{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T06:37:52Z","timestamp":1767767872268,"version":"3.48.0"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031935978"},{"type":"electronic","value":"9783031935985"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-93598-5_19","type":"book-chapter","created":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T10:46:13Z","timestamp":1752576373000},"page":"254-263","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Evaluating Service-Based Privacy-Protection for\u00a0Augmented Reality Applications"],"prefix":"10.1007","author":[{"given":"Manuel","family":"Alves","sequence":"first","affiliation":[]},{"given":"Tiago","family":"Ribeiro","sequence":"additional","affiliation":[]},{"given":"Leonel","family":"Santos","sequence":"additional","affiliation":[]},{"given":"Anabela","family":"Marto","sequence":"additional","affiliation":[]},{"given":"Alexandrino","family":"Gon\u00e7alves","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Rabad\u00e3o","sequence":"additional","affiliation":[]},{"given":"Rog\u00e9rio Lu\u00eds","family":"de C. Costa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,16]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Azuma, R.T.: A survey of augmented reality. Presence: Teleoper. Virtual Environ. 6, 355\u2013385 (1997)","DOI":"10.1162\/pres.1997.6.4.355"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Calzada, I.: Citizens\u2019 data privacy in China: the state of the art of the personal information protection law (PIPL). Smart Cities 5, 1129\u20131150 (2022)","DOI":"10.3390\/smartcities5030057"},{"key":"19_CR3","unstructured":"Cheng, K., et al.: When the user is inside the user interface: an empirical study of UI security properties in augmented reality. In: USENIX Security Symposium (2024)"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Craig, A.B.: What is Augmented Reality? Understanding Augmented Reality, pp. 1\u201337 (2013)","DOI":"10.1016\/B978-0-240-82408-6.00001-1"},{"key":"19_CR5","unstructured":"Dastgerdy, S.: Virtual reality and augmented reality security: a reconnaissance and vulnerability assessment approach. arXiv preprint: arXiv:2407.15984 (2024)"},{"key":"19_CR6","unstructured":"Dissanayake, V.D.: A review of cyber security risks in an augmented reality world. University of Sri Lanka, Institute of Information Technology, Malabe, Sri Lanka (2019)"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Ghasemi, Y., Jeong, H., Choi, S.H., Park, K.B., Lee, J.Y.: Deep learning-based object detection in augmented reality: a systematic review. Comput. Ind. 139 (8 2022)","DOI":"10.1016\/j.compind.2022.103661"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Jiang, P., Ergu, D., Liu, F., Cai, Y., Ma, B.: A review of yolo algorithm developments. Procedia Comput. Sci. 199, 1066\u20131073 (1 2022)","DOI":"10.1016\/j.procs.2022.01.135"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Kaviyaraj, R., Uma, M.: A survey on future of augmented reality with AI in education. In: 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), pp. 47\u201352 (March 2021)","DOI":"10.1109\/ICAIS50930.2021.9395838"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Khan, H., Hengartner, U., Vogel, D.: Augmented reality-based mimicry attacks on behaviour-based smartphone authentication. In: MobiSys 2018 - Proceedings of the 16th ACM International Conference on Mobile Systems, Applications, and Services, pp. 41\u201353. Association for Computing Machinery, Inc (2018)","DOI":"10.1145\/3210240.3210317"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Lebeck, K., Ruth, K., Kohno, T., Roesner, F.: Securing augmented reality output. In: Proceedings - IEEE Symposium on Security and Privacy, pp. 320\u2013337. Institute of Electrical and Electronics Engineers Inc. (2017)","DOI":"10.1109\/SP.2017.13"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Lee, M.F.R., Chen, Y.C.: Artificial intelligence based object detection and tracking for a small underwater robot. Processes 11 (2023)","DOI":"10.3390\/pr11020312"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Lehman, S.M., Alrumayh, A.S., Kolhe, K., Ling, H., Tan, C.C.: Hidden in plain sight exploring privacy risks of mobile augmented reality applications. ACM Trans. Priv. Secur. 