{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:42:44Z","timestamp":1757313764135,"version":"3.37.3"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,4,14]],"date-time":"2024-04-14T00:00:00Z","timestamp":1713052800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,14]],"date-time":"2024-04-14T00:00:00Z","timestamp":1713052800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003397","name":"Huazhong University of Science and Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003397","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,4,14]]},"DOI":"10.1109\/icassp48485.2024.10446189","type":"proceedings-article","created":{"date-parts":[[2024,3,18]],"date-time":"2024-03-18T18:56:31Z","timestamp":1710788191000},"page":"1311-1315","source":"Crossref","is-referenced-by-count":1,"title":["Stealthy Backdoor Attack Towards Federated Automatic Speaker Verification"],"prefix":"10.1109","author":[{"given":"Longling","family":"Zhang","sequence":"first","affiliation":[{"name":"Huazhong University of Science and Technology,School of Cyber Science and Engineering,China"}]},{"given":"Lyqi","family":"Liu","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology,School of Cyber Science and Engineering,China"}]},{"given":"Dan","family":"Meng","sequence":"additional","affiliation":[{"name":"OPPO Research Institute,China"}]},{"given":"Jun","family":"Wang","sequence":"additional","affiliation":[{"name":"OPPO Research Institute,China"}]},{"given":"Shengshan","family":"Hu","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology,School of Cyber Science and Engineering,China"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/ICASSP43922.2022.9747161"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/ICASSP.2018.8462665"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/ICASSP.2014.6853887"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/MSP.2012.2205597"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.3390\/info11120586"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.3402\/jmahp.v3.28076"},{"year":"2023","author":"Wang","article-title":"Corrupting convolution-based unlearnable datasets with pixel-based image transformations","key":"ref7"},{"key":"ref8","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, (AISTATS\u201917)","author":"McMahan"},{"year":"2021","author":"Feng","article-title":"Attribute inference attack of speech emotion recognition in federated learning settings","key":"ref9"},{"year":"2021","author":"Mammen","article-title":"Federated learning: o pportunities and challenges","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/s10796-021-10144-6"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/3581783.3612474"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/ICASSP49357.2023.10094675"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/ICASSP39728.2021.9413468"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.21437\/Interspeech.2019-2208"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.23919\/APSIPA.2018.8659666"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/JSTSP.2017.2684705"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/TASSP.1984.1164317"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.6028\/nist.ir.4930"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.14722\/ndss.2021.24498"}],"event":{"name":"ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2024,4,14]]},"location":"Seoul, Korea, Republic of","end":{"date-parts":[[2024,4,19]]}},"container-title":["ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10445798\/10445803\/10446189.pdf?arnumber=10446189","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T05:05:54Z","timestamp":1722575154000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10446189\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,14]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icassp48485.2024.10446189","relation":{},"subject":[],"published":{"date-parts":[[2024,4,14]]}}}