Securing Recognizers for Rich Video Applications
暂无分享,去创建一个
[1] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[2] Adam Barth,et al. Protecting Browsers from Extension Vulnerabilities , 2010, NDSS.
[3] Kari Pulli,et al. Realtime Computer Vision with OpenCV , 2012, ACM Queue.
[4] Stephen Smalley,et al. Security Enhanced (SE) Android: Bringing Flexible MAC to Android , 2013, NDSS.
[5] Helen J. Wang,et al. Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers , 2013, USENIX Security Symposium.
[6] Helen J. Wang,et al. User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems , 2012, 2012 IEEE Symposium on Security and Privacy.
[7] Ashwin Machanavajjhala,et al. MarkIt: privacy markers for protecting visual secrets , 2014, UbiComp Adjunct.
[8] Creative Commons,et al. Creative Commons Attribution 3.0 Unported (CC BY 3.0) , 2015 .
[9] Wenke Lee,et al. The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers , 2013, NDSS.
[10] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[11] 王伟,et al. Google Glass:解放双手 , 2013 .
[12] Vitaly Shmatikov,et al. A Scanner Darkly: Protecting User Privacy from Perceptual Applications , 2013, 2013 IEEE Symposium on Security and Privacy.
[13] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[14] David J. Crandall,et al. PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces , 2014, NDSS.