{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T22:41:19Z","timestamp":1761000079516,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":52,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819535361"},{"type":"electronic","value":"9789819535378"}],"license":[{"start":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T00:00:00Z","timestamp":1760918400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T00:00:00Z","timestamp":1760918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3537-8_15","type":"book-chapter","created":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T10:43:45Z","timestamp":1760870625000},"page":"277-294","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Speaker Inference Detection Using Only Text"],"prefix":"10.1007","author":[{"given":"Ruoxi","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Yizhong","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Shaowei","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Zhiqiang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,20]]},"reference":[{"issue":"12","key":"15_CR1","first-page":"71","volume":"5","author":"AS Abdul-Qawy","year":"2015","unstructured":"Abdul-Qawy, A.S., Pramod, P., Magesh, E., Srinivasulu, T.: The internet of things (IOT): an overview. Int. J. Eng. Res. Appl. 5(12), 71\u201382 (2015)","journal-title":"Int. J. Eng. Res. Appl."},{"key":"15_CR2","unstructured":"Agarap, A.: Deep learning using rectified linear units (relu). arXiv preprint arXiv:1803.08375 (2018)"},{"issue":"8","key":"15_CR3","doi-asserted-by":"publisher","first-page":"1295","DOI":"10.3390\/electronics9081295","volume":"9","author":"M Ahmed","year":"2020","unstructured":"Ahmed, M., Seraj, R., Islam, S.M.S.: The k-means algorithm: a comprehensive survey and performance evaluation. Electronics 9(8), 1295 (2020)","journal-title":"Electronics"},{"key":"15_CR4","unstructured":"Ardila, R., et al.: Common voice: a massively-multilingual speech corpus. CoRR abs\/1912.06670 (2019). http:\/\/arxiv.org\/abs\/1912.06670"},{"key":"15_CR5","unstructured":"Belkin, N.J., Croft, W.B.: Retrieval techniques (1987)"},{"issue":"3","key":"15_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 1\u201358 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"5","key":"15_CR7","first-page":"1","volume":"13","author":"MA Chandra","year":"2021","unstructured":"Chandra, M.A., Bedi, S.: Survey on SVM and their application in image classification. Int. J. Inf. Technol. 13(5), 1\u201311 (2021)","journal-title":"Int. J. Inf. Technol."},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Chen, G., Zhang, Y., Song, F.: Slmia-SR: speaker-level membership inference attacks against speaker recognition systems. arXiv preprint arXiv:2309.07983 (2023)","DOI":"10.14722\/ndss.2024.241323"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Chen, K., Du, X., Zhu, B., Ma, Z., Berg-Kirkpatrick, T., Dubnov, S.: Hts-at: a hierarchical token-semantic audio transformer for sound classification and detection. In: ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 646\u2013650. IEEE (2022)","DOI":"10.1109\/ICASSP43922.2022.9746312"},{"key":"15_CR10","unstructured":"Chen, T., Kornblith, S., Norouzi, M., Hinton, G.: A simple framework for contrastive learning of visual representations. In: International Conference on Machine Learning, pp. 1597\u20131607. PmLR (2020)"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Chen, Z., Yeo, C.K., Lee, B.S., Lau, C.T.: Autoencoder-based network anomaly detection. In: 2018 Wireless Telecommunications Symposium (WTS), pp.