25 (11 2022)","DOI":"10.1145\/3524020"},{"key":"19_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1007\/978-3-319-10602-1_48","volume-title":"Computer Vision \u2013 ECCV 2014","author":"T-Y Lin","year":"2014","unstructured":"Lin, T.-Y., et al.: Microsoft COCO: common objects in context. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds.) ECCV 2014. LNCS, vol. 8693, pp. 740\u2013755. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10602-1_48"},{"key":"19_CR15","unstructured":"McPherson, R., Shokri, R., Shmatikov, V.: Defeating image obfuscation with deep learning. arXiv preprint: arXiv:1609.00408 (2016)"},{"issue":"7","key":"19_CR16","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MC.2012.75","volume":"45","author":"N Navab","year":"2012","unstructured":"Navab, N., Blum, T., Wang, L., Okur, A., Wendler, T.: First deployments of augmented reality in operating rooms. Computer 45(7), 48\u201355 (2012)","journal-title":"Computer"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Redmon, J., Divvala, S., Girshick, R., Farhadi, A.: You only look once: Unified, real-time object detection (2016). http:\/\/arxiv.org\/abs\/1506.02640","DOI":"10.1109\/CVPR.2016.91"},{"key":"19_CR18","doi-asserted-by":"publisher","unstructured":"Ribeiro, T., Marto, A., Gon\u00e7alves, A., Santos, L., Rabad\u00e3o, C., de\u00a0C.\u00a0Costa, R.L.: SafeARUnity: real-time image processing to enhance privacy protection in LBARGs. In: Proceedings of the 14th International Conference on Videogame Sciences and Arts (VJ 24). Communications in Computer and Information Science (CCIS), vol.\u00a02324, pp. 186\u2013200 (2025). https:\/\/doi.org\/10.1007\/978-3-031-81713-713","DOI":"10.1007\/978-3-031-81713-713"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Shang, J.: Security and privacy of augmented reality systems. In: Network Security Empowered by Artificial Intelligence, pp. 305\u2013330. Springer (2024)","DOI":"10.1007\/978-3-031-53510-9_11"},{"key":"19_CR20","doi-asserted-by":"publisher","first-page":"9619","DOI":"10.1109\/ACCESS.2017.2696953","volume":"5","author":"R Shea","year":"2017","unstructured":"Shea, R., et al.: Location-based augmented reality with pervasive smartphone sensors: Inside and beyond Pokemon go! IEEE Access 5, 9619\u20139631 (2017)","journal-title":"IEEE Access"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Silva, T., Paiva, S., Pinto, P., Pinto, A.: A survey and risk assessment on virtual and augmented reality cyberattacks. In: 2023 30th International Conference on Systems, Signals and Image Processing (IWSSIP), pp.\u00a01\u20135 (2023). ISSN: 2157-8702","DOI":"10.1109\/IWSSIP58668.2023.10180290"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"Syal, S., Mathew, R.: Threats faced by mixed reality and countermeasures. Procedia Comput. Sci. 171, 2720\u20132728 (2020)","DOI":"10.1016\/j.procs.2020.04.295"},{"key":"19_CR23","unstructured":"Yicheng, Z., Carter\u00a0Slocum, J.C., Abu-Ghazaleh, N.: It\u2019s all in your head(set): Side-channel attacks on AR\/VR systems. 32nd USENIX Conference on Security Symposium (SEC \u201923), 9-11 August 2023, Anaheim, CA, USA (2023)"}],"container-title":["Communications in Computer and Information Science","Management of Digital EcoSystems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-93598-5_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T06:34:26Z","timestamp":1767767666000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-93598-5_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031935978","9783031935985"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-93598-5_19","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"16 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MEDES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Management of Digital","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Naples","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"medes2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conferences.sigappfr.org\/medes2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}