Obfuscation of sensitive human-perceptual output

AIA Wang, M Mitchell, P Reiher - US Patent 10,025,952, 2018 - Google Patents
The present invention includes a system and method for defending against unwanted
observations of the information conveyed by electronic devices. The system allows users to …

Security policy application through data tagging

JA McClintock, JE Darrow, PN Denton… - US Patent …, 2017 - Google Patents
2015-06-17 Assigned to AMAZON TECHNOLOGIES, INC. reassignment AMAZON
TECHNOLOGIES, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR …

[HTML][HTML] Multi-scale, class-generic, privacy-preserving video

Z Zhang, T Cilloni, C Walter, C Fleming - Electronics, 2021 - mdpi.com
In recent years, high-performance video recording devices have become ubiquitous, posing
an unprecedented challenge to preserving personal privacy. As a result, privacy-preserving …

Datacomp: Locally independent adaptive compression for real-world systems

PAH Peterson, PL Reiher - 2016 IEEE 36th International …, 2016 - ieeexplore.ieee.org
Non-lossy compression can save time and energy during communication if the cost to
compress and send input is less than the cost of sending it uncompressed. Unfortunately …

Retrofitting applications with provenance-based security monitoring

A Bates, K Butler, A Dobra, B Reaves, P Cable… - arXiv preprint arXiv …, 2016 - arxiv.org
Data provenance is a valuable tool for detecting and preventing cyber attack, providing
insight into the nature of suspicious events. For example, an administrator can use …

Personal Mobile devices at work: factors affecting the adoption of security mechanisms

HN Liang, C Fleming, KL Man - Multimedia Tools and Applications, 2020 - Springer
This research examines the use of personal mobile devices at work and what factors affect
people's adoption of enhanced levels of security mechanisms for their devices. Mobile …

Cashtags: Protecting the input and display of sensitive data

M Mitchell, AIA Wang, P Reiher - 24th USENIX Security Symposium …, 2015 - usenix.org
Mobile computing is the new norm. As people feel increasingly comfortable computing in
public places such as coffee shops and transportation hubs, the threat of exposing sensitive …

[PDF][PDF] Cashtags: Prevent leaking sensitive information through screen display

M Mitchell, AI Wang, P Reiher - Proceedings of the usenix security …, 2015 - cs.fsu.edu
Mobile computing is the new norm. As people feel increasingly comfortable computing in
public places such as coffee shops and transportation hubs, the threat of exposing sensitive …

On Security and Privacy in Machine Learning

T Cilloni - 2023 - search.proquest.com
In recent years the use of social media platforms, surveillance cameras, and vision-enabled
devices and services has increased exponentially. While the mere use of a device or service …

[PDF][PDF] Multi-Scale, Class-Generic, Privacy-Preserving Video. Electronics 2021, 10, 1172

Z Zhang, T Cilloni, C Walter, C Fleming - 2021 - core.ac.uk
In recent years, high-performance video recording devices have become ubiquitous, posing
an unprecedented challenge to preserving personal privacy. As a result, privacy-preserving …