skip to main content
10.1145/3458864.3467676acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

LensCap: split-process framework for fine-grained visual privacy control for augmented reality apps

Published: 24 June 2021 Publication History

Abstract

Augmented Reality (AR) enables smartphone users to interact with virtual content spatially overlaid on a continuously captured physical world. Under the current permission enforcement model in popular operating systems, AR apps are given Internet permission at installation time, and request camera permission and external storage write permission at runtime through a user's approval. With these permissions granted, any Internet-enabled AR app could silently collect camera frames and derived visual information for malicious intent without a user's awareness. This raises serious concerns about the disclosure of private user data in their living environments.
To give users more control over application usage of their camera frames and the information derived from them, we introduce LensCap, a split-process app design framework, in which the app is split into a camera-handling visual process and a connectivity-handling network process. At runtime, LensCap manages secured communications between split processes, enacting fine-grained data usage monitoring. LensCap also allows both processes to present interactive user interfaces. With LensCap, users can decide what forms of visual data can be transmitted to the network, while still allowing visual data to be used for AR purposes on device. We prototype LensCap as an Android library and demonstrate its usability as a plugin in Unreal Engine. Performance evaluation results on five AR apps confirm that visual privacy can be preserved with an insignificant latency penalty (< 1.3 ms) at 60 FPS.

