default search action
Charles Fleming
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Thomas Cilloni, Charles Fleming, Charles Walter:
You Are What You Buy: Personal Information Extraction From Anonymized Data. IEEE Access 12: 29714-29722 (2024) - [i11]Kaiwen Cai, Zhekai Duan, Gaowen Liu, Charles Fleming, Chris Xiaoxuan Lu:
Self-Adapting Large Visual-Language Models to Edge Devices across Visual Modalities. CoRR abs/2403.04908 (2024) - [i10]Mohammad Saidur Rahman, Stephen DiAdamo, Miralem Mehic, Charles Fleming:
Quantum Secure Anonymous Communication Networks. CoRR abs/2405.06126 (2024) - [i9]Xun Xian, Ganghua Wang, Xuan Bi, Jayanth Srinivasa, Ashish Kundu, Charles Fleming, Mingyi Hong, Jie Ding:
On the Vulnerability of Applying Retrieval-Augmented Generation within Knowledge-Intensive Application Domains. CoRR abs/2409.17275 (2024) - 2023
- [j5]Ilesanmi Olade, Hai-Ning Liang, Charles Fleming:
Story-based authentication for mobile devices using semantically-linked images. Int. J. Hum. Comput. Stud. 171: 102967 (2023) - [i8]Thomas Cilloni, Charles Fleming, Charles Walter:
Privacy Threats in Stable Diffusion Models. CoRR abs/2311.09355 (2023) - 2022
- [j4]Thomas Cilloni, Wei Wang, Charles Walter, Charles Fleming:
Ulixes: Facial Recognition Privacy with Adversarial Machine Learning. Proc. Priv. Enhancing Technol. 2022(1): 148-165 (2022) - [i7]Thomas Cilloni, Charles Walter, Charles Fleming:
Focused Adversarial Attacks. CoRR abs/2205.09624 (2022) - [i6]Chengkai Yu, Charles Fleming, Hai-Ning Liang:
Scale Invariant Privacy Preserving Video via Wavelet Decomposition. CoRR abs/2211.03690 (2022) - 2020
- [j3]Hai-Ning Liang, Charles Fleming, Ka Lok Man:
Personal Mobile devices at work: factors affecting the adoption of security mechanisms. Multim. Tools Appl. 79(23-24): 16113-16126 (2020) - [j2]Ilesanmi Olade, Charles Fleming, Hai-Ning Liang:
BioMove: Biometric User Identification from Human Kinesiological Movements for Virtual Reality Systems. Sensors 20(10): 2944 (2020) - [j1]Difeng Yu, Hai-Ning Liang, Kaixuan Fan, Heng Zhang, Charles Fleming, Konstantinos Papangelis:
Design and Evaluation of Visualization Techniques of Off-Screen and Occluded Targets in Virtual Reality Environments. IEEE Trans. Vis. Comput. Graph. 26(9): 2762-2774 (2020) - [c13]Thomas Cilloni, Xiyu Cai, Charles Fleming, Jun Li:
Understanding and Detecting Majority Attacks. DAPPS 2020: 11-21 - [c12]Jun Li, Alex Grintsvayg, Jeremy Kauffman, Charles Fleming:
LBRY: A Blockchain-Based Decentralized Digital Content Marketplace. DAPPS 2020: 42-51 - [c11]Ilesanmi Olade, Hai-Ning Liang, Charles Fleming, Christopher Champion:
Exploring the Vulnerabilities and Advantages of SWIPE or Pattern authentication in Virtual Reality (VR). ICVARS 2020: 45-52 - [i5]Thomas Cilloni, Wei Wang, Charles Walter, Charles Fleming:
Preventing Personal Data Theft in Images with Adversarial ML. CoRR abs/2010.10242 (2020)
2010 – 2019
- 2019
- [c10]Wenge Xu, Hai-Ning Liang, Yifan Yu, Diego Monteiro, Khalad Hasan, Charles Fleming:
Assessing the effects of a full-body motion-based exergame in virtual reality. CCHI 2019: 1-6 - [i4]Christopher Champion, Ilesanmi Olade, Konstantinos Papangelis, Haining Liang, Charles Fleming:
The Smart2 Speaker Blocker: An Open-Source Privacy Filter for Connected Home Speakers. CoRR abs/1901.04879 (2019) - [i3]Irwyn Sadien, Konstantinos Papangelis, Charles Fleming, Hai-Ning Liang:
Lessons Learned from Developing a Microservice Based Mobile Location-Based Crowdsourcing Platform. CoRR abs/1909.03596 (2019) - 2018
- [c9]Ilesanmi Olade, Hai-Ning Liang, Charles Fleming:
A Review of Multimodal Facial Biometric Authentication Methods in Mobile Devices and Their Application in Head Mounted Displays. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1997-2004 - [i2]Ilesanmi Olade, Haining Liang, Charles Fleming:
SemanticLock: An authentication method for mobile devices using semantically-linked images. CoRR abs/1806.11361 (2018) - 2017
- [c8]Michael S. Ryoo, Brandon Rothrock, Charles Fleming, Hyun Jong Yang:
Privacy-Preserving Human Activity Recognition from Extreme Low Resolution. AAAI 2017: 4255-4262 - 2016
- [c7]Zhen Yu, Hai-Ning Liang, Charles Fleming, Ka Lok Man:
An exploration of usable authentication mechanisms for virtual reality systems. APCCAS 2016: 458-460 - [i1]Michael S. Ryoo, Brandon Rothrock, Charles Fleming:
Privacy-Preserving Egocentric Activity Recognition from Extreme Low Resolution. CoRR abs/1604.03196 (2016) - 2015
- [c6]Lianyuan Wang, Yuxuan Zhao, David Olalekan Afolabi, Ka Lok Man, Hai-Ning Liang, Dawei Liu, Yiu Fai Lam, Charles Fleming, Moncef B. Tayahi:
Wi-Fi Access Point Roaming: Challenges and Potential Solutions. NBiS 2015: 158-161 - 2014
- [c5]Haining Liang, Charles Fleming, Wei Wang:
User Authentication Interfaces in Mobile Devices: Some Design Considerations. CSE 2014: 754-757 - [c4]Charles Fleming, Haining Liang, Ka Lok Man, Yudi An:
Mobistore: Secure Cloud-like Storage on Mobile Devices. CSE 2014: 764-767 - [c3]Charles Fleming, Ning Cui, Dawei Liu, Haining Liang:
Attacking Random Keypads through Click Timing Analysis. CyberC 2014: 118-121 - 2013
- [b1]Charles Fleming:
Data Tethers: Preventing Information Leakage by Enforcing Environmental Data Access Policies. University of California, Los Angeles, USA, 2013 - 2012
- [c2]Charles Fleming, Peter Peterson, Erik Kline, Peter L. Reiher:
Data Tethers: Preventing information leakage by enforcing environmental data access policies. ICC 2012: 835-840
2000 – 2009
- 2005
- [c1]Charles Fleming, Michael Mascagni, Nikolai A. Simonov:
An Efficient Monte Carlo Approach for Solving Linear Problems in Biomolecular Electrostatics. International Conference on Computational Science (3) 2005: 760-765
Coauthor Index
aka: Haining Liang
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint