Towards Privacy-Preserving Speech Data Publishing
暂无分享,去创建一个
Xiang-Yang Li | Feng Han | Yu Wang | Chunhong Zhang | Jianwei Qian | Jiahui Hou | Yu Wang | Xiangyang Li | Jianwei Qian | Chunhong Zhang | Jiahui Hou | Feng Han
[1] Bhiksha Raj,et al. Privacy-Preserving Speaker Authentication , 2012, ISC.
[2] Ramayya Krishnan,et al. Privacy-preserving similarity-based text retrieval , 2010, TOIT.
[3] Björn W. Schuller,et al. The INTERSPEECH 2011 Speaker State Challenge , 2011, INTERSPEECH.
[4] S. Johar. Psychology of Voice , 2016 .
[5] Yu Wang,et al. VoiceMask: Anonymize and Sanitize Voice Input on Mobile Devices , 2017, ArXiv.
[6] Xiang-Yang Li,et al. Graph-based privacy-preserving data publication , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[7] H. Ney,et al. VTLN-based voice conversion , 2003, Proceedings of the 3rd IEEE International Symposium on Signal Processing and Information Technology (IEEE Cat. No.03EX795).
[8] Huan Zhao,et al. Automatic Chinese Personality Recognition Based on Prosodic Features , 2015, MMM.
[9] Xiang-Yang Li,et al. De-anonymizing social networks and inferring private attributes using knowledge graphs , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[10] Thomas S. Huang,et al. Emotion recognition from speech VIA boosted Gaussian mixture models , 2009, 2009 IEEE International Conference on Multimedia and Expo.
[11] Douglas A. Reynolds,et al. Speaker Verification Using Adapted Gaussian Mixture Models , 2000, Digit. Signal Process..
[12] Xiang-Yang Li,et al. User-Demand-Oriented Privacy-Preservation in Video Delivering , 2016, 2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN).
[13] Erik McDermott,et al. Deep neural networks for small footprint text-dependent speaker verification , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[14] Haizhou Li,et al. Voice conversion versus speaker verification: an overview , 2014 .
[15] Sanjeev Khudanpur,et al. Librispeech: An ASR corpus based on public domain audio books , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[16] Todor Ganchev,et al. Estimation of unknown speaker’s height from speech , 2009, Int. J. Speech Technol..
[17] Shaojie Tang,et al. Social Network De-anonymization: More Adversarial Knowledge, More Users Re-Identified? , 2017 .
[18] Dong Wang,et al. Deep Speaker Feature Learning for Text-Independent Speaker Verification , 2017, INTERSPEECH.
[19] Xiangyang Li,et al. Finding the Stars in the Fireworks: Deep Understanding of Motion Sensor Fingerprint , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.
[20] Xiang-Yang Li,et al. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel , 2015, IEEE Transactions on Dependable and Secure Computing.
[21] Xiang-Yang Li,et al. AccountTrade: Accountable protocols for big data trading against dishonest consumers , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[22] Xiao Liu,et al. Deep Speaker: an End-to-End Neural Speaker Embedding System , 2017, ArXiv.
[23] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.
[24] Paris Smaragdis,et al. A Framework for Secure Speech Recognition , 2007, IEEE Transactions on Audio, Speech, and Language Processing.
[25] Seyed Hamidreza Mohammadi,et al. An overview of voice conversion systems , 2017, Speech Commun..
[26] F. McGehee. The Reliability of the Identification of the Human Voice , 1937 .
[27] Yunhao Liu,et al. PIC: Enable Large-Scale Privacy Preserving Content-Based Image Search on Cloud , 2017, IEEE Trans. Parallel Distributed Syst..
[28] Yunhao Liu,et al. Privacy-friendly photo capturing and sharing system , 2016, UbiComp.
[29] Daniel Gillick,et al. Can conversational word usage be used to predict speaker demographics? , 2010, INTERSPEECH.
[30] Florin Curelaru,et al. Front-End Factor Analysis For Speaker Verification , 2018, 2018 International Conference on Communications (COMM).
[31] Xiang-Yang Li,et al. CASTLE: Enhancing the Utility of Inequality Query Auditing Without Denial Threats , 2018, IEEE Transactions on Information Forensics and Security.
[32] Guillaume Lample,et al. Neural Architectures for Named Entity Recognition , 2016, NAACL.
[33] Bhiksha Raj,et al. Privacy-Preserving Speaker Verification and Identification Using Gaussian Mixture Models , 2013, IEEE Transactions on Audio, Speech, and Language Processing.
[34] Taeho Jung,et al. Search me if you can: Privacy-preserving location query service , 2012, 2013 Proceedings IEEE INFOCOM.
[35] Yunhao Liu,et al. PIC: Enable Large-Scale Privacy Preserving Content-Based Image Search on Cloud , 2015, IEEE Transactions on Parallel and Distributed Systems.
[36] Wenchao Huang,et al. AppDNA: App Behavior Profiling via Graph-based Deep Learning , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.
[37] Linlin Chen,et al. Social Network De-Anonymization and Privacy Inference with Knowledge Graph Model , 2019, IEEE Transactions on Dependable and Secure Computing.