-
1
-
2
-
3
Dynamic privacy management in pervasive sensor networks
Published 2011“…This paper describes the design and implementation of a dynamic privacy management system aimed at enabling tangible privacy control and feedback in a pervasive sensor network. …”
Get full text
Get full text
Get full text
Article -
4
Stress measurement using speech: Recent advancements, validation issues, and ethical and privacy considerations
Published 2020“…Keywords: Life stress; voice; speech; privacy; ethics; digital health…”
Get full text
Article -
5
Privacy-preserving analytics for the securitization market: a zero-knowledge distributed ledger technology application
Published 2021“…We introduce a new system which could enable all market participants in the securitization lifecycle (e.g. investors, rating agencies, regulators and security issuers) to interact on a unique decentralized platform while maintaining the privacy of loan-level data, therefore providing the industry with timely analytics and performance data. …”
Get full text
Article -
6
-
7
-
8
-
9
Ethical machines: The human-centric use of artificial intelligence
Published 2021“…However, algorithmic decision-making has been criticized for its potential to lead to privacy invasion, information asymmetry, opacity, and discrimination. …”
Get full text
Article -
10
Open Algorithms for Identity Federation
Published 2021“…Algorithms for specific datasets must be vetted to be privacy-preserving, fair and free from bias.…”
Get full text
Article -
11
Wild Animals in Daily Life
Published 2021“…Finally, we utilize an innovative privacy-preserving architecture to shield wildlife data from criminal intent.…”
Get full text
Article -
12
Wild Animals in Daily Life
Published 2021“…Finally, we utilize an innovative privacy-preserving architecture to shield wildlife data from criminal intent.…”
Get full text
Article -
13
-
14
-
15
Socioeconomic Patterns of Twitter User Activity
Published 2021“…In particular, we look at the way people explore cities and use topics of conversation online as a means of inferring individual socioeconomic status. Privacy is preserved by using anonymized data, and abstracting human mobility and online conversation topics as aggregated high-dimensional vectors. …”
Get full text
Article -
16
Data Portraits
Published 2010“…Data portraits raise questions about privacy, control, aesthetics, and social cognition. …”
Get full text
Article -
17
Enabling Humanitarian Use of Mobile Phone Data
Published 2015“…However, the absence of a common framework for sharing mobile phone data in privacy-conscientious ways and an uncertain regulatory landscape has made difficult scientists' utilization of this powerful data.…”
Get full text
Get full text
Article -
18
Eliminating Physiological Information from Facial Videos
Published 2021“…Vital signs, cognitive load, and stress can be remotely measured from human faces using video-capturing devices under ambient light, which raises both wide applications and privacy issues. To avoid immoral use of this technology, there is a need for methods to eliminate physiological information from facial videos without affecting their visual appearance. …”
Get full text
Article -
19
Wearable sensing for dynamic management of dense ubiquitous media
Published 2010“…Most visions of ubiquitous computing anticipate a world permeated by a dense sampling of sensors, many of which will be capable of capturing, analyzing, and transmitting personally relevant and potentially privacy-sensitive media, such as video, audio, and identification information. …”
Get full text
Get full text
Get full text
Article -
20
FocalSpace: Multimodal Activity Tracking, Synthetic Blur and Adapative Presentation for Video Conferencing
Published 2014“…We present scenarios that support the suppression of visual distraction, provide contextual augmentation, and enable privacy in dynamic mobile environments. Our user evaluation indicates increased memory accuracy and user preference for FocalSpace techniques compared to traditional video conferencing.…”
Get full text
Get full text
Get full text
Article