Preserving privacy in speaker and speech characterisation
暂无分享,去创建一个
Nicholas W. D. Evans | Gérard Chollet | Driss Matrouf | Jascha Kolberg | Christoph Busch | Marta Gomez-Barrero | Andreas Nautsch | Massimiliano Todisco | Héctor Delgado | Abelino Jiménez | Alberto Abad | Amos Treiber | Dijana Petrovska-Delacrétaz | Aymen Mtibaa | Mohamed Amine Hmani | Catherine Jasserand | Els Kindt | Mohammed Ahmed Abdelraheem | Francisco Teixeira | G. Chollet | A. Nautsch | M. Todisco | N. Evans | H. Delgado | D. Matrouf | C. Busch | D. Petrovska-Delacrétaz | Abelino Jiménez | Aymen Mtibaa | A. Abad | Jascha Kolberg | M. Gomez-Barrero | C. Jasserand | E. Kindt | Francisco Teixeira | Amos Treiber | Gérard Chollet
[1] Vinod Vaikuntanathan,et al. Functional Encryption: New Perspectives and Lower Bounds , 2013, IACR Cryptol. ePrint Arch..
[2] Bhiksha Raj,et al. Speaker verification using Secure Binary Embeddings , 2013, 21st European Signal Processing Conference (EUSIPCO 2013).
[3] Yuval Ishai,et al. Extending Oblivious Transfers Efficiently , 2003, CRYPTO.
[4] Bhiksha Raj,et al. Privacy-preserving speaker verification using garbled GMMS , 2014, 2014 22nd European Signal Processing Conference (EUSIPCO).
[5] Hassan Takabi,et al. CryptoDL: Deep Neural Networks over Encrypted Data , 2017, ArXiv.
[6] María Victoria Rodellar Biarge,et al. Glottal Source biometrical signature for voice pathology detection , 2009, Speech Commun..
[7] Guy Gogniat,et al. Recent Advances in Homomorphic Encryption , 2013 .
[8] Louis-Jean Boë,et al. Forensic voice identification in France , 2000, Speech Commun..
[9] Nicholas W. D. Evans,et al. The EURECOM Submission to the First DIHARD Challenge , 2018, INTERSPEECH.
[10] Brent Waters,et al. Functional Encryption: Definitions and Challenges , 2011, TCC.
[11] Germán Castellanos-Domínguez,et al. Automatic age detection in normal and pathological voice , 2015, INTERSPEECH.
[12] Allison Bishop,et al. Function-Hiding Inner Product Encryption , 2015, ASIACRYPT.
[13] David Evans,et al. Two Halves Make a Whole - Reducing Data Transfer in Garbled Circuits Using Half Gates , 2015, EUROCRYPT.
[14] Andreas Uhl,et al. Cancelable biometrics for finger vein recognition , 2016, 2016 First International Workshop on Sensing, Processing and Learning for Intelligent Machines (SPLINE).
[15] Vincenzo Piuri,et al. Implementing FingerCode-based identity matching in the encrypted domain , 2010, 2010 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications.
[16] Jascha Kolberg,et al. Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters , 2018, Odyssey.
[17] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[18] Qian Wang,et al. Outsourced Biometric Identification With Privacy , 2018, IEEE Transactions on Information Forensics and Security.
[19] Jean-François Bonastre,et al. A novel speaker binary key derived from anchor models , 2010, INTERSPEECH.
[20] Arun Ross,et al. Iris image reconstruction from binary templates: An efficient probabilistic approach based on genetic algorithms , 2013, Comput. Vis. Image Underst..
[21] Sandro Cumani. Fast Scoring of Full Posterior PLDA Models , 2015, IEEE/ACM Transactions on Audio, Speech, and Language Processing.
[22] Demetrius Klitou. Privacy-invading technologies and privacy by design : safeguarding privacy, liberty and security in the 21st century , 2014 .
[23] Els Kindt. A Legal Perspective on the Relevance of Biometric Presentation Attack Detection (PAD) for Payment Services Under PSDII and the GDPR , 2019, Handbook of Biometric Anti-Spoofing, 2nd Ed..
