{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T02:53:47Z","timestamp":1761015227554,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031171451"},{"type":"electronic","value":"9783031171468"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-17146-8_30","type":"book-chapter","created":{"date-parts":[[2022,9,21]],"date-time":"2022-09-21T23:35:39Z","timestamp":1663803339000},"page":"610-628","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["No-Label User-Level Membership Inference for\u00a0ASR Model Auditing"],"prefix":"10.1007","author":[{"given":"Yuantian","family":"Miao","sequence":"first","affiliation":[]},{"given":"Chao","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Shigang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Seyit","family":"Camtepe","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,22]]},"reference":[{"key":"30_CR1","unstructured":"CCPA, D.U.: California consumer privacy act (ccpa) website policy (2020)"},{"key":"30_CR2","unstructured":"Chen, Y., et al.: Devil\u2019s whisper: A general approach for physical adversarial attacks against commercial black-box speech recognition devices. In: Proceedings of the 29th USENIX Security Symposium (USENIX Security 20) (2020)"},{"key":"30_CR3","unstructured":"Choo, C.A.C., Tramer, F., Carlini, N., Papernot, N.: Label-only membership inference attacks. arXiv preprint arXiv:2007.14321 (2020)"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Du, T., Ji, S., Li, J., Gu, Q., Wang, T., Beyah, R.: Sirenattack: generating adversarial audio for end-to-end acoustic systems. arXiv preprint arXiv:1901.07846 (2019)","DOI":"10.1145\/3320269.3384733"},{"issue":"1","key":"30_CR5","doi-asserted-by":"publisher","first-page":"133","DOI":"10.2478\/popets-2019-0008","volume":"2019","author":"J Hayes","year":"2019","unstructured":"Hayes, J., Melis, L., Danezis, G., De Cristofaro, E.: Logan: membership inference attacks against generative models. Proc. Privacy Enhan. Technol. 2019(1), 133\u2013152 (2019)","journal-title":"Proc. Privacy Enhan. Technol."},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Hu, H., Salcic, Z., Dobbie, G., Zhang, X.: Membership inference attacks on machine learning: a survey. arXiv preprint arXiv:2103.07853 (2021)","DOI":"10.1109\/ICDM51629.2021.00129"},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"Jiang, J., et al.: Automatic online evaluation of intelligent assistants. In: Proceedings of the 24th International Conference on World Wide Web. pp. 506\u2013516 (2015)","DOI":"10.1145\/2736277.2741669"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Kim, T.K.: Short research on voice control system based on artificial intelligence assistant. In: 2020 International Conference on Electronics, Information, and Communication (ICEIC). pp. 1\u20132. IEEE (2020)","DOI":"10.1109\/ICEIC49074.2020.9051160"},{"key":"30_CR9","unstructured":"Li, Z., Zhang, Y.: Label-leaks: membership inference attack with label. arXiv preprint arXiv:2007.15528 (2020)"},{"issue":"5","key":"30_CR10","doi-asserted-by":"publisher","first-page":"907","DOI":"10.1109\/TCSS.2019.2916086","volume":"6","author":"G Liu","year":"2019","unstructured":"Liu, G., Wang, C., Peng, K., Huang, H., Li, Y., Cheng, W.: Socinf: membership inference attacks on social media health data with machine learning. IEEE Trans. Comput. Soc. Syst. 6(5), 907\u2013921 (2019)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"McReynolds, E., Hubbard, S., Lau, T., Saraf, A., Cakmak, M., Roesner, F.: Toys that listen: a study of parents, children, and Internet-connected toys. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. pp. 5197\u20135207. ACM (2017)","DOI":"10.1145\/3025453.3025735"},{"key":"30_CR12","doi-asserted-by":"publisher","first-page":"209","DOI":"10.2478\/popets-2021-0012","volume":"2021","author":"Y Miao","year":"2021","unstructured":"Miao, Y., et al.: The audio auditor: user-level membership inference in internet of things voice services. Proc. Privacy Enhan. Technol. 2021, 209\u2013228 (2021)","journal-title":"Proc. Privacy Enhan. Technol."