References

[1]
Facebook Technologies, LLC. 2021. Mixed Reality Capture. https://developer.oculus.com/documentation/native/pc/dg-mrc/?locale=en_US. (2021).
[2]
Paarijaat Aditya, Rijurekha Sen, Peter Druschel, Seong Joon Oh, Rodrigo Benenson, Mario Fritz, Bernt Schiele, Bobby Bhattacharjee, and Tong Tong Wu. 2016. I-Pic: A Platform for Privacy-Compliant Image Capture. In Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys '16). ACM, New York, NY, USA, 235--248.
[3]
Android Developer. 2021. Media Framework Hardening. https://source.android.com/devices/media/framework-hardening. (2021).
[4]
Android Developers. 2021. Android Interface Definition Language (AIDL). https://developer.android.com/guide/components/aidl. (2021).
[5]
Android Developers. 2021. Permissions overview. https://developer.android.com/guide/topics/permissions/overview. (2021).
[6]
Android Developers. 2021. Secure an Android Device. https://source.android.com/security. (2021).
[7]
Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau, and Patrick McDaniel. 2014. FlowDroid: Precise Context, Flow, Field, Object-Sensitive and Lifecycle-Aware Taint Analysis for Android Apps. In Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI '14). Association for Computing Machinery, New York, NY, USA, 259âĂŞ269.
[8]
Gina Ashe. 2017. What Mary MeekerâĂ&Zacute;s Internet Trends Report Means for the State of In-Store. https://blog.thirdchannel.com/mind-the-store. (2017).
[9]
Michael Backes, Sven Bugiel, Christian Hammer, Oliver Schranz, and Philipp Von Styp-Rekowsky. 2015. Boxify: Full-Fledged App Sandboxing for Stock Android. In Proceedings of the 24th USENIX Conference on Security Symposium (SEC'15). USENIX Association, USA, 691âĂŞ706.
[10]
Bingkun Guo. 2014. iOS Security. https://www.cse.wustl.edu/~jain/cse571-14/ftp/ios_security/index.html. (2014).
[11]
Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Ahmad-Reza Sadeghi, and Bhargava Shastry. 2011. Practical and lightweight domain isolation on Android. Proceedings of the ACM Conference on Computer and Communications Security (10 2011).
[12]
Supriyo Chakraborty, Chenguang Shen, Kasturi Rangan Raghavan, Yasser Shoukry, Matt Millar, and Mani Srivastava. 2014. ipShield: A Framework For Enforcing Context-Aware Privacy. In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14). USENIX Association, Seattle, WA, 143--156. https://www.usenix.org/conference/nsdi14/technical-sessions/presentation/chakraborty
[13]
Jintai Chen, Biwen Lei, Qingyu Song, Haochao Ying, Danny Z. Chen, and Jian Wu. 2020. A Hierarchical Graph Network for 3D Object Detection on Point Clouds. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[14]
Victor Costan and Srinivas Devadas. Intel SGX Explained. (????).
[15]
Abdallah Dawoud and Sven Bugiel. 2019. DroidCap: OS Support for Capability-based Permissions in Android. In NDSS Symposium 2019. https://publications.cispa.saarland/2818/
[16]
William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. 2010. TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI'10). USENIX Association, Berkeley, CA, USA, 393--407. http://dl.acm.org/citation.cfm?id=1924943.1924971
[17]
Epic Games, Inc. 2021. Unreal Engine. https://www.unrealengine.com/en-US/. (2021).
[18]
FACEBOOK. 2021. Introducing Project Aria. https://about.fb.com/realitylabs/projectaria/. (2021).
[19]
Earlence Fernandes, Justin Paupore, Amir Rahmati, Daniel Simionato, Mauro Conti, and Atul Prakash. 2016. FlowFence: Practical Data Protection for Emerging IoT Application Frameworks. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 531--548. https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/fernandes
[20]
Google AR. 2021. Google ARCore SDK for Unreal. https://github.com/googlear/arcore-unreal-sdk. (2021).
[21]
J. Grubert, T. Langlotz, S. Zollmann, and H. Regenbrecht. 2017. Towards Pervasive Augmented Reality: Context-Awareness in Augmented Reality. IEEE Transactions on Visualization and Computer Graphics 23, 6 (2017), 1706--1724.
[22]
Kiryong Ha, Zhuo Chen, Wenlu Hu, Wolfgang Richter, Padmanabhan Pillai, and Mahadev Satyanarayanan. 2014. Towards Wearable Cognitive Assistance. In Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys '14). Association for Computing Machinery, New York, NY, USA, 68âĂŞ81.
[23]
Raul Herbster, Scott DellaTorre, Peter Druschel, and Bobby Bhattacharjee. 2016. Privacy Capsules: Preventing Information Leaks by Mobile Apps. In Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys '16). ACM, New York, NY, USA, 399--411.
[24]
Jinhan Hu, Alexander Shearer, Saranya Rajagopalan, and Robert LiKamWa. 2019. Banner: An Image Sensor Reconfiguration Framework for Seamless Resolution-Based Tradeoffs. In Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys '19). Association for Computing Machinery, New York, NY, USA, 236âĂŞ248.
[25]
Jinhan Hu, Jianan Yang, Vraj Delhivala, and Robert LiKamWa. 2018. Characterizing the Reconfiguration Latency of Image Sensor Resolution on Android Devices. In Proceedings of the 19th International Workshop on Mobile Computing Systems & Applications (HotMobile '18). Association for Computing Machinery, New York, NY, USA, 81âĂŞ86.
