Author of the publication

Reactive security: responding to visual stimuli from wearable cameras.

, , , and . UbiComp Adjunct, page 1297-1306. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GANGRENE: Exploring the Mortality of Flash Memory., and . HotSec, USENIX Association, (2012)Enhancing Lifelogging Privacy by Detecting Screens., , , , and . CHI, page 4309-4314. ACM, (2016)Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras., , , , and . CHI, page 1645-1648. ACM, (2015)ScreenAvoider: Protecting Computer Screens from Ubiquitous Cameras., , , , and . CoRR, (2014)PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces., , , and . NDSS, The Internet Society, (2014)PlaceRaider: Virtual Theft in Physical Spaces with Smartphones., , , and . NDSS, The Internet Society, (2013)Reactive security: responding to visual stimuli from wearable cameras., , , and . UbiComp Adjunct, page 1297-1306. ACM, (2014)The Third Offset and a Fifth Domain? Balancing Game-Changing Innovation and Cyber Risk Mitigation., and . CoRR, (2016)Addressing supply chain risks of microelectronic devices through computer vision., , , , , , and . AIPR, page 1-8. IEEE Computer Society, (2017)PlaceRaider: Virtual Theft in Physical Spaces with Smartphones, , , and . CoRR, (2012)