Privacy intelligence: A survey on image privacy in online social networks

C Liu, T Zhu, J Zhang, W Zhou - ACM Computing Surveys, 2022 - dl.acm.org
Image sharing on online social networks (OSNs) has become an indispensable part of daily
social activities, but it has also increased the risk of privacy invasion. An online image can …

Erebus: Access control for augmented reality systems

Y Kim, S Goutam, A Rahmati, A Kaufman - 32nd USENIX Security …, 2023 - usenix.org
Augmented Reality (AR) is widely considered the next evolution in personal devices,
enabling seamless integration of the digital world into our reality. Such integration, however …

Panoptispy: Characterizing audio and video exfiltration from android applications

E Pan, J Ren, M Lindorfer, C Wilson… - … on Privacy Enhancing …, 2018 - petsymposium.org
The high-fidelity sensors and ubiquitous internet connectivity offered by mobile devices have
facilitated an explosion in mobile apps that rely on multimedia features. However, these …

Hidden in plain sight: Exploring privacy risks of mobile augmented reality applications

SM Lehman, AS Alrumayh, K Kolhe, H Ling… - ACM Transactions on …, 2022 - dl.acm.org
Mobile augmented reality systems are becoming increasingly common and powerful, with
applications in such domains as healthcare, manufacturing, education, and more. This rise …

ObscureNet: Learning attribute-invariant latent representation for anonymizing sensor data

O Hajihassnai, O Ardakanian, H Khazaei - Proceedings of the …, 2021 - dl.acm.org
In this paper, we introduce ObscureNet, an encoder-decoder architecture that effectively
conceals private attributes associated with time series data generated by sensors in IoT …

Deep compressive sensing for visual privacy protection in flatcam imaging

T Nguyen Canh, H Nagahara - Proceedings of the IEEE …, 2019 - openaccess.thecvf.com
Detection followed by projection in conventional privacy cameras is vulnerable to software
attacks that threaten to expose image sensor data. By multiplexing the incoming light with a …

Computer Vision for Multimedia Geolocation in Human Trafficking Investigation: A Systematic Literature Review

O Bamigbade, J Sheppard, M Scanlon - arxiv preprint arxiv:2402.15448, 2024 - arxiv.org
The task of multimedia geolocation is becoming an increasingly essential component of the
digital forensics toolkit to effectively combat human trafficking, child sexual exploitation, and …

Aragorn: A Privacy-Enhancing System for Mobile Cameras

H Venugopalan, ZA Din, T Carpenter… - Proceedings of the …, 2024 - dl.acm.org
Mobile app developers often rely on cameras to implement rich features. However, giving
apps unfettered access to the mobile camera poses a privacy threat when camera frames …

[책][B] Auditing Corporate Surveillance Systems: Research Methods for Greater Transparency

I Wagner - 2022 - books.google.com
News headlines about privacy invasions, discrimination, and biases discovered in the
platforms of big technology companies are commonplace today, and big tech's reluctance to …

[PDF][PDF] Sensing Danger: Exploiting Sensors to Build Covert Channels.

T Ulz, M Feldbacher, TW Pieber, C Steger - ICISSP, 2019 - scitepress.org
Recent incidents have shown that sensor-equipped devices can be used by adversaries to
perform malicious activities, such as spying on end-users or for industrial espionage. In this …