\u00a01\u20135. IEEE (2018)","DOI":"10.1109\/WTS.2018.8363930"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Cheng, Z., Zou, C., Dong, J.: Outlier detection using isolation forest and local outlier factor. In: Proceedings of the Conference on Research in Adaptive and Convergent Systems, pp. 161\u2013168 (2019)","DOI":"10.1145\/3338840.3355641"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Chung, J.S., Nagrani, A., Zisserman, A.: Voxceleb2: deep speaker recognition. arXiv preprint arXiv:1806.05622 (2018)","DOI":"10.21437\/Interspeech.2018-1929"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Elizalde, B., Deshmukh, S., Al\u00a0Ismail, M., Wang, H.: Clap learning audio concepts from natural language supervision. In: ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.\u00a01\u20135. IEEE (2023)","DOI":"10.1109\/ICASSP49357.2023.10095889"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Elizalde, B., Deshmukh, S., Ismail, M.A., Wang, H.: Clap: learning audio concepts from natural language supervision (2022). https:\/\/arxiv.org\/abs\/2206.04769","DOI":"10.1109\/ICASSP49357.2023.10095889"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Fan, Y., et al.: Cn-celeb: a challenging Chinese speaker recognition dataset. In: ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 7604\u20137608. IEEE (2020)","DOI":"10.1109\/ICASSP40776.2020.9054017"},{"key":"15_CR17","unstructured":"Fawzi, A., Moosavi-Dezfooli, S.M., Frossard, P.: Robustness of classifiers: from adversarial to random noise. Adv. Neural Inf. Process. Syst. 29 (2016)"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Feng, T., Peri, R., Narayanan, S.: User-level differential privacy against attribute inference attack of speech emotion recognition in federated learning. arXiv preprint arXiv:2204.02500 (2022)","DOI":"10.21437\/Interspeech.2022-10060"},{"key":"15_CR19","doi-asserted-by":"publisher","first-page":"1033","DOI":"10.1613\/jair.1.15461","volume":"80","author":"D Hintersdorf","year":"2024","unstructured":"Hintersdorf, D., Struppek, L., Brack, M., Friedrich, F., Schramowski, P., Kersting, K.: Does clip know my face? J. Artif. Intell. Res. 80, 1033\u20131062 (2024)","journal-title":"J. Artif. Intell. Res."},{"key":"15_CR20","first-page":"1867","volume":"35","author":"P Hu","year":"2022","unstructured":"Hu, P., Wang, Z., Sun, R., Wang, H., Xue, M.: M$$^{4}$$i: multi-modal models membership inference. Adv. Neural. Inf. Process. Syst. 35, 1867\u20131882 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"issue":"3","key":"15_CR21","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1017\/S026988891300043X","volume":"29","author":"SS Khan","year":"2014","unstructured":"Khan, S.S., Madden, M.G.: One-class classification: taxonomy of study and review of techniques. Knowl. Eng. Rev. 29(3), 345\u2013374 (2014)","journal-title":"Knowl. Eng. Rev."},{"key":"15_CR22","first-page":"18661","volume":"33","author":"P Khosla","year":"2020","unstructured":"Khosla, P., et al.: Supervised contrastive learning. Adv. Neural. Inf. Process. Syst. 33, 18661\u201318673 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Ko, M., Jin, M., Wang, C., et\u00a0al.: Practical membership inference attacks against large-scale multi-modal models: a pilot study. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 4871\u20134881 (2023)","DOI":"10.1109\/ICCV51070.2023.00449"},{"key":"15_CR24","doi-asserted-by":"publisher","first-page":"193907","DOI":"10.1109\/ACCESS.2020.3031549","volume":"8","author":"PH Le-Khac","year":"2020","unstructured":"Le-Khac, P.H., Healy, G., Smeaton, A.F.: Contrastive representation learning: a framework and review. IEEE Access 8, 193907\u2013193934 (2020)","journal-title":"IEEE Access"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Li, H., Zhao, X.: Membership information leakage in well-generalized auto speech recognition systems. In: 2023 International Conference on Data Science and Network Security (ICDSNS), pp.