[26]
A. âĂIJ. Huang. 2020. Betrusted: Improving Security Through Physical Partitioning. IEEE Pervasive Computing 19, 2 (2020), 13--20.
[27]
Jie Huang, Oliver Schranz, Sven Bugiel, and Michael Backes. 2017. The ART of App Compartmentalization: Compiler-Based Library Privilege Separation on Stock Android. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS '17). Association for Computing Machinery, New York, NY, USA, 1037âĂŞ1049.
[28]
Suman Jana, Arvind Narayanan, and Vitaly Shmatikov. 2013. A Scanner Darkly: Protecting User Privacy from Perceptual Applications. In Proceedings of the 2013 IEEE Symposium on Security and Privacy (SP '13). IEEE Computer Society, Washington, DC, USA, 349--363.
[29]
Jk Jensen, Jinhan Hu, Amir Rahmati, and Robert LiKamWa. 2019. Protecting Visual Information in Augmented Reality from Malicious Application Developers (WearSys '19). Association for Computing Machinery, New York, NY, USA, 23âĂŞ28.
[30]
Limin Jia, Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Michael Stroucken, Kazuhide Fukushima, Shinsaku Kiyomoto, and Yutaka Miyake. 2013. Run-Time Enforcement of Information-Flow Properties on Android. In Computer Security - ESORICS 2013, Jason Crampton, Sushil Jajodia, and Keith Mayes (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 775--792.
[31]
Haojian Jin, Minyi Liu, Kevan Dodhia, Yuanchun Li, Gaurav Srivastava, Matthew Fredrikson, Yuvraj Agarwal, and Jason I. Hong. 2018. Why Are They Collecting My Data? Inferring the Purposes of Network Traffic in Mobile Apps. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2, 4, Article 173 (Dec. 2018), 27 pages.
[32]
Ricardo Jota, Albert Ng, Paul Dietz, and Daniel Wigdor. 2013. How Fast is Fast Enough?: A Study of the Effects of Latency in Direct-touch Pointing Tasks. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13). ACM, New York, NY, USA, 2291--2300.
[33]
Thivya Kandappu, Archan Misra, Shih-Fen Cheng, Randy Tandriansyah, and Hoong Chuin Lau. 2018. Obfuscation At-Source: Privacy in Context-Aware Mobile Crowd-Sourcing. 2, 1, Article 16 (March 2018), 24 pages.
[34]
Maxwell Krohn, Alexander Yip, Micah Brodsky, Natan Cliffer, M. Frans Kaashoek, Eddie Kohler, and Robert Morris. 2007. Information Flow Control for Standard OS Abstractions. In Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles (SOSP '07). ACM, New York, NY, USA, 321--334.
[35]
Butler W. Lampson. 1973. A Note on the Confinement Problem. Commun. ACM 16, 10 (Oct. 1973), 613âĂŞ615.
[36]
K. Lebeck, K. Ruth, T. Kohno, and F. Roesner. 2017. Securing Augmented Reality Output. In 2017 IEEE Symposium on Security and Privacy (SP). 320--337.
[37]
K. Lebeck, K. Ruth, T. Kohno, and F. Roesner. 2018. Arya: Operating System Support for Securely Augmenting Reality. IEEE Security Privacy 16, 1 (January 2018), 44--53.
[38]
S. M. Lehman and C. C. Tan. 2017. PrivacyManager: An access control framework for mobile augmented reality applications. In 2017 IEEE Conference on Communications and Network Security (CNS). 1--9.
[39]
Haomin Liu, Chen Li, Guojun Chen, Guofeng Zhang, Michael Kaess, and Hujun Bao. 2017. Robust Keyframe-based Dense SLAM with an RGB-D Camera. CoRR abs/1711.05166 (2017). arXiv:1711.05166 http://arxiv.org/abs/1711.05166
[40]
Adwait Nadkarni, Benjamin Andow, William Enck, and Somesh Jha. 2016. Practical DIFC Enforcement on Android. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 1119--1136. https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/nadkarni
[41]
K. Olejnik, I. Dacosta, J. S. Machado, K. Huguenin, M. E. Khan, and J. Hubaux. 2017. SmarPer: Context-Aware and Automatic Runtime-Permissions for Mobile Devices. In 2017 IEEE Symposium on Security and Privacy (SP). 1058--1076.
[42]
James Paine. 2020. 10 Real Use Cases for Augmented Reality: AR is set to have a big impact on major industries. https://www.inc.com/james-paine/10-real-use-cases-for-augmented-reality.html. (2020).
[43]
Paul Pearce, Adrienne Porter Felt, Gabriel Nunez, and David Wagner. 2012. Ad-Droid: Privilege Separation for Applications and Advertisers in Android. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (ASIACCS '12). Association for Computing Machinery, New York, NY, USA, 71âĂŞ72.
[44]
Siddhant Prakash, Alireza Bahremand, Linda D. Nguyen, and Robert LiKamWa. 2019. GLEAM: An Illumination Estimation Framework for Real-time Photorealistic Augmented Reality on Mobile Devices. In Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys '19). ACM, New York, NY, USA, 142--154.
[45]
Nisarg Raval, Ali Razeen, Ashwin Machanavajjhala, Landon P. Cox, and Andrew Warfield. 2019. Permissions Plugins as Android Apps (MobiSys '19). Association for Computing Machinery, New York, NY, USA, 180âĂŞ192.
[46]
Nisarg Raval, Animesh Srivastava, Kiron Lebeck, Landon Cox, and Ashwin Machanavajjhala. 2014. MarkIt: Privacy Markers for Protecting Visual Secrets. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (UbiComp '14 Adjunct). ACM, New York, NY, USA, 1289--1295.
