{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T19:59:49Z","timestamp":1776887989650,"version":"3.51.2"},"reference-count":94,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100012943","name":"Institut National de la Recherche Scientifique","doi-asserted-by":"publisher","award":["INRS-Covid19-2020-015"],"award-info":[{"award-number":["INRS-Covid19-2020-015"]}],"id":[{"id":"10.13039\/100012943","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tifs.2024.3390990","type":"journal-article","created":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T17:24:18Z","timestamp":1713461058000},"page":"5151-5165","source":"Crossref","is-referenced-by-count":6,"title":["On the Impact of Voice Anonymization on Speech Diagnostic Applications: A Case Study on COVID-19 Detection"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7413-5205","authenticated-orcid":false,"given":"Yi","family":"Zhu","sequence":"first","affiliation":[{"name":"Institut National de la Recherche Scientifique, University of Quebec, Montreal, QC, Canada"}]},{"given":"Mohamed","family":"Imoussa\u00efne-A\u00efkous","sequence":"additional","affiliation":[{"name":"Institut National de la Recherche Scientifique, University of Quebec, Montreal, QC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4475-4926","authenticated-orcid":false,"given":"Carolyn","family":"C\u00f4t\u00e9-Lussier","sequence":"additional","affiliation":[{"name":"Institut National de la Recherche Scientifique, University of Quebec, Montreal, QC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5739-2514","authenticated-orcid":false,"given":"Tiago H.","family":"Falk","sequence":"additional","affiliation":[{"name":"Institut National de la Recherche Scientifique, University of Quebec, Montreal, QC, Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/02763869.2018.1404391"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCAS.2011.941079"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3934\/bioeng.2021013"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/BSN.2019.8771043"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocaa174"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1177\/002383098002300102"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.m1470"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/OJEMB.2020.2998051"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10072-020-04708-8"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9746471"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2021-19"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9747188"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00139"},{"key":"ref14","article-title":"Fraudsters used AI to mimic CEO\u2019s voice in\n                        unusual cybercrime case: Scams using artificial intelligence are a new\n                        challenge for companies","author":"Stupp","year":"2024"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3372823"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102722"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3618257.3624803"},{"key":"ref18","volume-title":"Voice-based determination of physical and emotional\n                        characteristics of users","author":"Jin","year":"2018"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/RBME.2020.3006860"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jneuroling.2004.06.001"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/lio2.354"},{"issue":"4","key":"ref22","first-page":"995","article-title":"Incompatible: The GDPR in the age of big\n                        data","volume":"47","author":"Zarsky","year":"2016","journal-title":"Seton Hall Law Rev."},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/smartcities5030057"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2022.101362"},{"key":"ref25","article-title":"The VoicePrivacy 2022\n                        challenge evaluation plan","author":"Tomashenko","year":"2022","journal-title":"arXiv:2203.12468"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.21437\/SSW.2019-28"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2022-10703"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.21437\/spsc.2021-13"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.21437\/SMM.2021-3"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.23876\/j.krcp.2017.36.1.3"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1873951.1874246"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-1713"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9747785"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-2223"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-021-00553-x"},{"key":"ref36","article-title":"A summary of the ComParE\n                        COVID-19 challenges","author":"Coppock","year":"2022","journal-title":"arXiv:2202.08981"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2009.2023679"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TAFFC.2018.2858255"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3390\/s22124579"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.5772\/7624"},{"key":"ref41","article-title":"Evaluating the COVID-19 identification ResNet (CIdeR)\n                        on the INTERSPEECH COVID-19 from audio challenges","author":"Akman","year":"2021","journal-title":"arXiv:2107.14549"},{"key":"ref42","article-title":"Audio, speech, language, & signal processing\n                        for COVID-19: A comprehensive overview","author":"Deshpande","year":"2020","journal-title":"arXiv:2011.14445"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3389\/fdgth.2021.564906"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/BHI56158.2022.9926950"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4960401"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053868"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2017.01.008"},{"key":"ref48","volume-title":"Spectral