{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T07:42:46Z","timestamp":1765438966108,"version":"3.37.3"},"reference-count":58,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"22","license":[{"start":{"date-parts":[[2024,11,15]],"date-time":"2024-11-15T00:00:00Z","timestamp":1731628800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,15]],"date-time":"2024-11-15T00:00:00Z","timestamp":1731628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,15]],"date-time":"2024-11-15T00:00:00Z","timestamp":1731628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202157","62302298"],"award-info":[{"award-number":["62202157","62302298"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,11,15]]},"DOI":"10.1109\/jiot.2024.3406771","type":"journal-article","created":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T17:32:14Z","timestamp":1717003934000},"page":"36397-36409","source":"Crossref","is-referenced-by-count":4,"title":["An HASM-Assisted Voice Disguise Scheme for Emotion Recognition of IoT-Enabled Voice Interface"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-9272-5676","authenticated-orcid":false,"given":"Wenjia","family":"Chen","sequence":"first","affiliation":[{"name":"Department of College of Computer Science and Electronics Engineering, Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9607-8974","authenticated-orcid":false,"given":"Wenjuan","family":"Tang","sequence":"additional","affiliation":[{"name":"Department of College of Computer Science and Electronics Engineering, Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5445-0347","authenticated-orcid":false,"given":"Yan","family":"Meng","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Yaoxue","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Tsinghua University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/s21041249"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3119921"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10772-017-9445-x"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10772-018-9491-z"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-019-01419-1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2772959"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3235356"},{"volume-title":"Voice-based determination of physical and emotional characteristics of users.","year":"2017","key":"ref8"},{"volume-title":"Google assistant","year":"2024","key":"ref9"},{"volume-title":"Apple siri","year":"2024","key":"ref10"},{"volume-title":"Cortana","year":"2024","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2023.3276209"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3239542"},{"volume-title":"Apple stores your voice data for two years","year":"2013","key":"ref14"},{"volume-title":"Samsung share voice commands to third parties","year":"2013","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2973620"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2923261"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2018.2889934"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3110588"},{"key":"ref20","first-page":"1077","article-title":"Your microphone array retains your identity: A robust voice liveness detection system for smart speakers","volume-title":"Proc. USENIX Security.","author":"Meng"},{"issue":"6","key":"ref21","first-page":"53","article-title":"Deep speech forgery based on parameter transformation and threat assessment to voiceprint authentication","volume":"5","author":"Miao","year":"2020","journal-title":"J. Cyber Security."},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2017.0065"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053868"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3023818"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616616"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107316"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2960239"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1999.0361"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2010.2064307"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6854363"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8461375"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.21437\/SPSC.2022-7"},{"volume-title":"Goldwave\u2014Audio editor, recorder, converter, restoration, & analysis software","year":"2019","key":"ref33"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SLT48900.2021.9383535"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3274783.3274855"},{"key":"ref36","first-page":"1","article-title":"High fidelity speech synthesis with adversarial networks","volume-title":"Proc. ICLR","author":"Bikowski"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9054734"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.21437\/interspeech.2020-1416"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SLT48900.2021.9383558"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155483"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2019.05.005"},{"key":"ref42","first-page":"249","article-title":"TSM toolbox: MATLAB implementations of time-scale modification algorithms","volume-title":"Proc. Int. Conf. Digit. Audio Effects (DAFx)","author":"Driedger"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1201\/9781315117881"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/79.911197"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638211"},{"volume-title":"VOICEBOX: Speech processing toolbox for MATLAB","year":"1997","author":"Brookes","key":"ref46"},{"volume-title":"Deep learning toolbox by MathWorks","year":"2022","key":"ref47"},{"volume-title":"Berlin emotional speech database (EMO-DB)","year":"2005","key":"ref48"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s41066-017-0049-2"},{"volume-title":"Voxceleb-ivector","year":"2018","author":"Shon","key":"ref50"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178964"},{"volume-title":"CSTR VCTK Corpus: English Multi-Speaker Corpus for CSTR Voice Cloning Toolkit (Version 0.92)","year":"2019","author":"Yamagishi","key":"ref52"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2017.05.001"},{"key":"ref54","first-page":"571","article-title":"A review of speech emotion recognition","volume":"568","author":"Tao","year":"2024","journal-title":"Signal Process."},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2990405"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2018.08.035"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"},{"key":"ref58","article-title":"Catch you and i can: Revealing source voiceprint against voice conversion","author":"Deng","year":"2023","journal-title":"arXiv:2302.12434"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10747044\/10540483.pdf?arnumber=10540483","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:23:13Z","timestamp":1732666993000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10540483\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,15]]},"references-count":58,"journal-issue":{"issue":"22"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2024.3406771","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2024,11,15]]}}}