[24] Joan Feigenbaum,et al. Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation , 2016, Financial Cryptography Workshops.
[25] Alessandra Lumini,et al. Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[26] Petros Boufounos,et al. Secure binary embeddings for privacy preserving nearest neighbors , 2011, 2011 IEEE International Workshop on Information Forensics and Security.
[27] Bhiksha Raj,et al. Multiparty Differential Privacy via Aggregation of Locally Trained Classifiers , 2010, NIPS.
[28] Isabel Trancoso,et al. Logsum Using Garbled Circuits , 2015, PloS one.
[29] Jordi Luque,et al. On the modeling of natural vocal emotion expressions through binary key , 2014, 2014 22nd European Signal Processing Conference (EUSIPCO).
[30] Niko Brümmer,et al. Application-independent evaluation of speaker detection , 2006, Comput. Speech Lang..
[31] Jean-François Bonastre,et al. Fast speaker diarization based on binary keys , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[32] Feng Li,et al. Outsourceable two-party privacy-preserving biometric authentication , 2014, AsiaCCS.
[33] Sanjeev Khudanpur,et al. Deep neural network-based speaker embeddings for end-to-end speaker verification , 2016, 2016 IEEE Spoken Language Technology Workshop (SLT).
[34] Yehuda Lindell,et al. More efficient oblivious transfer and extensions for faster secure computation , 2013, CCS.
[35] Pietro Laface,et al. Pairwise Discriminative Speaker Verification in the ${\rm I}$-Vector Space , 2011, IEEE Transactions on Audio, Speech, and Language Processing.
[36] Shantanu Rane,et al. Standardization of Biometric Template Protection , 2014, IEEE MultiMedia.
[37] Yehuda Lindell,et al. An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants , 2018, IACR Cryptol. ePrint Arch..
[38] Anton H. M. Akkermans,et al. A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem , 2009, DPM/SETOP.
[39] Vincenzo Piuri,et al. A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[40] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[41] Benny Pinkas,et al. Oblivious RAM Revisited , 2010, CRYPTO.
[42] Bart Preneel,et al. Privacy Weaknesses in Biometric Sketches , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[43] Yao Lu,et al. Oblivious Neural Network Predictions via MiniONN Transformations , 2017, IACR Cryptol. ePrint Arch..
[44] Rafail Ostrovsky,et al. Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..
[45] Lorrie Faith Cranor,et al. Engineering Privacy , 2009, IEEE Transactions on Software Engineering.
[46] Didier Meuwly,et al. A guideline for the validation of likelihood ratio methods used for forensic evidence evaluation. , 2017, Forensic science international.
[47] Jonathan Katz,et al. Efficient Privacy-Preserving Biometric Identification , 2011, NDSS.
[48] Bhiksha Raj,et al. Privacy-Preserving Speaker Verification and Identification Using Gaussian Mixture Models , 2013, IEEE Transactions on Audio, Speech, and Language Processing.
[49] Christian Rathgeb,et al. Efficient two-stage speaker identification based on universal background models , 2014, 2014 International Conference of the Biometrics Special Interest Group (BIOSIG).
[50] Elmar Nöth,et al. Language-Independent Age Estimation from Speech Using Phonological and Phonemic Features , 2015, TSD.
[51] E. J. Kindt,et al. Having yes, using no? About the new legal regime for biometric data , 2017, Comput. Law Secur. Rev..
[52] Sanjeev Khudanpur,et al. X-Vectors: Robust DNN Embeddings for Speaker Recognition , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[53] David Cash,et al. Leakage-Abuse Attacks Against Searchable Encryption , 2015, IACR Cryptol. ePrint Arch..
[54] Kui Ren,et al. CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud , 2015, ESORICS.
[55] Constance Morel,et al. Privacy-Preserving Classification on Deep Neural Network , 2017, IACR Cryptol. ePrint Arch..
[56] Lawrence Lessig,et al. Code - version 2.0 , 2006 .
