{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T22:40:24Z","timestamp":1759012824432,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":71,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,9,28]]},"DOI":"10.1145\/3746059.3747601","type":"proceedings-article","created":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T07:49:12Z","timestamp":1758959352000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Invisibility Cloak: Personalized Smartwatch-Guided Camera Obfuscation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4551-4932","authenticated-orcid":false,"given":"Xue","family":"Wang","sequence":"first","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2472-6968","authenticated-orcid":false,"given":"Yang","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, California, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,9,27]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.376"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Rawan Alharbi Mariam Tolba Lucia\u00a0C Petito Josiah Hester and Nabil Alshurafa. 2019. To mask or not to mask? balancing privacy with visual confirmation utility in activity-oriented wearable cameras. Proceedings of the ACM on interactive mobile wearable and ubiquitous technologies 3 3 (2019) 1\u201329.","DOI":"10.1145\/3351230"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/3320435.3320473"},{"key":"e_1_3_3_1_5_2","unstructured":"Aaron Bangor Philip Kortum and James Miller. 2009. Determining what individual SUS scores mean: Adding an adjective rating scale. Journal of usability studies 4 3 (2009) 114\u2013123."},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Aaron Bangor Philip\u00a0T Kortum and James\u00a0T Miller. 2008. An empirical evaluation of the system usability scale. Intl. Journal of Human\u2013Computer Interaction 24 6 (2008) 574\u2013594.","DOI":"10.1080\/10447310802205776"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Adeola Bannis Shijia Pan Carlos Ruiz John Shen Hae\u00a0Young Noh and Pei Zhang. 2023. IDIoT: Multimodal framework for ubiquitous identification and assignment of human-carried wearable devices. ACM Transactions on Internet of Things 4 2 (2023) 1\u201325.","DOI":"10.1145\/3579832"},{"key":"e_1_3_3_1_8_2","unstructured":"G. Bradski. 2000. The OpenCV Library. Dr. Dobb\u2019s Journal of Software Tools (2000)."},{"key":"e_1_3_3_1_9_2","unstructured":"John Brooke et\u00a0al. 1996. SUS-A quick and dirty usability scale. Usability evaluation in industry 189 194 (1996) 4\u20137."},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/SECON55815.2022.9918171"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"crossref","unstructured":"Siyuan Cao and He Wang. 2018. Enabling public cameras to talk to the public. Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 2 2 (2018) 1\u201320.","DOI":"10.1145\/3214266"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Hongkai Chen Sirajum Munir and Shan Lin. 2022. Rfcam: Uncertainty-aware fusion of camera and wi-fi for real-time human identification with mobile devices. Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 6 2 (2022) 1\u201329.","DOI":"10.1145\/3534588"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594369"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Gaole Dai Huatao Xu Hyungjun Yoon Mo Li Rui Tan and Sung-Ju Lee. 2024. ContrastSense: Domain-invariant Contrastive Learning for In-the-Wild Wearable Sensing. Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 8 4 (2024) 1\u201332.","DOI":"10.1145\/3699744"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"Anupam Das Martin Degeling Daniel Smullen and Norman Sadeh. 2018. Personalized privacy assistants for the internet of things: Providing users with notice and choice. IEEE Pervasive Computing 17 3 (2018) 35\u201346.","DOI":"10.1109\/MPRV.2018.03367733"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.181"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Mariella Dimiccoli. 