\u00a01\u20137. IEEE (2023)","DOI":"10.1109\/ICDSNS58469.2023.10245166"},{"key":"15_CR26","unstructured":"Li, K.L., Huang, H.K., Tian, S.F., Xu, W.: Improving one-class SVM for anomaly detection. In: Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No. 03EX693), vol.\u00a05, pp. 3077\u20133081. IEEE (2003)"},{"key":"15_CR27","unstructured":"Li, L., et al.: Cn-celeb: multi-genre speaker recognition (2020)"},{"key":"15_CR28","unstructured":"Li, S., Cheng, R., Jia, X.: Identity inference from clip models using only textual data. arXiv preprint arXiv:2405.14517 (2024)"},{"key":"15_CR29","unstructured":"Li, S., Cheng, R., Jia, X.: Identity inference from clip models using only textual data (2024). https:\/\/arxiv.org\/abs\/2405.14517"},{"key":"15_CR30","doi-asserted-by":"crossref","unstructured":"Li, X., Wang, Y., Sha, Z.: Deep learning methods of cross-modal tasks for conceptual design of product shapes: a review. J. Mech. Design 145(4) (2023)","DOI":"10.1115\/1.4056436"},{"key":"15_CR31","doi-asserted-by":"crossref","unstructured":"Li, Y., Guo, Z., Wang, X., Liu, H.: Advancing multi-grained alignment for contrastive language-audio pre-training. arXiv preprint arXiv:2408.07919 (2024)","DOI":"10.1145\/3664647.3681145"},{"key":"15_CR32","doi-asserted-by":"publisher","unstructured":"Li, Y., Guo, Z., Wang, X., Liu, H.: Advancing multi-grained alignment for contrastive language-audio pre-training. In: Proceedings of the 32nd ACM International Conference on Multimedia, pp. 7356\u20137365. MM \u201924, ACM (2024). https:\/\/doi.org\/10.1145\/3664647.3681145","DOI":"10.1145\/3664647.3681145"},{"key":"15_CR33","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation forest. In: 2008 eighth IEEE International Conference on Data Mining, pp. 413\u2013422. IEEE (2008)","DOI":"10.1109\/ICDM.2008.17"},{"key":"15_CR34","doi-asserted-by":"crossref","unstructured":"Liu, X., Jia, X., Xun, Y., Liang, S., Cao, X.: Multimodal unlearnable examples: protecting data against multimodal contrastive learning. arXiv preprint arXiv:2407.16307 (2024)","DOI":"10.1145\/3664647.3680708"},{"key":"15_CR35","unstructured":"Liu, Y., et al.: Roberta: a robustly optimized Bert pretraining approach. Corr 2019. arXiv preprint arXiv:1907.11692 (1907)"},{"key":"15_CR36","doi-asserted-by":"crossref","unstructured":"Liu, Z., et al.: Swin transformer: hierarchical vision transformer using shifted windows. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 10012\u201310022 (2021)","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"15_CR37","doi-asserted-by":"crossref","unstructured":"Miao, Y., et al.: No-label user-level membership inference for ASR model auditing. In: European Symposium on Research in Computer Security, pp. 610\u2013628. Springer (2022)","DOI":"10.1007\/978-3-031-17146-8_30"},{"key":"15_CR38","unstructured":"Miao, Y., et al.: The audio auditor: user-level membership inference in internet of things voice services. arXiv preprint arXiv:1905.07082 (2019)"},{"key":"15_CR39","doi-asserted-by":"publisher","unstructured":"Panayotov, V., Chen, G., Povey, D., Khudanpur, S.: Librispeech: an ASR corpus based on public domain audio books. In: 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 5206\u20135210 (2015). https:\/\/doi.org\/10.1109\/ICASSP.2015.7178964","DOI":"10.1109\/ICASSP.2015.7178964"},{"issue":"1","key":"15_CR40","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/TKDE.2010.100","volume":"23","author":"P Papadimitriou","year":"2010","unstructured":"Papadimitriou, P., Garcia-Molina, H.: Data leakage detection. IEEE Trans. Knowl. Data Eng. 23(1), 51\u201363 (2010)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"15_CR41","unstructured":"Radford, A., et\u00a0al.: Learning transferable visual models from natural language supervision. In: International Conference on Machine Learning, pp. 8748\u20138763. PMLR (2021)"},{"key":"15_CR42","first-page":"1814","volume":"86","author":"PM Schwartz","year":"2011","unstructured":"Schwartz, P.M., Solove, D.J.: The PII problem: privacy and a new concept of personally identifiable information. NYUL rev. 86, 1814 (2011)","journal-title":"NYUL rev."