Censoring representations with an adversary

H Edwards, A Storkey - arXiv preprint arXiv:1511.05897, 2015 - arxiv.org
In practice, there are often explicit constraints on what representations or decisions are
acceptable in an application of machine learning. For example it may be a legal requirement …

An offensive and defensive exposition of wearable computing

P Shrestha, N Saxena - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Wearable computing is rapidly getting deployed in many—commercial, medical, and
personal—domains of day-to-day life. Wearable devices appear in various forms, shapes …

Flying eyes and hidden controllers: A qualitative study of people's privacy perceptions of civilian drones in the US

Y Wang, H Xia, Y Yao, Y Huang - Proceedings on Privacy …, 2016 - petsymposium.org
Drones are unmanned aircraft controlled remotely or operated autonomously. While the
extant literature suggests that drones can in principle invade people's privacy, little is known …

Olympus: Sensor privacy through utility aware obfuscation

N Raval, A Machanavajjhala, J Pan - Proceedings on Privacy …, 2019 - petsymposium.org
Personal data garnered from various sensors are often offloaded by applications to the
cloud for analytics. This leads to a potential risk of disclosing private user information. We …

What you mark is what apps see

N Raval, A Srivastava, A Razeen, K Lebeck… - Proceedings of the 14th …, 2016 - dl.acm.org
Users are increasingly vulnerable to inadvertently leaking sensitive information through
cameras. In this paper, we investigate an approach to mitigating the risk of such inadvertent …

Your smart glasses' camera bothers me! exploring opt-in and opt-out gestures for privacy mediation

M Koelle, S Ananthanarayan, S Czupalla… - Proceedings of the 10th …, 2018 - dl.acm.org
Bystanders have little say in whether they are being recorded by" always-on" cameras. One
approach is to use gestural interaction to enable bystanders to signal their preference to …

Sensitive lifelogs: A privacy analysis of photos from wearable cameras

R Hoyle, R Templeman, D Anthony… - Proceedings of the 33rd …, 2015 - dl.acm.org
While media reports about wearable cameras have focused on the privacy concerns of
bystanders, the perspectives of thelifeloggers' themselves have not been adequately …

Privaceye: privacy-preserving head-mounted eye tracking using egocentric scene image and eye movement features

J Steil, M Koelle, W Heuten, S Boll… - Proceedings of the 11th …, 2019 - dl.acm.org
Eyewear devices, such as augmented reality displays, increasingly integrate eye tracking,
but the first-person camera required to map a user's gaze to the visual scene can pose a …

Logging you, logging me: A replicable study of privacy and sharing behaviour in groups of visual lifeloggers

BA Price, A Stuart, G Calikli, C Mccormick… - Proceedings of the …, 2017 - dl.acm.org
Low cost digital cameras in smartphones and wearable devices make it easy for people to
automatically capture and share images as a visual lifelog. Having been inspired by a US …

Patronus: A system for privacy-preserving cloud video surveillance

H Du, L Chen, J Qian, J Hou, T Jung… - IEEE Journal on …, 2020 - ieeexplore.ieee.org
Privacy has become one of the major concerns in cloud video surveillance. Privacy
protection of the surveillance videos strive to protect users' privacy information without …