Author of the publication

Reactive security: responding to visual stimuli from wearable cameras.

, , , and . UbiComp Adjunct, page 1297-1306. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GANGRENE: Exploring the Mortality of Flash Memory., and . HotSec, USENIX Association, (2012)Enhancing Lifelogging Privacy by Detecting Screens., , , , and . CHI, page 4309-4314. ACM, (2016)PlaceRaider: Virtual Theft in Physical Spaces with Smartphones, , , and . CoRR, (2012)Privacy behaviors of lifeloggers using wearable cameras., , , , , and . UbiComp, page 571-582. ACM, (2014)PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces., , , and . NDSS, The Internet Society, (2014)PlaceRaider: Virtual Theft in Physical Spaces with Smartphones., , , and . NDSS, The Internet Society, (2013)Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras., , , , and . CHI, page 1645-1648. ACM, (2015)ScreenAvoider: Protecting Computer Screens from Ubiquitous Cameras., , , , and . CoRR, (2014)Reactive security: responding to visual stimuli from wearable cameras., , , and . UbiComp Adjunct, page 1297-1306. ACM, (2014)Addressing supply chain risks of microelectronic devices through computer vision., , , , , , and . AIPR, page 1-8. IEEE Computer Society, (2017)