[57] E. B. Newman,et al. A Scale for the Measurement of the Psychological Magnitude Pitch , 1937 .
[58] Kay Hamacher,et al. Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies , 2018, AsiaCCS.
[59] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System (Awarded Best Student Paper!) , 2004 .
[60] Farinaz Koushanfar,et al. XONN: XNOR-based Oblivious Deep Neural Network Inference , 2019, IACR Cryptol. ePrint Arch..
[61] Niko Brümmer,et al. The PAV algorithm optimizes binary proper scoring rules , 2013, ArXiv.
[62] Bhiksha Raj,et al. Privacy-Preserving Speaker Authentication , 2012, ISC.
[63] Aaron Roth,et al. The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..
[64] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[65] Berrin A. Yanikoglu,et al. Realization of correlation attack against the fuzzy vault scheme , 2008, Electronic Imaging.
[66] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[67] Daniel Garcia-Romero,et al. Analysis of i-vector Length Normalization in Speaker Recognition Systems , 2011, INTERSPEECH.
[68] Patrick Kenny,et al. Joint Factor Analysis of Speaker and Session Variability: Theory and Algorithms , 2006 .
[69] Isabel Trancoso,et al. Exploring Hashing and Cryptonet Based Approaches for Privacy-Preserving Speech Emotion Recognition , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[70] Muttukrishnan Rajarajan,et al. Privacy preserving encrypted phonetic search of speech data , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[71] Luiz Costa,et al. Privacy and the regulation of 2012 , 2012, Comput. Law Secur. Rev..
[72] Yehuda Lindell,et al. Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer , 2010, IACR Cryptol. ePrint Arch..
[73] Tanja Lange,et al. Post-quantum cryptography , 2008, Nature.
[74] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[75] Julien Bringer,et al. Biometric Identification over Encrypted Data Made Feasible , 2009, ICISS.
[76] Ira S. Rubinstein,et al. Privacy by Design: A Counterfactual Analysis of Google and Facebook Privacy Incidents , 2012 .
[77] Andy Adler. Sample images can be independently restored from face recognition templates , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).
[78] Lukás Burget,et al. Language Recognition in iVectors Space , 2011, INTERSPEECH.
[79] Payman Mohassel,et al. SecureML: A System for Scalable Privacy-Preserving Machine Learning , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[80] Julian Fiérrez,et al. Multi-biometric template protection based on Homomorphic Encryption , 2017, Pattern Recognit..
[81] Vladimir Kolesnikov,et al. Improved Garbled Circuit: Free XOR Gates and Applications , 2008, ICALP.
[82] Carlos V. Rozas,et al. Innovative instructions and software model for isolated execution , 2013, HASP '13.
[83] Benny Pinkas,et al. SCiFI - A System for Secure Face Identification , 2010, 2010 IEEE Symposium on Security and Privacy.
[84] Julien Bringer,et al. GSHADE: faster privacy-preserving distance computation and biometric identification , 2014, IH&MMSec '14.
[85] Sanjeev Khudanpur,et al. Spoken Language Recognition using X-vectors , 2018, Odyssey.
[86] Srinivas Devadas,et al. Intel SGX Explained , 2016, IACR Cryptol. ePrint Arch..
[87] David Pointcheval,et al. Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries , 1999, ASIACRYPT.
[88] Bernadette Dorizzi,et al. Enhancing Information Security and Privacy by Combining Biometrics with Cryptography , 2012, Synthesis Lectures on Information Security, Privacy, and Trust.
[89] Elaine Shi,et al. Predicate Privacy in Encryption Systems , 2009, IACR Cryptol. ePrint Arch..
[90] David J. Wu,et al. Function-Hiding Inner Product Encryption is Practical , 2018, IACR Cryptol. ePrint Arch..
[91] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[92] Bhiksha Raj,et al. Privacy-preserving Query-by-Example Speech Search , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[93] Bhiksha Raj,et al. Privacy-preserving speaker verification as password matching , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[94] Ramón Fernández Astudillo,et al. Exploiting Phone Log-Likelihood Ratio Features for the Detection of the Native Language of Non-Native English Speakers , 2016, INTERSPEECH.
