A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Visor: Privacy-Preserving Video Analytics as a Cloud Service
[article]
2020
arXiv
pre-print
Video-analytics-as-a-service is becoming an important offering for cloud providers. A key concern in such services is privacy of the videos being analyzed. ...
We present Visor, a system that provides confidentiality for the user's video stream as well as the ML models in the presence of a compromised cloud platform and untrusted co-tenants. ...
This work was supported in part by the NSF CISE Expeditions Award CCF-1730628, and gifts from the Sloan Foundation, Bakar Program, Alibaba, Amazon Web Services, Ant Financial, Capital One, Ericsson, Facebook ...
arXiv:2006.09628v2
fatcat:ipifnn7tuberjimmgss6azglte
Table of Contents
2021
2021 IEEE/ACM 21st International Symposium on Cluster, Cloud and Internet Computing (CCGrid)
Lille / Inria) Session 6: Cyber-Security and Privacy PriPro: Towards Effective Privacy Protection on Edge-Cloud System Running DNN Inference 334 Efficient DLP-Visor: An Efficient Hypervisor-Based DLP 344 ...
Laurens Versluis (VU Amsterdam), Vincent van Beek (Solvinity, the
Netherlands; VU Amsterdam), and Alexandru Iosup (VU Amsterdam; TU
Delft)
Scheduling Containers Rather Than Functions for Function-as-a-Service ...
doi:10.1109/ccgrid51090.2021.00004
fatcat:jivwhkq6brf6rclzktpzc3qzoy
Vronicle: A System for Producing Videos with Verifiable Provenance
[article]
2021
arXiv
pre-print
It allows a video consumer to authenticate the camera that originated the video and the exact sequence of video filters that were subsequently applied to it. ...
It is extremely hard to accurately detect manipulated videos using content analysis, especially in the face of subtle, yet effective, manipulations, such as frame rate changes or skin tone adjustments. ...
Visor [48] is a secure, privacy-preserving video analytics platform that is built on top of Graviton (which is an proprietary emulator). ...
arXiv:2109.12712v1
fatcat:mi4af6nvuvfi5ghvjlgnz4ubt4
A Survey on Software-Defined Network and OpenFlow: From Concept to Implementation
2014
IEEE Communications Surveys and Tutorials
, quality of service, security, and its integration with wireless and optical networks. ...
Currently, OpenFlow is the most popular SDN protocol/standard and has a set of design specifications. ...
Hegde, (they are all with ECE department at the University of Alabama), and A. V. Vasilakos (University of Western Macedonia in Greece). ...
doi:10.1109/comst.2014.2326417
fatcat:l7syxlypfjhl5kbcmnaggtpcny
INTERNET OF THINGS AND PRIVACY
2021
Proceedings of the 19th International Conference on e-Society 2021
unpublished
In many IoT applications, personal data are automatically collected and stored in cloud systems, processed and used for purposes such as creating user profiles, monitoring health, personalized advertising ...
Today the Internet of Things (IoT) empowers our lives, simplifying interaction and services in many fields including smart homes and cities, telemedicine and healthcare, transportation, security and social ...
, such as user trust, data privacy, transparency over the control of data ownership, and the implications of data analytics regarding personal privacy. ...
doi:10.33965/es2021_202101r046
fatcat:gq6jrc4mz5grtaugzd34oklw7i
Document Title: A Market Survey on Body Worn Camera Technologies A Market Survey on Body Worn Camera .J of Justice
2016
unpublished
This guide highlights key planning questions as well as insights from agencies initiating their own programs. ...
This publication is a reference for educational purposes only. ...
Provides all component level service to be tagged to a video. The list of categories is protect privacy of data over the internet connection. ...
fatcat:5ip2hocxbvaphbr3jtxesouzk4
A Perspective on Time towards Wireless 6G
[article]
2022
arXiv
pre-print
With the advent of 5G technology, the notion of latency got a prominent role in wireless connectivity, serving as a proxy term for addressing the requirements for real-time communication. ...
As wireless systems evolve towards 6G, the ambition to immerse the digital into the physical reality will increase. ...
Its key feature is the avoidance of direct data uploading, allowing the exploitation of users' data while preserving their privacy. ...
arXiv:2106.04314v2
fatcat:56m22x5mebakzbkkytyhsy4gta
Robots under COVID-19 Pandemic: A Comprehensive Survey
2020
IEEE Access
As a result of the difficulties brought by COVID-19 and its associated lockdowns, many individuals and companies have turned to robots in order to overcome the challenges of the pandemic. ...