2018. J. Mar \u0131n and E. Thomaz \u201cMitigating bystander privacy concerns in egocentric activity recognition with deep learning and intentional image degradation \u201d. Proc. ACM Interactive Mobile Wearable Ubiquitous Technol 1 (2018).","DOI":"10.1145\/3161190"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS49796.2020.00022"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Yang Gao Yincheng Jin Jagmohan Chauhan Seokmin Choi Jiyang Li and Zhanpeng Jin. 2021. Voice in ear: Spoofing-resistant and passphrase-independent body sound authentication. Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 5 1 (2021) 1\u201325.","DOI":"10.1145\/3448113"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"crossref","unstructured":"Yang Gao Wei Wang Vir\u00a0V Phoha Wei Sun and Zhanpeng Jin. 2019. EarEcho: Using ear canal echo for wearable authentication. Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 3 3 (2019) 1\u201324.","DOI":"10.1145\/3351239"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"crossref","unstructured":"Zhixiang He Jing Chen Cong Wu Kun He Ruiying Du Ju Jia Yangyang Gu and Xiping Sun. 2024. HCR-Auth: Reliable Bone Conduction Earphone Authentication with Head Contact Response. Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 8 4 (2024) 1\u201327.","DOI":"10.1145\/3699780"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00106"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"crossref","unstructured":"Roberto Henschel Timo Von\u00a0Marcard and Bodo Rosenhahn. 2020. Accurate long-term multiple people tracking using video and body-worn imus. IEEE Transactions on Image Processing 29 (2020) 8476\u20138489.","DOI":"10.1109\/TIP.2020.3013801"},{"key":"e_1_3_3_1_24_2","unstructured":"Apple Inc.2024. Mac Mini with M4 Chip. https:\/\/www.apple.com\/shop\/buy-mac\/mac-mini\/apple-m4-chip-with-10-core-cpu-and-10-core-gpu-16gb-memory-256gb"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"crossref","unstructured":"Yasha Iravantchi Thomas Krolikowski William Wang Kang\u00a0G Shin and Alanson Sample. 2024. PrivacyLens: On-Device PII Removal from RGB Images using Thermally-Enhanced Sensing. Proceedings on Privacy Enhancing Technologies YYYY (X) 1 (2024) 20.","DOI":"10.56553\/popets-2024-0146"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2018.00071"},{"key":"e_1_3_3_1_27_2","volume-title":"Ultralytics YOLO11","author":"Jocher Glenn","year":"2024","unstructured":"Glenn Jocher and Jing Qiu. 2024. Ultralytics YOLO11. https:\/\/github.com\/ultralytics\/ultralytics"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"crossref","unstructured":"Youssef Khazbak Junpeng Qiu Tianxiang Tan and Guohong Cao. 2020. TargetFinder: A privacy preserving system for locating targets through IoT cameras. ACM Transactions on Internet of Things 1 3 (2020) 1\u201323.","DOI":"10.1145\/3375878"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73275-4_2"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3345437"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"crossref","unstructured":"Harold\u00a0W Kuhn. 1955. The Hungarian method for the assignment problem. Naval research logistics quarterly 2 1-2 (1955) 83\u201397.","DOI":"10.1002\/nav.3800020109"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"crossref","unstructured":"Gongjin Lan Yu Wu Fei Hu and Qi Hao. 2022. Vision-based human pose estimation via deep learning: A survey. IEEE Transactions on Human-Machine Systems 53 1 (2022) 253\u2013268.","DOI":"10.1109\/THMS.2022.3219242"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"crossref","unstructured":"Yifang Li Nishant Vishwamitra Bart\u00a0P Knijnenburg Hongxin Hu and Kelly Caine. 2017. Effectiveness and users\u2019 experience of obfuscation as a privacy-enhancing technology for sharing photos. Proceedings of the ACM on Human-Computer Interaction 1 CSCW (2017) 1\u201324.","DOI":"10.1145\/3134702"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN54338.2022.00024"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"crossref","unstructured":"John Mamish Rawan Alharbi Sougata Sen Shashank Holla Panchami Kamath Yaman Sangar Nabil Alshurafa and Josiah Hester. 