{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:28:28Z","timestamp":1776083308621,"version":"3.50.1"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,2,20]]},"DOI":"10.1109\/icnc57223.2023.10074372","type":"proceedings-article","created":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T17:39:46Z","timestamp":1679593186000},"page":"188-194","source":"Crossref","is-referenced-by-count":1,"title":["Virtual Curtain: A Communicative Fine-grained Privacy Control Framework for Augmented Reality"],"prefix":"10.1109","author":[{"given":"Aakash","family":"Shrestha","sequence":"first","affiliation":[{"name":"Boise State University,Computer Science,Boise,USA"}]},{"given":"Yantian","family":"Hou","sequence":"additional","affiliation":[{"name":"Boise State University,Computer Science,Boise,USA"}]},{"given":"Min","family":"Long","sequence":"additional","affiliation":[{"name":"Boise State University,Computer Science,Boise,USA"}]},{"given":"Jiawei","family":"Yuan","sequence":"additional","affiliation":[{"name":"University of Massachusetts Dartmouth,Computer and Information Science,Dartmouth,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906412"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40899-4_86"},{"key":"ref3","article-title":"The History of Mobile Augmented Reality","volume":"abs\/1505.01319","author":"Arth","year":"2015","journal-title":"CoRR"},{"key":"ref4","volume-title":"SSD Mobilenetv1 Architecture","author":"Babu","year":"2021"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IEEECONF12259.2007.4218936"},{"key":"ref6","article-title":"Arcore and Sceneform in Android,| Performing gestures and collisions on Transformable Nodes","author":"Chugh","year":"2022","journal-title":"shorturl.at\/jLNV6"},{"key":"ref7","volume-title":"Feature matching"},{"key":"ref8","volume-title":"Sceneform (1.15.0) \u2014 google developers"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/s16010017"},{"key":"ref10","article-title":"What You See is What they Get: Protecting users from unwanted use of microphones, camera, and other sensors","volume-title":"In In Proceedings of Web 2.0 Security and Privacy Workshop","author":"Howell"},{"issue":"6","key":"ref11","first-page":"12","article-title":"VR and AR applications in medical practice and education","volume":"64","author":"Hsieh","year":"2017","journal-title":"Hu Li Za Zhi"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3467676"},{"key":"ref13","first-page":"415","article-title":"Enabling fine-grained permissions for augmented reality applications with recognizers","volume-title":"In 22nd USENIX Security Symposium (USENIX Security 13)","author":"Jana"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.31"},{"key":"ref15","volume-title":"Coordinate Systems"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2873587.2873595"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3301293.3302362"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.13"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126542"},{"key":"ref20","article-title":"Lawrence Zitnick, and Piotr Doll\u00e1r","author":"Lin","year":"2014","journal-title":"Microsoft COCO: Common Objects in Context"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cirp.2012.05.010"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR.2006.297800"},{"key":"ref23","volume-title":"Gaussian Blur for Image blurring Using OpenCV","year":"2021"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2638728.2641707"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906405"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2021.078"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2580723.2580730"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660319"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07960-5"},{"key":"ref30","first-page":"141","article-title":"Secure multiuser content sharing for augmented reality applications","volume-title":"In 28th USENIX Security Symposium (USENIX Security 19)","author":"Ruth"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-301-3_5"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1476589.1476686"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.31812\/123456789\/4421"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23014"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.33"},{"key":"ref36","volume-title":"Augmented reality","year":"2022"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1038\/s41377-021-00658-8"},{"key":"ref38","volume-title":"Spatial mapping - mixed reality","author":"Zeller"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC47002.2019.00037"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR.2008.4637362"}],"event":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","location":"Honolulu, HI, USA","start":{"date-parts":[[2023,2,20]]},"end":{"date-parts":[[2023,2,22]]}},"container-title":["2023 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10073968\/10073976\/10074372.pdf?arnumber=10074372","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T15:41:21Z","timestamp":1707838881000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10074372\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,20]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/icnc57223.2023.10074372","relation":{},"subject":[],"published":{"date-parts":[[2023,2,20]]}}}