[47]
Nisarg Raval, Animesh Srivastava, Ali Razeen, Kiron Lebeck, Ashwin Machanavajjhala, and Lanodn P. Cox. 2016. What You Mark is What Apps See. In Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys '16). ACM, New York, NY, USA, 249--261.
[48]
Joel Reardon, Álvaro Feal, Primal Wijesekera, Amit Elazari Bar On, Narseo Vallina-Rodriguez, and Serge Egelman. 2019. 50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 603--620. https://www.usenix.org/conference/usenixsecurity19/presentation/reardon
[49]
Talia Ringer, Dan Grossman, and Franziska Roesner. 2016. AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems. 204--216.
[50]
Franziska Roesner, David Molnar, Alexander Moshchuk, Tadayoshi Kohno, and Helen J. Wang. 2014. World-Driven Access Control for Continuous Sensing. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14). ACM, New York, NY, USA, 1169--1181.
[51]
Kimberly Ruth, Tadayoshi Kohno, and Franziska Roesner. 2019. Secure Multi-User Content Sharing for Augmented Reality Applications. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 141--158. https://www.usenix.org/conference/usenixsecurity19/presentation/ruth
[52]
Jose Rodrigo Sanchez Vicarte, Benjamin Schreiber, Riccardo Paccagnella, and Christopher W. Fletcher. 2020. Game of Threads: Enabling Asynchronous Poisoning Attacks. In Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS '20). Association for Computing Machinery, New York, NY, USA, 35âĂŞ52.
[53]
D. Schmalstieg and G. Hesina. 2002. Distributed applications for collaborative augmented reality. In Proceedings IEEE Virtual Reality 2002. 59--66.
[54]
A. Shaikh, L. Nguyen, A. Bahremand, H. Bartolomea, F. Liu, V. Nguyen, D. Anderson, and R. LiKamWa. 2019. Coordinate: A Spreadsheet-Programmable Augmented Reality Framework for Immersive Map-Based Visualizations. In 2019 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR). 134--1343.
[55]
Shashi Shekhar, Michael Dietz, and Dan S. Wallach. 2012. AdSplit: Separating Smartphone Advertising from Applications. In 21st USENIX Security Symposium (USENIX Security 12). USENIX Association, Bellevue, WA, 553--567. https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/shekhar
[56]
Youren Shen, Hongliang Tian, Yu Chen, Kang Chen, Runji Wang, Yi Xu, Yubin Xia, and Shoumeng Yan. 2020. Occlum: Secure and Efficient Multitasking Inside a Single Enclave of Intel SGX. In Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS '20). Association for Computing Machinery, New York, NY, USA, 955âĂŞ970.
[57]
Pieter Simoens, Yu Xiao, Padmanabhan Pillai, Zhuo Chen, Kiryong Ha, and Mahadev Satyanarayanan. 2013. Scalable Crowd-Sourcing of Video from Mobile Devices. In Proceeding of the 11th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys '13). Association for Computing Machinery, New York, NY, USA, 139âĂŞ152.
[58]
P. Speciale, J. L. SchÃŭnberger, S. B. Kang, S. N. Sinha, and M. Pollefeys. 2019. Privacy Preserving Image-Based Localization. In 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). 5488--5498.
[59]
Square, Inc. 2021. OkHttp. https://square.github.io/okhttp/. (2021).
[60]
Adriana Szekeres, Irene Zhang, Katelin Bailey, Isaac Ackerman, Haichen Shen, Franziska Roesner, Dan R. K. Ports, Arvind Krishnamurthy, and Henry M. Levy. 2020. Making Distributed Mobile Applications SAFE: Enforcing User Privacy Policies on Untrusted Applications with Secure Application Flow Enforcement. (2020). arXiv:cs.CR/2008.06536
[61]
Freenix Track and Douglas Kilpatrick. 2003. Privman: A Library for Partitioning Applications. (2003).
[62]
Xiaolei Wang, Andrea Continella, Yuexiang Yang, Yongzhong He, and Sencun Zhu. 2019. LeakDoctor: Toward Automatically Diagnosing Privacy Leaks in Mobile Applications. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3, 1, Article 28 (March 2019), 25 pages.
[63]
Guowen Xu, Hongwei Li, Shengmin Xu, Hao Ren, Yinghui Zhang, Jianfei Sun, and Robert H. Deng. 2020. Catch You If You Deceive Me: Verifiable and Privacy-Aware Truth Discovery in Crowdsensing Systems. In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20). Association for Computing Machinery, New York, NY, USA, 178âĂŞ192.
[64]
Yuanzhong Xu and Emmett Witchel. 2015. Maxoid: Transparently Confining Mobile Applications with Custom Views of State. In Proceedings of the Tenth European Conference on Computer Systems (EuroSys '15). Association for Computing Machinery, New York, NY, USA, Article 26, 16 pages.
[65]
Zhi Xu and Sencun Zhu. 2015. SemaDroid: A Privacy-Aware Sensor Management Framework for Smartphones. In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (CODASPY '15). Association for Computing Machinery, New York, NY, USA, 61âĂŞ72.
[66]
Xiao Zhang, Amit Ahlawat, and Wenliang Du. 2013. AFrame: Isolating Advertisements from Mobile Applications in Android. In Proceedings of the 29th Annual Computer Security Applications Conference (ACSAC '13). Association for Computing Machinery, New York, NY, USA, 9âĂŞ18.