2024. NIR-sighted: A programmable streaming architecture for low-energy human-centric vision applications. ACM Transactions on Embedded Computing Systems 23 6 (2024) 1\u201326.","DOI":"10.1145\/3672076"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2019.00199"},{"key":"e_1_3_3_1_37_2","first-page":"556","volume-title":"VISIGRAPP (5: VISAPP)","author":"Milotta Filippo\u00a0LM","year":"2019","unstructured":"Filippo\u00a0LM Milotta, Antonino Furnari, Sebastiano Battiato, Maria De\u00a0Salvo, Giovanni Signorello, Giovanni\u00a0Maria Farinella, et\u00a0al. 2019. Visitors Localization in Natural Sites Exploiting EgoVision and GPS.. In VISIGRAPP (5: VISAPP). 556\u2013563."},{"key":"e_1_3_3_1_38_2","unstructured":"Seungwhan Moon Andrea Madotto Zhaojiang Lin Alireza Dirafzoon Aparajita Saraf Amy Bearman and Babak Damavandi. 2022. Imu2clip: Multimodal contrastive learning for imu motion sensors from egocentric videos and text. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2210.14395 (2022)."},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"crossref","unstructured":"Jason Moore Peter McMeekin Thomas Parkes Richard Walker Rosie Morris Samuel Stuart Victoria Hetherington and Alan Godfrey. 2024. Contextualizing remote fall risk: Video data capture and implementing ethical AI. NPJ digital medicine 7 1 (2024) 61.","DOI":"10.1038\/s41746-024-01050-7"},{"key":"e_1_3_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642164"},{"key":"e_1_3_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00879"},{"key":"e_1_3_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2636072"},{"key":"e_1_3_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/2981548.2981552"},{"key":"e_1_3_3_1_44_2","unstructured":"Aaron van\u00a0den Oord Yazhe Li and Oriol Vinyals. 2018. Representation learning with contrastive predictive coding. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1807.03748 (2018)."},{"key":"e_1_3_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/3495243.3560519"},{"key":"e_1_3_3_1_46_2","first-page":"8748","volume-title":"International conference on machine learning","author":"Radford Alec","year":"2021","unstructured":"Alec Radford, Jong\u00a0Wook Kim, Chris Hallacy, Aditya Ramesh, Gabriel Goh, Sandhini Agarwal, Girish Sastry, Amanda Askell, Pamela Mishkin, Jack Clark, et\u00a0al. 2021. Learning transferable visual models from natural language supervision. In International conference on machine learning. PmLR, 8748\u20138763."},{"key":"e_1_3_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/IoTDI49375.2020.00012"},{"key":"e_1_3_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.11233"},{"key":"e_1_3_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00674"},{"key":"e_1_3_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/3643834.3661569"},{"key":"e_1_3_3_1_51_2","unstructured":"Jiayu Shu Rui Zheng and Pan Hui. 2016. Cardea: Context-aware visual privacy protection from pervasive cameras. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1610.00889 (2016)."},{"key":"e_1_3_3_1_52_2","unstructured":"Yoko Sogabe Shiori Sugimoto Ayumi Matsumoto and Masaki Kitahara. 2024. Pre-capture Privacy via Adaptive Single-Pixel Imaging. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2407.00991 (2024)."},{"key":"e_1_3_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319915"},{"key":"e_1_3_3_1_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319913"},{"key":"e_1_3_3_1_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/IROS45743.2020.9341739"},{"key":"e_1_3_3_1_56_2","doi-asserted-by":"crossref","unstructured":"Yuanyi Sun Sencun Zhu and Yu Chen. 2022. ZoomP3: Privacy-preserving publishing of online video conference recordings. Proceedings on Privacy Enhancing Technologies (2022).","DOI":"10.56553\/popets-2022-0089"},{"key":"e_1_3_3_1_57_2","doi-asserted-by":"crossref","unstructured":"Steven\u00a0L Tanimoto Alon Itai and Michael Rodeh. 