On the Privacy Risks of Virtual Keyboards: Automatic Reconstruction of Typed Input from Compromising Reflections
暂无分享,去创建一个
Jan-Michael Frahm | Yi Xu | Fabian Monrose | Andrew M. White | Rahul Raguram | Pierre Fite Georgel | R. Raguram | Jan-Michael Frahm | F. Monrose | P. Georgel | A. M. White | Yi Xu
[1] Jan-Michael Frahm,et al. iSpy: automatic reconstruction of typed input from compromising reflections , 2011, CCS '11.
[2] Michael Riley,et al. Speech Recognition by Composition of Weighted Finite Automata , 1996, ArXiv.
[3] James H. Martin,et al. Speech and language processing: an introduction to natural language processing, computational linguistics, and speech recognition, 2nd Edition , 2000, Prentice Hall series in artificial intelligence.
[4] Bernhard P. Wrobel,et al. Multiple View Geometry in Computer Vision , 2001 .
[5] Martin Welk,et al. Tempest in a Teapot: Compromising Reflections Revisited , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[6] B. Ripley,et al. Robust Statistics , 2018, Wiley Series in Probability and Statistics.
[7] Peter J. Huber,et al. Robust Statistics , 2005, Wiley Series in Probability and Statistics.
[8] George R. Doddington,et al. Automatic Evaluation of Machine Translation Quality Using N-gram Co-Occurrence Statistics , 2002 .
[9] Markus G. Kuhn,et al. Optical time-domain eavesdropping risks of CRT displays , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[10] Patrick Traynor,et al. (sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers , 2011, CCS '11.
[11] Rakesh Agrawal,et al. Keyboard acoustic emanations , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[12] Yoav Freund,et al. A decision-theoretic generalization of on-line learning and an application to boosting , 1995, EuroCOLT.
[13] Giacomo Boracchi,et al. A fast eavesdropping attack against touchscreens , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).
[14] Horst Bischof,et al. Semi-supervised On-Line Boosting for Robust Tracking , 2008, ECCV.
[15] Matti Pietikäinen,et al. Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[16] Luc Van Gool,et al. Beyond semi-supervised tracking: Tracking should be as simple as detection, but not simpler than recognition , 2009, 2009 IEEE 12th International Conference on Computer Vision Workshops, ICCV Workshops.
[17] David A. Umphress,et al. Information leakage from optical emanations , 2002, TSEC.
[18] Martin Vuagnoux,et al. Compromising Electromagnetic Emanations of Wired and Wireless Keyboards , 2009, USENIX Security Symposium.
[19] Giovanni Vigna,et al. ClearShot: Eavesdropping on Keyboard Input from Video , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[20] Wim van Eck,et al. Electromagnetic radiation from video display units: An eavesdropping risk? , 1985, Comput. Secur..
[21] Jan-Michael Frahm,et al. A Comparative Analysis of RANSAC Techniques Leading to Adaptive Real-Time Random Sample Consensus , 2008, ECCV.
[22] Jiri Matas,et al. Forward-Backward Error: Automatic Detection of Tracking Failures , 2010, 2010 20th International Conference on Pattern Recognition.
[23] Feng Zhou,et al. Keyboard acoustic emanations revisited , 2005, CCS '05.
[24] Harold Joseph Highland,et al. Electromagnetic radiation revisited , 1986, Computers & security.
[25] Manuel Blum,et al. reCAPTCHA: Human-Based Character Recognition via Web Security Measures , 2008, Science.
[26] Anil K. Jain,et al. Text information extraction in images and video: a survey , 2004, Pattern Recognit..
[27] Michael Backes,et al. 2008 IEEE Symposium on Security and Privacy Compromising Reflections –or– How to Read LCD Monitors Around the Corner , 2022 .
[28] Alon Lavie,et al. Choosing the Right Evaluation for Machine Translation: an Examination of Annotator and Automatic Metric Performance on Human Judgment Tasks , 2010, AMTA.
[29] Horst Bischof,et al. Real-Time Tracking via On-line Boosting , 2006, BMVC.
[30] Markus G. Kuhn,et al. Electromagnetic Eavesdropping Risks of Flat-Panel Displays , 2004, Privacy Enhancing Technologies.
[31] Michael K. Reiter,et al. The security of modern password expiration: an algorithmic framework and empirical analysis , 2010, CCS '10.
[32] Robert C. Bolles,et al. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.
[33] Paul A. Viola,et al. Rapid object detection using a boosted cascade of simple features , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.
[34] Yair Weiss,et al. Learning object detection from a small number of examples: the importance of good features , 2004, Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2004. CVPR 2004..
[35] Salim Roukos,et al. Bleu: a Method for Automatic Evaluation of Machine Translation , 2002, ACL.
[36] Alon Lavie,et al. Evaluating the Output of Machine Translation Systems , 2010, AMTA.
[37] Paul A. Viola,et al. Robust Real-Time Face Detection , 2001, International Journal of Computer Vision.
[38] G LoweDavid,et al. Distinctive Image Features from Scale-Invariant Keypoints , 2004 .
[39] Hervé Bourlard,et al. On the Use of Information Retrieval Measures for Speech Recognition Evaluation , 2004 .
[40] Alon Lavie,et al. The Meteor metric for automatic evaluation of machine translation , 2009, Machine Translation.