[95] Simon J. D. Prince,et al. Computer Vision: Models, Learning, and Inference , 2012 .
[96] Muttukrishnan Rajarajan,et al. Privacy-Preserving iVector-Based Speaker Verification , 2019, IEEE/ACM Transactions on Audio, Speech, and Language Processing.
[97] Sharath Pankanti,et al. Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..
[98] Patrizio Campisi,et al. Security and Privacy in Biometrics , 2013, Springer London.
[99] A. Oppenheim,et al. Homomorphic analysis of speech , 1968 .
[100] Julian Fiérrez,et al. Implementation of Fixed-Length Template Protection Based on Homomorphic Encryption with Application to Signature Biometrics , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[101] Carmela Troncoso,et al. Engineering Privacy by Design , 2011 .
[102] Ahmad-Reza Sadeghi,et al. Privacy-Preserving ECG Classification With Branching Programs and Neural Networks , 2011, IEEE Transactions on Information Forensics and Security.
[103] Mihir Bellare,et al. Efficient Garbling from a Fixed-Key Blockcipher , 2013, 2013 IEEE Symposium on Security and Privacy.
[104] Yehuda Lindell,et al. How To Simulate It - A Tutorial on the Simulation Proof Technique , 2016, IACR Cryptol. ePrint Arch..
[105] Douglas A. Reynolds,et al. Speaker Verification Using Adapted Gaussian Mixture Models , 2000, Digit. Signal Process..
[106] Ron Steinfeld,et al. Efficient Public Key Encryption Based on Ideal Lattices , 2009, ASIACRYPT.
[107] Marta Gomez-Barrero,et al. General Framework to Evaluate Unlinkability in Biometric Template Protection Systems , 2018, IEEE Transactions on Information Forensics and Security.
[108] Michal Choras,et al. Privacy-Preserving Biometric Authentication and Matching via Lattice-Based Encryption , 2015, DPM/QASA@ESORICS.
[109] Xavier Anguera Miró,et al. Fast Single- and Cross-Show Speaker Diarization Using Binary Key Speaker Modeling , 2015, IEEE/ACM Transactions on Audio, Speech, and Language Processing.
[110] Anantha Chandrakasan,et al. Gazelle: A Low Latency Framework for Secure Neural Network Inference , 2018, IACR Cryptol. ePrint Arch..
[111] Andreas Uhl,et al. A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..
[112] Bhiksha Raj,et al. Secure Modular Hashing , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[113] Jaap-Henk Hoepman,et al. PDF hosted at the Radboud Repository of the Radboud University Nijmegen , 2022 .
[114] Vitaly Shmatikov,et al. Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[115] Hugo Krawczyk,et al. Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation , 2014, NDSS.
[116] Bhiksha Raj,et al. Privacy Preserving Speaker Verification Using Adapted GMMs , 2011, INTERSPEECH.
[117] Lukás Burget,et al. Gaussian meta-embeddings for efficient scoring of a heavy-tailed PLDA model , 2018, Odyssey.
[118] Pascal Paillier,et al. Fast Homomorphic Evaluation of Deep Discretized Neural Networks , 2018, IACR Cryptol. ePrint Arch..
[119] Muttukrishnan Rajarajan,et al. Redesign of Gaussian Mixture Model for Efficient and Privacy-preserving Speaker Recognition , 2018, 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA).
[120] John H. L. Hansen,et al. Speaker Recognition by Machines and Humans: A tutorial review , 2015, IEEE Signal Processing Magazine.
[121] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[122] Takeshi Koshiba,et al. Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics , 2013, CD-ARES Workshops.
[123] Giovanni Costantini,et al. Speech emotion recognition using amplitude modulation parameters and a combined feature selection procedure , 2014, Knowl. Based Syst..
[124] Davide Maltoni,et al. A two-factor protection scheme for MCC fingerprint templates , 2014, 2014 International Conference of the Biometrics Special Interest Group (BIOSIG).
[125] Rama Chellappa,et al. Cancelable Biometrics: A review , 2015, IEEE Signal Processing Magazine.