1978. Some matching problems for bipartite graphs. Journal of the ACM (JACM) 25 4 (1978) 517\u2013525.","DOI":"10.1145\/322092.322093"},{"key":"e_1_3_3_1_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/1864349.1864367"},{"key":"e_1_3_3_1_59_2","doi-asserted-by":"crossref","unstructured":"Kit-Lun Tong Kun-Ru Wu and Yu-Chee Tseng. 2021. The device\u2013object pairing problem: Matching IoT devices with video objects in a multi-camera environment. Sensors 21 16 (2021) 5518.","DOI":"10.3390\/s21165518"},{"key":"e_1_3_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/3083187.3083192"},{"key":"e_1_3_3_1_61_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451769"},{"key":"e_1_3_3_1_62_2","first-page":"3467","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Wang Zhiwei","year":"2022","unstructured":"Zhiwei Wang, Yihui Yan, Yueli Yan, Huangxun Chen, and Zhice Yang. 2022. CamShield: Securing Smart Cameras through Physical Replication and Isolation. In 31st USENIX Security Symposium (USENIX Security 22). 3467\u20133484."},{"key":"e_1_3_3_1_63_2","unstructured":"P3\u00a0Kill\u00a0A Watt. 2025. Electricity Usage Monitor. https:\/\/www.amazon.com\/P3-P4400-Electricity-Usage-Monitor\/dp\/B00009MDBU Last accessed 14 July 2025."},{"key":"e_1_3_3_1_64_2","doi-asserted-by":"crossref","unstructured":"Xin Yang and Omid Ardakanian. 2023. Blinder: End-to-end privacy protection in sensing systems via personalized federated learning. ACM Transactions on Sensor Networks 20 1 (2023) 1\u201332.","DOI":"10.1145\/3623397"},{"key":"e_1_3_3_1_65_2","unstructured":"Xin Yang and Omid Ardakanian. 2024. Guided Diffusion Model for Sensor Data Obfuscation. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2412.14499 (2024)."},{"key":"e_1_3_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642713"},{"key":"e_1_3_3_1_67_2","doi-asserted-by":"crossref","unstructured":"Shikun Zhang Yuanyuan Feng Lujo Bauer Lorrie\u00a0Faith Cranor Anupam Das and Norman Sadeh. 2021. \u201cDid you know this camera tracks your mood?\u201d: Understanding Privacy Expectations and Preferences in the Age of Video Analytics. Proceedings on Privacy Enhancing Technologies (2021).","DOI":"10.2478\/popets-2021-0028"},{"key":"e_1_3_3_1_68_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2014.715"},{"key":"e_1_3_3_1_69_2","doi-asserted-by":"crossref","unstructured":"Ce Zheng Wenhan Wu Chen Chen Taojiannan Yang Sijie Zhu Ju Shen Nasser Kehtarnavaz and Mubarak Shah. 2023. Deep learning-based human pose estimation: A survey. Comput. Surveys 56 1 (2023) 1\u201337.","DOI":"10.1145\/3603618"},{"key":"e_1_3_3_1_70_2","doi-asserted-by":"crossref","unstructured":"Bolei Zhou Agata Lapedriza Aditya Khosla Aude Oliva and Antonio Torralba. 2017. Places: A 10 million image database for scene recognition. IEEE transactions on pattern analysis and machine intelligence 40 6 (2017) 1452\u20131464.","DOI":"10.1109\/TPAMI.2017.2723009"},{"key":"e_1_3_3_1_71_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642897"},{"key":"e_1_3_3_1_72_2","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413972"}],"event":{"name":"UIST '25: The 38th Annual ACM Symposium on User Interface Software and Technology","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques"],"location":"Busan Republic of Korea","acronym":"UIST '25"},"container-title":["Proceedings of the 38th Annual ACM Symposium on User Interface Software and Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3746059.3747601","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T22:06:44Z","timestamp":1759010804000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3746059.3747601"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,27]]},"references-count":71,"alternative-id":["10.1145\/3746059.3747601","10.1145\/3746059"],"URL":"https:\/\/doi.org\/10.1145\/3746059.3747601","relation":{},"subject":[],"published":{"date-parts":[[2025,9,27]]},"assertion":[{"value":"2025-09-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}