By discussing the potential new robot capabilities and fields they applied to, we expect the robotics industry to take a leap forward due to this unexpected pandemic. ...
For example, as the adoption of mobile robots grows, the demand for related hardware, such as active binocular 3D cameras, ultrasonic sensors and software such as fleet management solutions and cloud services ...
doi:10.1109/access.2020.3045792
pmid:34976569
pmcid:PMC8675561
fatcat:pkzigtb5yzcjlftjnbve3373ay
D5.3 - Market analysis report
2020
Zenodo
The deliverable describes the status of the market as of December 2020 for the audio-visual immersive products, with an emphasis in social VR platforms and related technologies. ...
In addition, it provides a set of recommendations based on the market and customer research aiming to provide insightful and meaningful data towards the elaboration of an improved exploitation plan of ...
IoT Analytics 170 . ...
doi:10.5281/zenodo.4439787
fatcat:vhrgg6w2tfgmla2sirweh6qhrm
Career Exploration in Child and Family Studies: Focus on Curricula and Research Topics
2016
Family and Environment Research
Privacy Protection Consultants 442 Because monitoring of individuals will be ubiquitous, Privacy Protection Consultants will help individuals decide on a number of social and technological decisions to ...
rainfall from passing clouds. ...
An increasing range of roles are emerging for those working to creating synthetic life forms that could be used in applications as diverse as tissue repair and bacteria programmed to digest biological ...
doi:10.6115/fer.2016.005
fatcat:dcokzycw2jh7bfic2c6jebsp5e
Proceedings of the Seminar "Research Trends in Media Informatics"
2016
The Internet, Web 2.0, Social Networks, Ubiquitous Computing, Computer Graphics, Usability, Social Interactions, HCI, and Privacy are just a few examples. ...
Media Informatics is a broad field spanning many research directions and topics. ...
Object-Video Streams for Preserving Privacy in Video Surveillance Faisal Z. Qureshi et al. [5] has presented an approach how to make individual privacy possible by using video-object streams. ...
doi:10.18725/oparu-3892
fatcat:jflgj7nspfd3pfwdkagkrbwij4
The Vessel Schedule Recovery Problem (VSRP) – A MIP model for handling disruptions in liner shipping
2013
European Journal of Operational Research
in number of services for taxis. ...
We formulate and analyze a strategic design model for public bicycle sharing systems with service level considerations. ...
-Optimal Dynamic Tax Evasion: A Portfolio Approach Francesco Menoncin, Economics, Brescia University, Via S. Faustino, 74/B, 25122, Brescia, Italy, menoncin@eco.unibs.it, Rosella Levaggi ...
doi:10.1016/j.ejor.2012.08.016
fatcat:c27kagfnxnhjfbil2rydhjhomm
Machine Learning-Based Routing and Wavelength Assignment in Software-Defined Optical Networks
2019
IEEE Transactions on Network and Service Management
To preserve privacy, AV engines have been renamed to AV1 to AV61 consistently along the thesis. ...
as a Service respectively). ...
doi:10.1109/tnsm.2019.2927867
fatcat:or3lhqdqbnas3cztwkqr5ykhhq
Adjusting to COVID-19 under the English Criminal Justice System
2021
eucrim – The European Criminal Law Associations Forum
Legal effects of COVID-19 The Associations for European Criminal Law and the Protection of Financial Interests of the EU is a network of academics and practitioners. ...
The aim of this cooperation is to develop a European criminal law which both respects civil liberties and at the same time protects European citizens and the European institutions effectively. ...
Such platforms can be social media, video image and audio-sharing services; Interpersonal communication services, such as emails or private messaging services as well as services providing cloud infrastructures ...
doi:10.30709/eucrim-2021-017
fatcat:omnp735fevaknhoxpz4bln4zyy
Composite Enclaves: Towards Disaggregated Trusted Execution
[article]
2021
arXiv
pre-print
These case studies showcase a flexible but small TCB (2.5 KLoC for IO peripherals and drivers), with a low-performance overhead (only around 220 additional cycles for a context switch), thus demonstrating ...
the feasibility of our approach and showing that it can work with a wide range of specialized hardware. ...
Visor is aimed towards privacy-preserving video analytics where the computation pipeline is shared between the CPU (non-CNN workloads) and the GPU (CNN workloads) to increase efficiency. ...
arXiv:2010.10416v3
fatcat:do3jol7aajef3njawe4s4rbrgi
« Previous
Showing results 1 — 15 out of 39 results