{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T00:40:05Z","timestamp":1751848805893,"version":"3.41.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030007935"},{"type":"electronic","value":"9783030007942"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00794-2_3","type":"book-chapter","created":{"date-parts":[[2018,9,7]],"date-time":"2018-09-07T19:50:24Z","timestamp":1536349824000},"page":"26-37","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Speech Analytics for Medical Applications"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5874-6313","authenticated-orcid":false,"given":"Isabel","family":"Trancoso","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1451-4355","authenticated-orcid":false,"given":"Joana","family":"Correia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6614-3168","authenticated-orcid":false,"given":"Francisco","family":"Teixeira","sequence":"additional","affiliation":[]},{"given":"Bhiksha","family":"Raj","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2122-5148","authenticated-orcid":false,"given":"Alberto","family":"Abad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,8]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Boufounos, P., Rane, S.: Secure binary embeddings for privacy preserving nearest neighbors. In: International Workshop on Information Forensics and Security (WIFS) (2011)","key":"3_CR1","DOI":"10.1109\/WIFS.2011.6123149"},{"unstructured":"Chabanne, H., de Wargny, A., Milgram, J., Morel, C., et al.: Privacy-preserving classification on deep neural network. IACR Cryptology ePrint Archive 2017, 35 (2017)","key":"3_CR2"},{"unstructured":"Chollet, F., et al.: Keras (2015). https:\/\/github.com\/keras-team\/keras","key":"3_CR3"},{"doi-asserted-by":"crossref","unstructured":"Correia, J., Raj, B., Trancoso, I., Teixeira, F.: Mining multimodal repositories for speech affecting diseases. In: Interspeech (2018)","key":"3_CR4","DOI":"10.21437\/Interspeech.2018-1806"},{"key":"3_CR5","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.specom.2015.03.004","volume":"71","author":"N Cummins","year":"2015","unstructured":"Cummins, N., Scherer, S., Krajewski, J., Schnieder, S., Epps, J., Quatieri, T.F.: A review of depression and suicide risk assessment using speech analysis. Speech Commun. 71, 10\u201349 (2015)","journal-title":"Speech Commun."},{"doi-asserted-by":"publisher","unstructured":"Degottex, G., Kane, J., Drugman, T., Raitio, T., Scherer, S.: COVAREP - a collaborative voice analysis repository for speech technologies. In: ICASSP, pp. 960\u2013964, May 2014. https:\/\/doi.org\/10.1109\/ICASSP.2014.6853739","key":"3_CR6","DOI":"10.1109\/ICASSP.2014.6853739"},{"doi-asserted-by":"crossref","unstructured":"Dias, M., Abad, A., Trancoso, I.: Exploring hashing and cryptonet based approaches for privacy-preserving speech emotion recognition. In: ICASSP. IEEE (2018)","key":"3_CR7","DOI":"10.1109\/ICASSP.2018.8461451"},{"doi-asserted-by":"crossref","unstructured":"Dibazar, A.A., Narayanan, S., Berger, T.W.: Feature analysis for automatic detection of pathological speech. In: 24th Annual Conference and the Annual Fall Meeting of the Biomedical Engineering Society EMBS\/BMES Conference, vol. 1, pp. 182\u2013183. IEEE (2002)","key":"3_CR8","DOI":"10.1109\/IEMBS.2002.1134447"},{"issue":"2","key":"3_CR9","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1109\/TAFFC.2015.2457417","volume":"7","author":"F Eyben","year":"2016","unstructured":"Eyben, F., Scherer, K., Schuller, B., Sundberg, J., et al.: The Geneva minimalistic acoustic parameter set (GeMAPS) for voice research and affective computing. IEEE Trans. Affect. Comput. 7(2), 190\u2013202 (2016)","journal-title":"IEEE Trans. Affect. Comput."},{"unstructured":"Fan, J., Vercauteren, F.: Somewhat practical fully homomorphic encryption. IACR Cryptology ePrint Archive 2012, 144 (2012). Informal publication","key":"3_CR10"},{"unstructured":"Geitgey, A.: Facerecog (2017). https:\/\/github.com\/ageitgey\/face_recognition","key":"3_CR11"},{"unstructured":"Gilad-Bachrach, R., Dowlin, N., Laine, K., et al.: CryptoNets: applying neural networks to encrypted data with high throughput and accuracy. In: ICML. JMLR Workshop and Conference Proceedings, vol. 48, pp. 201\u2013210 (2016)","key":"3_CR12"},{"unstructured":"Hesamifard, E., Takabi, H., Ghasemi, M.: CryptoDL: deep neural networks over encrypted data. CoRR abs\/1711.05189 (2017)","key":"3_CR13"},{"issue":"1","key":"3_CR14","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/s12559-013-9229-9","volume":"7","author":"K Lopez-de Ipi\u00f1a","year":"2015","unstructured":"Lopez-de Ipi\u00f1a, K., et al.: On automatic diagnosis of Alzheimer\u2019s disease based on spontaneous speech analysis and emotional temperature. Cogn. Comput. 