Fusion, Spectral Parsing and the Formation of Auditory\n                        Images","author":"McAdams","year":"1984"},{"key":"ref49","article-title":"VoiceMask: Anonymize and\n                        sanitize voice input on mobile devices","author":"Qian","year":"2017","journal-title":"arXiv:1711.11460"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8461375"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-2650"},{"key":"ref52","first-page":"17022","article-title":"HiFi-GAN: Generative adversarial networks for\n                        efficient and high fidelity speech synthesis","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Kong"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.21437\/interspeech.2020-2692"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2022-10703"},{"key":"ref55","first-page":"1","article-title":"COVID-19 sounds: A\n                        large-scale audio dataset for digital respiratory\n                    screening","volume-title":"Proc. Conf. Neural Inf. Process.\n                        Syst. Datasets Benchmarks Track (Round 2)","author":"Xia"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/0169-7439(87)80084-9"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/IWAENC.2014.6953337"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2021-1070"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/45.1890"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2763455"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-3015"},{"key":"ref62","article-title":"SpeechBrain: A\n                        general-purpose speech toolkit","author":"Ravanelli","year":"2021","journal-title":"arXiv:2106.04624"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00493"},{"key":"ref64","article-title":"FastSpeech 2: Fast and\n                        high-quality end-to-end text to speech","author":"Ren","year":"2020","journal-title":"arXiv:2006.04558"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10096607"},{"key":"ref66","first-page":"5180","article-title":"Style tokens: Unsupervised\n                        style modeling, control and transfer in end-to-end speech\n                        synthesis","volume-title":"Proc. Int. Conf. Mach.\n                        Learn.","author":"Wang"},{"issue":"11","key":"ref67","first-page":"1","article-title":"Visualizing data using t-SNE","volume":"9","author":"Van der Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1038\/s41597-021-00937-4"},{"key":"ref69","article-title":"IATos: AI-powered pre-screening tool for COVID-19\n                        from cough audio samples","author":"Trejo Pizzo","year":"2021","journal-title":"arXiv:2104.13247"},{"key":"ref70","article-title":"Virufy: Global applicability\n                        of crowdsourced and clinical datasets for AI detection of COVID-19 from\n                        cough","author":"Chaudhari","year":"2020","journal-title":"arXiv:2011.13320"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3018028"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-021-00307-0"},{"key":"ref73","first-page":"2845","article-title":"Improving adversarial robustness via unlabeled\n                        out-of-domain data","volume-title":"Proc. Int. Conf.\n                        Artif. Intell. Statist.","author":"Deng"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/icassp40776.2020.9053891"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0258(20000215)19:3<313::AID-SIM370>3.0.CO;2-K"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ASRU46091.2019.9003979"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2021-26"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9054317"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053770"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-2587"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1136\/bmjinnov-2021-000668"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2016.7760933"},{"key":"ref83","first-page":"2201","article-title":"Discriminative prosodic features to assess the\n                        dysarthria severity levels","volume-title":"Proc. World\n                        Congr. Eng.","volume":"3","author":"Kadi"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2019.101750"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1044\/2020_AJSLP-20-00003"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.autrev.2018.06.010"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2011.03.007"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27299-3"},{"key":"ref89","article-title":"Vcloak: Intelligibility-, naturalness- &\n                        timbre-preserving real-time voice anonymization","author":"Deng","year":"2022","journal-title":"arXiv:2210.15140"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2023.3313429"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.socscimed.2020.113172"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.21437\/SPSC.2023-8"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.2147\/COPD.S79077"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.5772\/30872"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/10319981\/10504772.pdf?arnumber=10504772","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T17:33:14Z","timestamp":1715189594000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10504772\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":94,"URL":"https:\/\/doi.org\/10.1109\/tifs.2024.3390990","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}