Privacy intelligence: A survey on image privacy in online social networks
Image sharing on online social networks (OSNs) has become an indispensable part of daily
social activities, but it has also increased the risk of privacy invasion. An online image can …
social activities, but it has also increased the risk of privacy invasion. An online image can …
Erebus: Access control for augmented reality systems
Augmented Reality (AR) is widely considered the next evolution in personal devices,
enabling seamless integration of the digital world into our reality. Such integration, however …
enabling seamless integration of the digital world into our reality. Such integration, however …
Panoptispy: Characterizing audio and video exfiltration from android applications
The high-fidelity sensors and ubiquitous internet connectivity offered by mobile devices have
facilitated an explosion in mobile apps that rely on multimedia features. However, these …
facilitated an explosion in mobile apps that rely on multimedia features. However, these …
Hidden in plain sight: Exploring privacy risks of mobile augmented reality applications
Mobile augmented reality systems are becoming increasingly common and powerful, with
applications in such domains as healthcare, manufacturing, education, and more. This rise …
applications in such domains as healthcare, manufacturing, education, and more. This rise …
ObscureNet: Learning attribute-invariant latent representation for anonymizing sensor data
In this paper, we introduce ObscureNet, an encoder-decoder architecture that effectively
conceals private attributes associated with time series data generated by sensors in IoT …
conceals private attributes associated with time series data generated by sensors in IoT …
Deep compressive sensing for visual privacy protection in flatcam imaging
Detection followed by projection in conventional privacy cameras is vulnerable to software
attacks that threaten to expose image sensor data. By multiplexing the incoming light with a …
attacks that threaten to expose image sensor data. By multiplexing the incoming light with a …
Computer Vision for Multimedia Geolocation in Human Trafficking Investigation: A Systematic Literature Review
The task of multimedia geolocation is becoming an increasingly essential component of the
digital forensics toolkit to effectively combat human trafficking, child sexual exploitation, and …
digital forensics toolkit to effectively combat human trafficking, child sexual exploitation, and …
Aragorn: A Privacy-Enhancing System for Mobile Cameras
Mobile app developers often rely on cameras to implement rich features. However, giving
apps unfettered access to the mobile camera poses a privacy threat when camera frames …
apps unfettered access to the mobile camera poses a privacy threat when camera frames …
[책][B] Auditing Corporate Surveillance Systems: Research Methods for Greater Transparency
I Wagner - 2022 - books.google.com
News headlines about privacy invasions, discrimination, and biases discovered in the
platforms of big technology companies are commonplace today, and big tech's reluctance to …
platforms of big technology companies are commonplace today, and big tech's reluctance to …
[PDF][PDF] Sensing Danger: Exploiting Sensors to Build Covert Channels.
Recent incidents have shown that sensor-equipped devices can be used by adversaries to
perform malicious activities, such as spying on end-users or for industrial espionage. In this …
perform malicious activities, such as spying on end-users or for industrial espionage. In this …