7(1), 44\u201355 (2015)","journal-title":"Cogn. Comput."},{"issue":"5","key":"3_CR15","doi-asserted-by":"publisher","first-page":"6730","DOI":"10.3390\/s130506730","volume":"13","author":"K L\u00f3pez-de Ipi\u00f1a","year":"2013","unstructured":"L\u00f3pez-de Ipi\u00f1a, K., et al.: On the selection of non-invasive methods based on speech analysis oriented to automatic Alzheimer disease diagnosis. Sensors 13(5), 6730\u20136745 (2013)","journal-title":"Sensors"},{"issue":"1\u20133","key":"3_CR16","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.jad.2008.06.026","volume":"114","author":"K Kroenke","year":"2009","unstructured":"Kroenke, K., Strine, T.W., Spitzer, R.L., Williams, J.B., Berry, J.T., Mokdad, A.H.: The PHQ-8 as a measure of current depression in the general population. J. Affect Disord 114(1\u20133), 163\u2013173 (2009)","journal-title":"J. Affect Disord"},{"doi-asserted-by":"crossref","unstructured":"Laine, K., Chen, H., Player, R.: Simple encrypted arithmetic library - SEAL v2.3.0. Technical report, Microsoft, December 2017. https:\/\/www.microsoft.com\/en-us\/research\/publication\/simple-encrypted-arithmetic-library-v2-3-0\/","key":"3_CR17","DOI":"10.1007\/978-3-319-70278-0_1"},{"issue":"6","key":"3_CR18","doi-asserted-by":"publisher","first-page":"1820","DOI":"10.1109\/JBHI.2015.2467375","volume":"19","author":"JR Orozco-Arroyave","year":"2015","unstructured":"Orozco-Arroyave, J.R., et al.: Characterization methods for the detection of multiple voice disorders: neurological, functional, and laryngeal diseases. IEEE J. Biomed. Health Inform. 19(6), 1820\u20131828 (2015)","journal-title":"IEEE J. Biomed. Health Inform."},{"issue":"2","key":"3_CR19","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1109\/TASL.2012.2215602","volume":"21","author":"MA Pathak","year":"2013","unstructured":"Pathak, M.A., Raj, B.: Privacy-preserving speaker verification and identification using gaussian mixture models. IEEE Trans. Audio Speech Lang. Process. 21(2), 397\u2013406 (2013). https:\/\/doi.org\/10.1109\/TASL.2012.2215602","journal-title":"IEEE Trans. Audio Speech Lang. Process."},{"unstructured":"Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. Found. Secure Comput. 169\u2013179 (1978)","key":"3_CR20"},{"doi-asserted-by":"crossref","unstructured":"Rouvier, M., Dupuy, G., Gay, P., Khoury, E., Merlin, T., Meignier, S.: An open-source state-of-the-art toolbox for broadcast news diarization. In: Interspeech (2013)","key":"3_CR21","DOI":"10.21437\/Interspeech.2013-383"},{"doi-asserted-by":"crossref","unstructured":"Schuller, B., et al.: The Interspeech 2017 computational paralinguistics challenge: addressee, cold & snoring. In: Interspeech (2017)","key":"3_CR22","DOI":"10.21437\/Interspeech.2017-43"},{"doi-asserted-by":"crossref","unstructured":"Socher, R., et al.: Recursive deep models for semantic compositionality over a sentiment treebank. In: EMNLP 2013, pp. 1631\u20131642 (2013)","key":"3_CR23","DOI":"10.18653\/v1\/D13-1170"},{"doi-asserted-by":"crossref","unstructured":"Teixeira, F., Abad, A., Trancoso, I.: Patient privacy in paralinguistic tasks. In: Interspeech (2018)","key":"3_CR24","DOI":"10.21437\/Interspeech.2018-2186"},{"doi-asserted-by":"crossref","unstructured":"Valstar, M.F., et al.: AVEC 2016 - depression, mood, and emotion recognition workshop and challenge. CoRR abs\/1605.01600 (2016). http:\/\/arxiv.org\/abs\/1605.01600","key":"3_CR25","DOI":"10.1145\/2988257.2988258"}],"container-title":["Lecture Notes in Computer Science","Text, Speech, and Dialogue"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00794-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T00:27:13Z","timestamp":1751848033000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-00794-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030007935","9783030007942"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00794-2_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"8 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}