Proceedings of the 27th Annual International Conference on Mobile Computing and Networking 2021
DOI: 10.1145/3447993.3448618
|View full text |Cite
|
Sign up to set email alerts
|

Pecam

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 36 publications
(5 citation statements)
references
References 28 publications
0
5
0
Order By: Relevance
“…To address the limitations associated with passive defense dependency, latency, and high overhead, several schemes [21]- [26] have shifted their focus towards active defense research. For instance, Seo et al [21] have presented an active moving target defense strategy for Unmanned Aerial Vehicles (UAVs) utilizing a Partially Observable Markov Decision Process (POMDP) threat model.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To address the limitations associated with passive defense dependency, latency, and high overhead, several schemes [21]- [26] have shifted their focus towards active defense research. For instance, Seo et al [21] have presented an active moving target defense strategy for Unmanned Aerial Vehicles (UAVs) utilizing a Partially Observable Markov Decision Process (POMDP) threat model.…”
Section: Related Workmentioning
confidence: 99%
“…While enhancing the Quality of Service (QoS), this method prioritizes minimizing latency but does not explicitly address the protection of privacy information. Wu et al [26] proposed a method to enhance privacy in video streaming through secure reversible transformation based on GAN networks (PECAM). This approach removes some visual details without compromising user feature accuracy, thereby enhancing the security of user feature privacy.…”
Section: Related Workmentioning
confidence: 99%
“…Cao et al [19] proposes a personalized invertible DeID framework where protection and recovery are implemented by transforming disentangled ID vector with user-specified password. Wu et al [20] designs PECAM, which performs privacy-enhanced securely-reversible video transformation in video streaming and analytics systems. Li et al [21], [22] proposes identitypreserved facial anonymization via identity-aware region discovery to determine facial attributes sensitive to human eyes.…”
Section: B Deep-based Facial Anonymizationmentioning
confidence: 99%
“…When presenting the pre-obfuscated image to the recovery module, it is still hard to recover the correct image although the preobfuscated image is highly similar to the protection image. In practice, this feature allows us to apply the full protection procedure only on a few key video frames while keeping the other frames in pre-obfuscated form, similar as PECAM [20]. It will not only reduce computational burdens but also confuse potential attackers.…”
Section: Security Analysismentioning
confidence: 99%
“…Compared with purely edge-based solution, one concern about cloudedge collaboration is the potential privacy violation, since it requires training data to be uploaded to cloud. However, some existing solutions [174,21,100] have proposed privacy-preserving video streaming and analytics techniques which adapt well to our cloud-edge collaborative architecture. Therefore, privacy issues are not considered but the system is compatible with such privacy-preserving designs.…”
Section: Benefit Of Collaborative Continuous Learningmentioning
confidence: 99%