Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024Honorable Mention
"They Make Us Old Before We're Old": Designing Ethical Health Technology with and for Older Adults
- Jianna So,
- Samantha Estrada,
- Matthew Jörke,
- Eva Bianchi,
- Maria Wang,
- Nava Haghighi,
- Kristen L. Fessele,
- James A. Landay,
- Andrea Cuadra
Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 8, Issue CSCW2Article No.: 478, Pages 1–30https://doi.org/10.1145/3687017Voice-first ambient interfaces (VFAIs), such as Alexa, can uniquely meet the health needs of older adults. However, inequitable technology may worsen health disparities and decrease independence, calling for participatory methods to increase the agency ...
- demonstrationOctober 2024
Deakin Breathes Data
UbiComp '24: Companion of the 2024 on ACM International Joint Conference on Pervasive and Ubiquitous ComputingPages 337–341https://doi.org/10.1145/3675094.3681947Deakin Breathes Data (DBD) rethought and rethreaded radio surveillance on a university campus into a material, fibrous aesthetic. We used university-captured Wi-Fi data to present how shared knowledge threads the modern university experience. Laser cut ...
- research-articleMay 2024
Fair Surveillance Assignment Problem
WWW '24: Proceedings of the ACM Web Conference 2024Pages 178–186https://doi.org/10.1145/3589334.3645613Monitoring a specific set of locations serves multiple purposes, such as infrastructure inspection and safety surveillance. We study a generalization of the surveillance problem, where the monitoring area, represented by a graph, is divided and assigned ...
Designing Gig Worker Sousveillance Tools
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 384, Pages 1–19https://doi.org/10.1145/3613904.3642614As independently-contracted employees, gig workers disproportionately suffer the consequences of workplace surveillance, which include increased pressures to work, breaches of privacy, and decreased digital autonomy. Despite the negative impacts of ...
- research-articleMay 2024
Mental Models, Expectations and Implications of Client-Side Scanning: An Interview Study with Experts
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 833, Pages 1–24https://doi.org/10.1145/3613904.3642310Client-Side Scanning (CSS) is discussed as a potential solution to contain the dissemination of child sexual abuse material (CSAM). A significant challenge associated with this debate is that stakeholders have different interpretations of the ...
-
- research-articleMay 2024Honorable Mention
Migrant Farmworkers' Experiences of Agricultural Technologies: Implications for Worker Sociality and Desired Change
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 563, Pages 1–23https://doi.org/10.1145/3613904.3642263This mixed method study situated in Ontario, Canada, investigates how migrant farmworkers’ experiences with agricultural technologies (agtech) affect their attitudes, conditions, and expectations of work, and how workers envision technologies serving as ...
- research-articleMay 2024Best Paper
Computing and the Stigmatized: Trust, Surveillance, and Spatial Politics with the Sex Workers in Bangladesh
- Pratyasha Saha,
- Nadira Nowsher,
- Ayien Utshob Baidya,
- Nusrat Jahan Mim,
- Syed Ishtiaque Ahmed,
- S M Taiabul Haque
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 780, Pages 1–22https://doi.org/10.1145/3613904.3642005The sex workers in the Global South represent a significant portion of the world sex industry. However, when compared to the relevant HCI literature on sex work and computing, there exists a noticeable gap in comprehending the experiences and ...
- research-articleJuly 2024
Human action recognition using spatio-temporal skeletal data
International Journal of Advanced Intelligence Paradigms (IJAIP), Volume 28, Issue 3-4Pages 253–271https://doi.org/10.1504/ijaip.2024.140090Human action recognition from video is an important task with multiple challenges like cluttered background, luminance, occlusions, etc. Availability of depth sensor like Kinect makes the action recognition task a bit easy but it brings new challenges in ...
- research-articleJuly 2024
Edge AI Enabled IoT Framework for Secure Smart Home Infrastructure
Procedia Computer Science (PROCS), Volume 235, Issue CPages 3369–3378https://doi.org/10.1016/j.procs.2024.04.317AbstractThe synergy of Edge Computing, Artificial Intelligence, and Internet of Things in smart city camera-based surveillance offers notable advantages in resource allocation. Traditional approaches involving constant video data streaming to central ...
- research-articleFebruary 2024
Enhanced D-CNN architecture and centroid-based algorithm for real-time vehicle tracking and accident detection from surveillance videos
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 46, Issue 2Pages 4803–4816https://doi.org/10.3233/JIFS-235911In this new era of intelligence and automation, it is important to develop intelligent software to analyse traffic data and detect abnormal activities occurring in the public. Information from GPS, Surveillance cameras, traffic management systems etc ...
