{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T22:12:22Z","timestamp":1768515142553,"version":"3.49.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/icassp.2018.8461451","type":"proceedings-article","created":{"date-parts":[[2018,9,21]],"date-time":"2018-09-21T22:24:48Z","timestamp":1537568688000},"page":"2057-2061","source":"Crossref","is-referenced-by-count":28,"title":["Exploring Hashing and Cryptonet Based Approaches for Privacy-Preserving Speech Emotion Recognition"],"prefix":"10.1109","author":[{"given":"Miguel","family":"Dias","sequence":"first","affiliation":[]},{"given":"Alberto","family":"Abad","sequence":"additional","affiliation":[]},{"given":"Isabel","family":"Trancoso","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Using representation learning and out-of-domain data for a paralinguistic speech task","author":"milde","year":"2015","journal-title":"Sixteenth Annual Conference of the International Speech Communication Association"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19291-8_4"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.21437\/Interspeech.2005-399","article-title":"Let's go public! taking a spoken dialog system to the real world","author":"raux","year":"2005","journal-title":"in Proc of INTERSPEECH 2005"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TAFFC.2015.2457417"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1873951.1874246"},{"key":"ref4","first-page":"35","article-title":"Privacy-preserving classification on deep neural network","volume":"2017","author":"chabanne","year":"2017","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref3","first-page":"1","article-title":"Secure modular hashing","author":"jimenez","year":"2015","journal-title":"Information Forensics and Security (WIFS) 2015 IEEE International Workshop on"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2011.6123149"},{"key":"ref5","first-page":"201","article-title":"Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy","author":"gilad-bachrach","year":"2016","journal-title":"International Conference on Machine Learning"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178280"},{"key":"ref7","first-page":"2494","article-title":"Secure binary embeddings of front-end factor analysis for privacy preserving speaker verification.","author":"portelo","year":"2013","journal-title":"InterSpeech"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2011.01.011"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2012.02.005"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2016.7472669"},{"key":"ref20","author":"portelo","year":"2015","journal-title":"Privacy-preserving frameworks for speech mining"},{"key":"ref22","first-page":"144","article-title":"Somewhat practical fully homomorphic encryption","volume":"2012","author":"fan","year":"2012","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref21","first-page":"448","article-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift","author":"loffe","year":"2015","journal-title":"International Conference on Machine Learning"},{"key":"ref24","first-page":"1","article-title":"On ideal lattices and learning with errors over rings","author":"lyubashevsky","year":"2010","journal-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"ref23","author":"laine","year":"2017","journal-title":"Simple encrypted arithmetic library-seal v2 2"}],"event":{"name":"ICASSP 2018 - 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","location":"Calgary, AB","start":{"date-parts":[[2018,4,15]]},"end":{"date-parts":[[2018,4,20]]}},"container-title":["2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8450881\/8461260\/08461451.pdf?arnumber=8461451","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T18:12:43Z","timestamp":1751998363000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8461451\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icassp.2018.8461451","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}