[126] Luminita Vasiu,et al. Biometric Recognition - Security and Privacy Concerns , 2004, ICETE.
[127] Stan Davis,et al. Comparison of Parametric Representations for Monosyllabic Word Recognition in Continuously Spoken Se , 1980 .
[128] Maria Zhdanova,et al. Time to Rethink: Trust Brokerage Using Trusted Execution Environments , 2015, TRUST.
[129] Joaquín González-Rodríguez,et al. Cross-entropy analysis of the information in forensic speaker recognition , 2008, Odyssey.
[130] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[131] Isabel Trancoso,et al. Patient Privacy in Paralinguistic Tasks , 2018, INTERSPEECH.
[132] Driss Matrouf,et al. Discriminant binary data representation for speaker recognition , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[133] Miguel Angel Ferrer-Ballester,et al. A novel hand reconstruction approach and its application to vulnerability assessment , 2014, Inf. Sci..
[134] Enrique Argones-Rúa,et al. Biometric Template Protection Using Universal Background Models: An Application to Online Signature , 2012, IEEE Transactions on Information Forensics and Security.
[135] Joseph H. Silverman,et al. NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.
[136] Murat Kantarcioglu,et al. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation , 2012, NDSS.
[137] Patrick Kenny,et al. Joint Factor Analysis Versus Eigenchannels in Speaker Recognition , 2007, IEEE Transactions on Audio, Speech, and Language Processing.
[138] Joseph K. Liu,et al. Toward efficient and privacy-preserving computing in big data era , 2014, IEEE Network.
[139] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[140] MARTA GOMEZ-BARRERO,et al. Privacy-Preserving Comparison of Variable-Length Data With Application to Biometric Template Protection , 2017, IEEE Access.
[141] Pierre-Michel Bousquet,et al. Session compensation using binary speech representation for speaker recognition , 2014, Pattern Recognit. Lett..
[142] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[143] Liming Chen,et al. Voice-Based Gender Identification in Multimedia Applications , 2005, Journal of Intelligent Information Systems.
[144] Ahmad-Reza Sadeghi,et al. Secure Multiparty Computation from SGX , 2017, Financial Cryptography.
[145] Bhiksha Raj,et al. Privacy preserving Distance computation using somewhat-trusted third parties , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[146] Dejing Dou,et al. Differential Privacy Preservation for Deep Auto-Encoders: an Application of Human Behavior Prediction , 2016, AAAI.
[147] Catherine Jasserand. Legal Nature of Biometric Data: From 'Generic' Personal Data to Sensitive Data: Which Changes Does the New Data Protection Framework Introduce? , 2016 .
[148] Raymond N. J. Veldhuis,et al. Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme , 2011, IEEE Transactions on Information Forensics and Security.
[149] Michael Naehrig,et al. CryptoNets: applying neural networks to encrypted data with high throughput and accuracy , 2016, ICML 2016.
[150] Lukás Burget,et al. Comparison of scoring methods used in speaker recognition with Joint Factor Analysis , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[151] Mihir Bellare,et al. Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..
[152] Bhiksha Raj,et al. A two factor transformation for speaker verification through ℓ1 comparison , 2017, 2017 IEEE Workshop on Information Forensics and Security (WIFS).
[153] Björn Schuller,et al. Computational Paralinguistics , 2013 .
[154] Tomoki Toda,et al. Voice Conversion Based on Maximum-Likelihood Estimation of Spectral Parameter Trajectory , 2007, IEEE Transactions on Audio, Speech, and Language Processing.
[155] Hugo Krawczyk,et al. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries , 2013, IACR Cryptol. ePrint Arch..
[156] James H. Elder,et al. Probabilistic Linear Discriminant Analysis for Inferences About Identity , 2007, 2007 IEEE 11th International Conference on Computer Vision.
[157] Farinaz Koushanfar,et al. Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications , 2018, IACR Cryptol. ePrint Arch..
[158] Yehuda Lindell,et al. A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.
[159] Gérard Chollet,et al. Assessment of speaker verification systems , 1995 .
