{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:55:22Z","timestamp":1763499322504,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484741","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"2780-2793","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["The Invisible Shadow: How Security Cameras Leak Private Activities"],"prefix":"10.1145","author":[{"given":"Jian","family":"Gong","sequence":"first","affiliation":[{"name":"Central South University, Chang Sha, China"}]},{"given":"Xinyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of California San Diego, San Diego, CA, USA"}]},{"given":"Ju","family":"Ren","sequence":"additional","affiliation":[{"name":"Tsinghua University, Bei Jing, China"}]},{"given":"Yaoxue","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Bei Jing, China"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Amazon. 2021 a. 360 AC1C camera. (2021). https:\/\/www.amazon.com\/360-Security-Recognition-Detection-Activity\/dp\/B089W4PKRW\/"},{"key":"e_1_3_2_2_2_1","unstructured":"Amazon. 2021 b. IR filter. (2021). https:\/\/www.amazon.com\/gp\/product\/B015XMSWIQ\/"},{"key":"e_1_3_2_2_3_1","unstructured":"Amazon. 2021 c. Top selling smart cameras on Amazon. https:\/\/www.amazon.com\/s?k=smart+cameras$&$s=review-rank$&$qid=1625164398$&$ref=$sr_st_review-rank$. (2021)."},{"key":"e_1_3_2_2_4_1","unstructured":"Amazon. 2021 d. Voile curtain. (2021). https:\/\/www.amazon.com\/gp\/product\/B0155EB71Q\/"},{"key":"e_1_3_2_2_5_1","unstructured":"Amazon. 2021 e. Wyze camera. (2021). https:\/\/www.amazon.com\/Wyze-Indoor-Wireless-Detection-Assistant\/dp\/B076H3SRXG\/"},{"key":"e_1_3_2_2_6_1","unstructured":"Brekel. 2021. Brekel Body v2. (2021). https:\/\/brekel.com\/body_v2\/"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.143"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00081"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030112.2030118"},{"key":"e_1_3_2_2_10_1","volume-title":"https:\/\/rohitgirdhar.github.io\/DetectAndTrack\/","author":"Girdhar Rohit","year":"2018","unstructured":"Rohit Girdhar. 2018. 3D Mask R-CNN. (2018). https:\/\/rohitgirdhar.github.io\/DetectAndTrack\/"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00044"},{"key":"e_1_3_2_2_12_1","unstructured":"Grandviewresearch. 2019. Window Covering Market Size. https:\/\/www.grandviewresearch.com\/industry-analysis\/window-covering-market. (2019)."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cvi.2017.0062"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2010.5652653"},{"key":"e_1_3_2_2_16_1","unstructured":"JD. 2021. Top selling smart cameras on JD.COM. https:\/\/search.jd.com\/Search?keyword=smartcamera. (2021)."},{"key":"e_1_3_2_2_17_1","volume-title":"Cho, and Seon Joo Kim. 2019","author":"Kim Yunji","year":"1910","unstructured":"Yunji Kim, Seonghyeon Nam, In Cho, and Seon Joo Kim. 2019. Unsupervised keypoint learning for guiding class-conditional video prediction. arXiv preprint arXiv:1910.02027 (2019)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6797"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790110"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130937"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386569.3392410"},{"key":"e_1_3_2_2_22_1","unstructured":"Microsoft. 2009. MSR Action 3D dataset. https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=52315. (2009)."},{"key":"e_1_3_2_2_23_1","unstructured":"Msn. 2020. Average house size around the world. https:\/\/www.msn.com\/en-in\/lifestyle\/smart-living\/how-big-is-the-average-house-size-around-the-world\/ar-AAdKEhh. (2020)."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485867"},{"key":"e_1_3_2_2_25_1","unstructured":"Obi. 2021. Obi cloth. (2021). https:\/\/assetstore.unity.com\/packages\/tools\/physics\/obi-cloth-81333"},{"key":"e_1_3_2_2_26_1","unstructured":"OpenCV. 2021. opencv contour. (2021). https:\/\/docs.opencv.org\/master\/dd\/d49\/tutorial_py_contour_features.html"},{"key":"e_1_3_2_2_27_1","unstructured":"Pytorch. 2020. Pytorch website. (2020). https:\/\/pytorch.org\/"},{"volume-title":"IEEE International Conference on Cognitive Informatics $&$ Cognitive Computing.","author":"Rahman M.W.","key":"e_1_3_2_2_28_1","unstructured":"M.W. Rahman and M.L. Gavrilova. 2017. Kinect gait skeletal joint feature-based person identification. In IEEE International Conference on Cognitive Informatics $&$ Cognitive Computing."},{"key":"e_1_3_2_2_29_1","unstructured":"Grand View Research. 2021. Smart Home Security Cameras Market Size. https:\/\/www.grandviewresearch.com\/industry-analysis\/smart-home-security-camera-market. (2021)."},{"key":"e_1_3_2_2_30_1","unstructured":"Worldpopulation review. 2021. World population. https:\/\/worldpopulationreview.com\/. (2021)."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3384419.3430781"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2015.95"},{"key":"e_1_3_2_2_33_1","unstructured":"Strategyanalytics. 2019. Smart home surveillance camera market forecast and analysis. https:\/\/www.strategyanalytics.com\/access-services\/devices\/connected-home\/smart-home\/reports\/report-detail\/2019-smart-home-surveillance-camera-market-forecast-and-analysis. (2019)."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00925"},{"key":"e_1_3_2_2_35_1","volume-title":"Sequence to sequence learning with neural networks. arXiv preprint arXiv:1409.3215","author":"Sutskever Ilya","year":"2014","unstructured":"Ilya Sutskever, Oriol Vinyals, and Quoc V Le. 2014. Sequence to sequence learning with neural networks. arXiv preprint arXiv:1409.3215 (2014)."},{"key":"e_1_3_2_2_36_1","unstructured":"Unity. 2021 a. PuppetMaster. (2021). https:\/\/assetstore.unity.com\/packages\/tools\/physics\/puppetmaster-48977"},{"key":"e_1_3_2_2_37_1","unstructured":"Unity. 2021 b. Unity 3D. (2021). https:\/\/unity.com\/"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/EMBC.2017.8037323"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00192"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"crossref","unstructured":"C. C. Wei L. H. Tsai H. P. Chou and S. C. Chang. 2020. Person Identification by Walking Gesture Using Skeleton Sequences .Advanced Concepts for Intelligent Vision Systems.","DOI":"10.1007\/978-3-030-40605-9_18"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660358"},{"key":"e_1_3_2_2_42_1","unstructured":"Youtube. 2019 a. Night vision trigger test 1 of different smart cameras. https:\/\/www.youtube.com\/watch?v=hx5k4dIbT3Y. (2019)."},{"key":"e_1_3_2_2_43_1","unstructured":"Youtube. 2019 b. Night vision trigger test 2 of different smart cameras. https:\/\/www.youtube.com\/watch?v=hx5k4dIbT3Y. (2019)."},{"key":"e_1_3_2_2_44_1","unstructured":"Youtube. 2021 a. How to see through material with a Night Vision Camcorder. (2021). https:\/\/www.youtube.com\/watch?v=RdtJlHVDcmM"},{"key":"e_1_3_2_2_45_1","unstructured":"Youtube. 2021 b. Infra-X-Vision. (2021). https:\/\/www.youtube.com\/watch?v=9DilYUiu4AQ"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00531"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117820"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Republic of Korea","acronym":"CCS '21"},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484741","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484741","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:48:21Z","timestamp":1763498901000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484741"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":48,"alternative-id":["10.1145\/3460120.3484741","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484741","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}