{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T19:25:37Z","timestamp":1776885937209,"version":"3.51.2"},"reference-count":52,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T00:00:00Z","timestamp":1764979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T00:00:00Z","timestamp":1764979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,6]]},"DOI":"10.1109\/asru65441.2025.11434785","type":"proceedings-article","created":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T19:48:04Z","timestamp":1775159284000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["SEF-MK: Speaker-Embedding-Free Voice Anonymization through Multi-k-means Quantization"],"prefix":"10.1109","author":[{"given":"Beilong","family":"Tang","sequence":"first","affiliation":[{"name":"Duke Kunshan University,China"}]},{"given":"Xiaoxiao","family":"Miao","sequence":"additional","affiliation":[{"name":"Duke Kunshan University,China"}]},{"given":"Xin","family":"Wang","sequence":"additional","affiliation":[{"name":"National Institute of Informatics,Japan"}]},{"given":"Ming","family":"Li","sequence":"additional","affiliation":[{"name":"Duke Kunshan University,China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"General data protection regulation (GDPR)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2022.101362"},{"key":"ref3","article-title":"The VoicePrivacy 2022 Challenge evaluation plan","author":"Tomashenko","year":"2022","journal-title":"arXiv preprint arXiv:2203.12468"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2024.3430530"},{"key":"ref5","article-title":"The VoicePrivacy 2024 challenge evaluation plan","author":"Tomashenko","year":"2024","journal-title":"arXiv preprint arXiv:2404.02677"},{"key":"ref6","first-page":"543","article-title":"Design of voice privacy system using linear prediction","volume-title":"Proc. APSIPA ASC.","author":"Gupta"},{"key":"ref7","article-title":"Adjustable deterministic pseudonymisation of speech: Idiap-NKI\u2019s submission to VoicePrivacy 2020 challenge","author":"Dubagunta","year":"2020"},{"key":"ref8","article-title":"Spectral fusion, spectral parsing and the formation of auditory images","author":"McAdams","year":"1984"},{"key":"ref9","article-title":"System description: Speaker anonymization by pitch shifting based on time-scale modification (PV-TSM)","author":"Mawalim","year":"2022"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2022.03.010"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-1333"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053868"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.21437\/SPSC.2024-11"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.21437\/SSW.2019-28"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10096607"},{"issue":"1","key":"ref16","article-title":"Differentially private speaker anonymization","volume-title":"Proceedings on Privacy Enhancing Technologies","volume":"2023","author":"Shamsabadi"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2021.101326"},{"key":"ref18","article-title":"Anonymizing speech: Evaluating and designing speaker anonymization techniques","author":"Champion","year":"2023","journal-title":"arXiv preprint arXiv:2308.04455"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TASLPRO.2025.3555115"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2022-39"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2023.3313429"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2024.3407600"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2024-1615"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3556345"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2021.3122291"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2022.3188113"},{"key":"ref27","first-page":"12449","article-title":"wav2vec 2.0: A framework for self-supervised learning of speech representations","volume-title":"Proc. NeurIPS","volume":"33","author":"Baevski"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8461375"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-2650"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10447871"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-2692"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2022.3190741"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2022-11065"},{"key":"ref34","first-page":"17022","article-title":"HiFi-GAN: Generative adversarial networks for efficient and high fidelity speech synthesis","volume-title":"Proc. NeurIPS","author":"Kong"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SLT61566.2024.10832351"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2024-328"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.21437\/SPSC.2024-20"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2023-419"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.21437\/interspeech.2020-3015"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2025-820"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.21437\/interspeech.2021-1775"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178964"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-1929"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-2441"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.21437\/SSW.2019-28"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/SLT54892.2023.10022601"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10447871"},{"key":"ref48","article-title":"Anonymizing speech: Evaluating and designing speaker anonymization techniques","author":"Champion","year":"2023","journal-title":"arXiv preprint arXiv:2308.04455"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2025.101810"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2021-1070"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.21437\/SPSC.2023-3"},{"issue":"11","key":"ref52","article-title":"Visualizing data using t-SNE","volume":"9","author":"Van der Maaten","year":"2008","journal-title":"Journal of machine learning research"}],"event":{"name":"2025 IEEE Automatic Speech Recognition and Understanding Workshop (ASRU)","location":"Honolulu, HI, USA","start":{"date-parts":[[2025,12,6]]},"end":{"date-parts":[[2025,12,10]]}},"container-title":["2025 IEEE Automatic Speech Recognition and Understanding Workshop (ASRU)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11434577\/11433836\/11434785.pdf?arnumber=11434785","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T04:59:50Z","timestamp":1775192390000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11434785\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,6]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/asru65441.2025.11434785","relation":{},"subject":[],"published":{"date-parts":[[2025,12,6]]}}}