},{"key":"15_CR43","doi-asserted-by":"crossref","unstructured":"Shah, M.A., Szurley, J., Mueller, M., Mouchtaris, T., Droppo, J.: Evaluating the vulnerability of end-to-end automatic speech recognition models to membership inference attacks (2021)","DOI":"10.21437\/Interspeech.2021-1188"},{"key":"15_CR44","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 3\u201318. IEEE (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"15_CR45","doi-asserted-by":"crossref","unstructured":"Teixeira, F., et\u00a0al.: Exploring features for membership inference in ASR model auditing. Available at SSRN 4937232 (2024)","DOI":"10.2139\/ssrn.4937232"},{"issue":"7","key":"15_CR46","doi-asserted-by":"publisher","first-page":"5731","DOI":"10.1007\/s10462-022-10144-1","volume":"55","author":"M Wankhade","year":"2022","unstructured":"Wankhade, M., Rao, A.C.S., Kulkarni, C.: A survey on sentiment analysis methods, applications, and challenges. Artif. Intell. Rev. 55(7), 5731\u20135780 (2022)","journal-title":"Artif. Intell. Rev."},{"key":"15_CR47","unstructured":"Wilkinson, W.: Gaussian process modelling for audio signals. Ph.D. thesis, Queen Mary University of London (2019)"},{"key":"15_CR48","doi-asserted-by":"publisher","unstructured":"Wu, Y., Chen, K., Zhang, T., Hui, Y., Berg-Kirkpatrick, T., Dubnov, S.: Large-scale contrastive language-audio pretraining with feature fusion and keyword-to-caption augmentation. In: ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.\u00a01\u20135 (2023). https:\/\/doi.org\/10.1109\/ICASSP49357.2023.10095969","DOI":"10.1109\/ICASSP49357.2023.10095969"},{"key":"15_CR49","doi-asserted-by":"crossref","unstructured":"Wu, Y., Chen, K., Zhang, T., Hui, Y., Berg-Kirkpatrick, T., Dubnov, S.: Large-scale contrastive language-audio pretraining with feature fusion and keyword-to-caption augmentation. In: ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.\u00a01\u20135. IEEE (2023)","DOI":"10.1109\/ICASSP49357.2023.10095969"},{"key":"15_CR50","doi-asserted-by":"crossref","unstructured":"Xian, Y., Akata, Z., Sharma, G., Nguyen, Q., Hein, M., Schiele, B.: Latent embeddings for zero-shot classification. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 69\u201377 (2016)","DOI":"10.1109\/CVPR.2016.15"},{"key":"15_CR51","doi-asserted-by":"publisher","unstructured":"Zhao, H., Chen, H., Xiao, Y., Zhang, Z.: Privacy-enhanced federated learning against attribute inference attack for speech emotion recognition. In: ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.\u00a01\u20135 (2023). https:\/\/doi.org\/10.1109\/ICASSP49357.2023.10095737","DOI":"10.1109\/ICASSP49357.2023.10095737"},{"key":"15_CR52","doi-asserted-by":"crossref","unstructured":"Zhao, T., Kong, M., Liang, T., Zhu, Q., Kuang, K., Wu, F.: Clap: contrastive language-audio pre-training model for multi-modal sentiment analysis. In: Proceedings of the 2023 ACM International Conference on Multimedia Retrieval, pp. 622\u2013626 (2023)","DOI":"10.1145\/3591106.3592296"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3537-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T22:04:14Z","timestamp":1760997854000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3537-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,20]]},"ISBN":["9789819535361","9789819535378"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3537-8_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,10,20]]},"assertion":[{"value":"20 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icics2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icics2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}