- research-articleJune 2024
Unlocking the Potential of Face Recognition in OpenCV: A Comprehensive Study of Algorithmic Approaches
ICISE '23: Proceedings of the 2023 8th International Conference on Information Systems EngineeringPages 140–145https://doi.org/10.1145/3641032.3641056Face recognition technology has become increasingly prevalent in a wide range of industries, including security, monitoring, and biometrics. However, despite this prevalence, achieving accurate and effective face recognition in real-world scenarios ...
- ArticleNovember 2023
An Efficient Facial Verification System for Surveillance that Automatically Selects a Lightweight CNN Method and Utilizes Super-Resolution Images
AbstractIn the last decade, facial recognition and verification methods have been extensively used for surveillance and security purposes. However, most of the time, recognizing and/or verifying faces is challenging due to the low facial resolution of the ...
- research-articleOctober 2023
Privacy vs. Awareness: Relieving the Tension between Older Adults and Adult Children When Sharing In-home Activity Data
Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 7, Issue CSCW2Article No.: 353, Pages 1–30https://doi.org/10.1145/3610202While aging adults frequently prefer to "age in place", their children can worry about their well-being, especially when they live at a distance. Many in-home systems are designed to monitor the real-time status of seniors at home and provide information ...
- research-articleSeptember 2023
“I Did Watch ‘The Handmaid's Tale’”: Threat Modeling Privacy Post-roe in the United States
ACM Transactions on Computer-Human Interaction (TOCHI), Volume 30, Issue 4Article No.: 63, Pages 1–34https://doi.org/10.1145/3589960Now that the protections of Roe v. Wade are no longer available throughout the United States, the free flow of personal data can be used by legal authorities to provide evidence of felony. However, we know little about how impacted individuals approach ...
- research-articleJuly 2023Honorable Mention
Broadening Privacy and Surveillance: Eliciting Interconnected Values with a Scenarios Workbook on Smart Home Cameras
DIS '23: Proceedings of the 2023 ACM Designing Interactive Systems ConferencePages 1093–1113https://doi.org/10.1145/3563657.3596012We use a design workbook of speculative scenarios as a values elicitation activity with 14 participants. The workbook depicts use case scenarios with smart home camera technologies that involve surveillance and uneven power relations. The scenarios were ...
- ArticleJune 2023
Multimodal Human Pose Feature Fusion for Gait Recognition
AbstractGait recognition allows identifying people at a distance based on the way they walk (i.e. gait) in a non-invasive approach. Most of the approaches published in the last decades are dominated by the use of silhouettes or other appearance-based ...
- case-studyJune 2023
Creating PublicSpaces: Centering Public Values in Digital Infrastructures
Digital Government: Research and Practice (DGOV), Volume 4, Issue 2Article No.: 9, Pages 1–13https://doi.org/10.1145/3582578Institutions like public and universities face conflicts of values when using surveillant digital tools: organizations bound to protect the privacy and respect their autonomy of their constituents - which we term “values-led organizations” - find those ...
- research-articleJune 2023
Generalizable and efficient cross‐domain person re‐identification model using deep metric learning
AbstractMost of the successful person re‐ID models conduct supervised training and need a large number of training data. These models fail to generalise well on unseen unlabelled testing sets. The authors aim to learn a generalisable person re‐...
In this work, the authors aim to learn a generalisable person re‐identification model. The model uses one labelled source dataset and one unlabelled target dataset during training and generalises well on the target testing set. To this end, after a ...
- posterMay 2023
Capturing Hiders with Moving Obstacles
AAMAS '23: Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent SystemsPages 2754–2756The classic hide-and-seek game is an abstraction for many real-world scenarios like capturing intruders in a closed space, locating objects, patrolling an area, etc. Since most of the present work is based on static obstacles, we address solutions for ...
- extended-abstractApril 2023
Organizing Community-based Events in Participatory Action Research: Lessons Learned from a Photovoice Exhibition
- Alex Jiahong Lu,
- Shruti Sannon,
- Savana Brewer,
- Kisha N Jackson,
- Jaye Green,
- Daivon Reeder,
- Camaria Wafer,
- Tawanna R Dillahunt
CHI EA '23: Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing SystemsArticle No.: 394, Pages 1–8https://doi.org/10.1145/3544549.3573846Participatory action research (PAR) approaches center community members’ lived experiences and can spur positive change around pressing challenges faced by communities. Even though PAR and similar approaches have been increasingly adopted in HCI ...