},{"key":"30_CR13","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)"},{"key":"30_CR14","doi-asserted-by":"crossref","unstructured":"Panayotov, V., Chen, G., Povey, D., Khudanpur, S.: Librispeech: an ASR corpus based on public domain audio books. In: Proceedings of the 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). pp. 5206\u20135210. IEEE (2015)","DOI":"10.1109\/ICASSP.2015.7178964"},{"key":"30_CR15","first-page":"1","volume":"119","author":"E Parliament","year":"2016","unstructured":"Parliament, E.: Council of the European Union: regulation (eu) 2016\/679 of the European parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing directive 95\/46\/EC (general data protection regulation). Off. J. Euro. Union 119, 1\u201388 (2016)","journal-title":"Off. J. Euro. Union"},{"key":"30_CR16","unstructured":"python: Fuzzywuzzy: Fuzzy string matching in python (2020). https:\/\/pypi.org\/project\/fuzzywuzzy\/"},{"key":"30_CR17","doi-asserted-by":"crossref","unstructured":"Salem, A., Zhang, Y., Humbert, M., Berrang, P., Fritz, M., Backes, M.: Ml-leaks: model and data independent membership inference attacks and defenses on machine learning models. In: Proceedings of the 26th Annual Network and Distributed System Security Symposium (NDSS) (2019)","DOI":"10.14722\/ndss.2019.23119"},{"key":"30_CR18","doi-asserted-by":"crossref","unstructured":"Shah, M.A., Szurley, J., Mueller, M., Mouchtaris, A., Droppo, J.: Evaluating the vulnerability of end-to-end automatic speech recognition models to membership inference attacks. In: Proceedings Interspeech. pp. 891\u2013895 (2021)","DOI":"10.21437\/Interspeech.2021-1188"},{"key":"30_CR19","doi-asserted-by":"crossref","unstructured":"Sheela, A.S., Jayakumar, C.: Comparative study of syntactic search engine and semantic search engine: a survey. In: Proceedings of the 2019 Fifth International Conference on Science Technology Engineering and Mathematics (ICONSTEM). vol. 1, pp. 1\u20134. IEEE (2019)","DOI":"10.1109\/ICONSTEM.2019.8918837"},{"key":"30_CR20","doi-asserted-by":"crossref","unstructured":"Shokoohi-Yekta, M., Chen, Y., Campana, B., Hu, B., Zakaria, J., Keogh, E.: Discovery of meaningful rules in time series. In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD). pp. 1085\u20131094. ACM (2015)","DOI":"10.1145\/2783258.2783306"},{"key":"30_CR21","doi-asserted-by":"crossref","unstructured":"Shokri, R., Song, M.S., Shmatikov, V.: Membership inference attacks against machine learning models. In: Proceedings of the 2017 IEEE Symposium on Security and Privacy (S &P). pp. 3\u201318. IEEE (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"30_CR22","doi-asserted-by":"crossref","unstructured":"Song, C., Shmatikov, V.: Auditing data provenance in text-generation models. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD). pp. 196\u2013206 (2019)","DOI":"10.1145\/3292500.3330885"},{"key":"30_CR23","doi-asserted-by":"crossref","unstructured":"Song, L., Shokri, R., Mittal, P.: Privacy risks of securing machine learning models against adversarial examples. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS). pp. 241\u2013257 (2019)","DOI":"10.1145\/3319535.3354211"},{"issue":"4","key":"30_CR24","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1515\/popets-2016-0046","volume":"2016","author":"M Xue","year":"2016","unstructured":"Xue, M., Magno, G., Cunha, E., Almeida, V., Ross, K.W.: The right to be forgotten in the media: a data-driven study. Proc. Privacy Enhan. Technol. 2016(4), 389\u2013402 (2016)","journal-title":"Proc. Privacy Enhan. Technol."},{"key":"30_CR25","doi-asserted-by":"crossref","unstructured":"Yerukola, A., Bretan, M., Jin, H.: Data augmentation for voice-assistant NLU using bert-based interchangeable rephrase. arXiv preprint arXiv:2104.08268 (2021)","DOI":"10.18653\/v1\/2021.eacl-main.159"},{"key":"30_CR26","doi-asserted-by":"crossref","unstructured":"Yuan, Y., Xun, G., Suo, Q., Jia, K., Zhang, A.: Wave2vec: Learning deep representations for biosignals. In: 2017 IEEE International Conference on Data Mining (ICDM). pp. 1159\u20131164. IEEE (2017)","DOI":"10.1109\/ICDM.2017.155"},{"key":"30_CR27","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Xu, L., Mendoza, A., Yang, G., Chinprutthiwong, P., Gu, G.: Life after speech recognition: fuzzing semantic misinterpretation for voice assistant applications. In: Proceedings of the Network and Distributed System Security Symposium (NDSS\u201919) (2019)","DOI":"10.14722\/ndss.2019.23525"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-17146-8_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,19]],"date-time":"2022-10-19T22:06:54Z","timestamp":1666217214000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-17146-8_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031171451","9783031171468"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-17146-8_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"22 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2022.compute.dtu.dk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"562","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"104","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}