[160] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[161] Christoph Busch,et al. Biometric template protection for speaker recognition based on universal background models , 2015, IET Biom..
[162] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[163] Yihua Zhang,et al. Secure Computation on Floating Point Numbers , 2013, NDSS.
[164] Takeshi Koshiba,et al. New packing method in somewhat homomorphic encryption and its applications , 2015, Secur. Commun. Networks.
[165] Mehryar Mohri,et al. Voice signatures , 2003, 2003 IEEE Workshop on Automatic Speech Recognition and Understanding (IEEE Cat. No.03EX721).
[166] Ahmad-Reza Sadeghi,et al. Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification , 2009, IACR Cryptol. ePrint Arch..
[167] Marina Blanton,et al. Secure outsourced computation of iris matching , 2012, J. Comput. Secur..
[168] Jorge Guajardo,et al. Efficient strategies to play the indistinguishability game for fuzzy sketches , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[169] Ian Goodfellow,et al. Deep Learning with Differential Privacy , 2016, CCS.
[170] Florin Curelaru,et al. Front-End Factor Analysis For Speaker Verification , 2018, 2018 International Conference on Communications (COMM).
[171] Marcus Peinado,et al. Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems , 2015, 2015 IEEE Symposium on Security and Privacy.
[172] Charalampos Papamanthou,et al. Dynamic searchable symmetric encryption , 2012, IACR Cryptol. ePrint Arch..
[173] Yehuda Lindell,et al. Private Web Search with Malicious Adversaries , 2010, Privacy Enhancing Technologies.
[174] Anil K. Jain,et al. Biometric template transformation: a security analysis , 2010, Electronic Imaging.
[175] Seyed Omid Sadjadi,et al. Speaker age estimation on conversational telephone speech using senone posterior based i-vectors , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[176] Brett Hemenway,et al. SoK: General Purpose Compilers for Secure Multi-Party Computation , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[177] Jiankun Hu,et al. Design of alignment-free cancelable fingerprint templates via curtailed circular convolution , 2014, Pattern Recognit..
[178] Bhiksha Raj,et al. Privacy preserving probabilistic inference with Hidden Markov Models , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[179] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[180] Ahmad-Reza Sadeghi,et al. Automated Synthesis of Optimized Circuits for Secure Computation , 2015, CCS.
[181] Varun Kanade,et al. TAPAS: Tricks to Accelerate (encrypted) Prediction As a Service , 2018, ICML.
[182] Ieee Staff. 2013 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS) , 2013 .
[183] Marina Blanton,et al. Secure and Efficient Protocols for Iris and Fingerprint Identification , 2011, ESORICS.
[184] Bart Preneel,et al. Criteria towards metrics for benchmarking template protection algorithms , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[185] Michael Zohner,et al. ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation , 2015, NDSS.
[186] Valerio Schiavoni,et al. X-search: revisiting private web search using intel SGX , 2017, Middleware.
[187] Sergey Ioffe,et al. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.
[188] Ahmad-Reza Sadeghi,et al. VoiceGuard: Secure and Private Speech Processing , 2018, INTERSPEECH.
[189] Ahmed Ben Hamida,et al. Cancelable speaker verification system based on binary Gaussian mixtures , 2018, 2018 4th International Conference on Advanced Technologies for Signal and Image Processing (ATSIP).
[190] Ninghui Li,et al. Privacy at Scale: Local Dierential Privacy in Practice , 2018 .
[191] Haizhou Li,et al. An overview of text-independent speaker recognition: From features to supervectors , 2010, Speech Commun..
[192] Christoph Busch,et al. Multi-Bit Allocation: Preparing Voice Biometrics for Template Protection , 2016, Odyssey.
[193] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[194] Julien Bringer,et al. Security analysis of Bloom filter-based iris biometric template protection , 2015, 2015 International Conference on Biometrics (ICB).
[195] Sanjeev Khudanpur,et al. Deep Neural Network Embeddings for Text-Independent Speaker Verification , 2017, INTERSPEECH.