Cited By

View all
  • (2024)Virtual Keymysteries Unveiled: Detecting Keystrokes in VR with External Side-Channels2024 IEEE Security and Privacy Workshops (SPW)10.1109/SPW63631.2024.00031(260-266)Online publication date: 23-May-2024
  • (2024)Bridging Theory into Practice: An Investigation of the Opportunities and Challenges to the Implementation of Metaverse-Based Teaching in Higher Education InstitutionsLearning and Collaboration Technologies10.1007/978-3-031-61691-4_12(173-189)Online publication date: 1-Jun-2024
  • (2024)Security and Privacy of Augmented Reality SystemsNetwork Security Empowered by Artificial Intelligence10.1007/978-3-031-53510-9_11(305-330)Online publication date: 24-Feb-2024
  • Show More Cited By

Index Terms

  1. LensCap: split-process framework for fine-grained visual privacy control for augmented reality apps

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MobiSys '21: Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services
    June 2021
    528 pages
    ISBN:9781450384438
    DOI:10.1145/3458864
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 24 June 2021

    Permissions

    Request permissions for this article.

    Check for updates

    Badges

    Author Tags

    1. AR application development
    2. augmented reality security
    3. split-process control
    4. unreal engine
    5. visual privacy

    Qualifiers

    • Research-article

    Conference

    MobiSys '21
    Sponsor:

    Acceptance Rates

    MobiSys '21 Paper Acceptance Rate 36 of 166 submissions, 22%;
    Overall Acceptance Rate 274 of 1,679 submissions, 16%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)93
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 27 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Virtual Keymysteries Unveiled: Detecting Keystrokes in VR with External Side-Channels2024 IEEE Security and Privacy Workshops (SPW)10.1109/SPW63631.2024.00031(260-266)Online publication date: 23-May-2024
    • (2024)Bridging Theory into Practice: An Investigation of the Opportunities and Challenges to the Implementation of Metaverse-Based Teaching in Higher Education InstitutionsLearning and Collaboration Technologies10.1007/978-3-031-61691-4_12(173-189)Online publication date: 1-Jun-2024
    • (2024)Security and Privacy of Augmented Reality SystemsNetwork Security Empowered by Artificial Intelligence10.1007/978-3-031-53510-9_11(305-330)Online publication date: 24-Feb-2024
    • (2024)Privacy and Security Landscape of MetaverseAdvances in Computational Intelligence Systems10.1007/978-3-031-47508-5_32(403-417)Online publication date: 1-Feb-2024
    • (2023)Metaverse ForensicsForecasting Cyber Crimes in the Age of the Metaverse10.4018/979-8-3693-0220-0.ch010(182-208)Online publication date: 29-Dec-2023
    • (2023)BystandAR: Protecting Bystander Visual Data in Augmented Reality SystemsProceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services10.1145/3581791.3596830(370-382)Online publication date: 18-Jun-2023
    • (2023)Virtual Curtain: A Communicative Fine-grained Privacy Control Framework for Augmented Reality2023 International Conference on Computing, Networking and Communications (ICNC)10.1109/ICNC57223.2023.10074372(188-194)Online publication date: 20-Feb-2023
    • (2023)GAPter: Gray-Box Data Protector for Deep Learning Inference Services at User SideICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)10.1109/ICASSP49357.2023.10096286(1-5)Online publication date: 4-Jun-2023
    • (2023)The Dark Side of Augmented Reality: Exploring Manipulative Designs in ARInternational Journal of Human–Computer Interaction10.1080/10447318.2023.218879940:13(3449-3464)Online publication date: 27-Mar-2023
    • (2023)Post-Covid-19 Metaverse Cybersecurity and Data Privacy: Present and Future ChallengesData Protection in a Post-Pandemic Society10.1007/978-3-031-34006-2_1(1-48)Online publication date: 8-May-2023
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    EPUB

    View this article in ePub.

    ePub

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media