When machine learning meets privacy: A survey and outlook

B Liu, M Ding, S Shaham, W Rahayu… - ACM Computing …, 2021 - dl.acm.org
The newly emerged machine learning (eg, deep learning) methods have become a strong
driving force to revolutionize a wide range of industries, such as smart healthcare, financial …

Camera measurement of physiological vital signs

D McDuff - ACM Computing Surveys, 2023 - dl.acm.org
The need for remote tools for healthcare monitoring has never been more apparent. Camera
measurement of vital signs leverages imaging devices to compute physiological changes by …

Deeptest: Automated testing of deep-neural-network-driven autonomous cars

Y Tian, K Pei, S Jana, B Ray - … of the 40th international conference on …, 2018 - dl.acm.org
Recent advances in Deep Neural Networks (DNNs) have led to the development of DNN-
driven autonomous cars that, using sensors like camera, LiDAR, etc., can drive without any …

Defeating image obfuscation with deep learning

R McPherson, R Shokri, V Shmatikov - arxiv preprint arxiv:1609.00408, 2016 - arxiv.org
We demonstrate that modern image recognition methods based on artificial neural networks
can recover hidden information from images protected by various forms of obfuscation. The …

Does image anonymization impact computer vision training?

H Hukkelås, F Lindseth - … of the IEEE/CVF Conference on …, 2023 - openaccess.thecvf.com
Image anonymization is widely adapted in practice to comply with privacy regulations in
many regions. However, anonymization often degrades the quality of the data, reducing its …

Towards a visual privacy advisor: Understanding and predicting privacy risks in images

T Orekondy, B Schiele, M Fritz - Proceedings of the IEEE …, 2017 - openaccess.thecvf.com
With an increasing number of users sharing information online, privacy implications entailing
such actions are a major concern. For explicit content, such as user profile or GPS data …

Towards face encryption by generating adversarial identity masks

X Yang, Y Dong, T Pang, H Su, J Zhu… - Proceedings of the …, 2021 - openaccess.thecvf.com
As billions of personal data being shared through social media and network, the data
privacy and security have drawn an increasing attention. Several attempts have been made …

Adversarial image perturbation for privacy protection a game theory perspective

SJ Oh, M Fritz, B Schiele - 2017 IEEE International Conference …, 2017 - ieeexplore.ieee.org
Users like sharing personal photos with others through social media. At the same time, they
might want to make automatic identification in such photos difficult or even impossible …

Privacy-preserving brain–computer interfaces: A systematic review

K **a, W Duch, Y Sun, K Xu, W Fang… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
A brain–computer interface (BCI) establishes a direct communication pathway between the
human brain and a computer. It has been widely used in medical diagnosis, rehabilitation …

Towards practical verification of machine learning: The case of computer vision systems

K Pei, L Zhu, Y Cao, J Yang, C Vondrick… - arxiv preprint arxiv …, 2017 - arxiv.org
Due to the increasing usage of machine learning (ML) techniques in security-and safety-
critical domains, such as autonomous systems and medical diagnosis, ensuring correct …