preserving privacy protection using image melding , 2015, 2015 IEEE International Conference on Multimedia and Expo (ICME).
[26] Bernard J. Jansen,et al. Almighty Twitter, what are people asking for? , 2012, ASIST.
[27] Ruimin Hu,et al. Face Super-Resolution via Multilayer Locality-Constrained Iterative Neighbor Embedding and Intermediate Dictionary Learning , 2014, IEEE Transactions on Image Processing.
[28] Wei Liu,et al. SSD: Single Shot MultiBox Detector , 2015, ECCV.
[29] Serge J. Belongie,et al. Removing pedestrians from Google street view images , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops.
[30] Christopher Edwards,et al. The effects of filtered video on awareness and privacy , 2000, CSCW '00.
[31] Hongxin Hu,et al. Effectiveness and Users' Experience of Obfuscation as a Privacy-Enhancing Technology for Sharing Photos , 2017, Proc. ACM Hum. Comput. Interact..
[32] Hongxia Jin,et al. Privacy-CNH: A Framework to Detect Photo Privacy with Convolutional Neural Network using Hierarchical Features , 2016, AAAI.
[33] Carman Neustaedter,et al. Blur filtration fails to preserve privacy for home-based video conferencing , 2006, TCHI.
[34] Gail-Joon Ahn,et al. Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks , 2017, SACMAT.
[35] Mor Naaman,et al. Over-exposed?: privacy patterns and considerations in online and mobile photo sharing , 2007, CHI.
[36] Andrew Senior. Protecting Privacy in Video Surveillance , 2009 .
[37] Ming-Hsuan Yang,et al. Generative Face Completion , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[38] Hongxin Hu,et al. Effectiveness and Users’ Experience of Face Blurring as a Privacy Protection for Sharing Photos via Online Social Networks , 2017 .
[39] Bin Liu,et al. PUPPIES: Transformation-Supported Personalized Privacy Preserving Partial Image Sharing , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[40] Xiaoming Liu,et al. Disentangled Representation Learning GAN for Pose-Invariant Face Recognition , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[41] Vitaly Shmatikov,et al. Defeating Image Obfuscation with Deep Learning , 2016, ArXiv.
[42] Peter B. Seddon,et al. A Partial Test and Development of Delone and Mclean's Model of IS Success , 1996, Australas. J. Inf. Syst..
[43] Hongxin Hu,et al. Blur vs. Block: Investigating the Effectiveness of Privacy-Enhancing Obfuscation for Images , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[44] Jeffrey P. Bigham,et al. VizWiz: nearly real-time answers to visual questions , 2010, W4A.
[45] Xiaoming Liu,et al. Attribute preserved face de-identification , 2015, 2015 International Conference on Biometrics (ICB).
[46] Li Zhang,et al. Controllable Face Privacy , 2015, 2015 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG).
[47] Edoardo M. Airoldi,et al. Integrating Utility into Face De-identification , 2005, Privacy Enhancing Technologies.
[48] Margaret Mitchell,et al. VQA: Visual Question Answering , 2015, International Journal of Computer Vision.
[49] Scott E. Hudson,et al. Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems , 1996, CSCW '96.
[50] Yunhao Liu,et al. POP: Privacy-Preserving Outsourced Photo Sharing and Searching for Mobile Devices , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.
[51] A. Meade,et al. Identifying careless responses in survey data. , 2012, Psychological methods.