{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:43Z","timestamp":1750220923410,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T00:00:00Z","timestamp":1558051200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,17]]},"DOI":"10.1145\/3321408.3321595","type":"proceedings-article","created":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T13:17:21Z","timestamp":1563542241000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["P\n            <sup>3<\/sup>\n            S\n            <sup>2<\/sup>"],"prefix":"10.1145","author":[{"given":"Ping","family":"Zhao","sequence":"first","affiliation":[{"name":"Donghua University, Shanghai China"}]},{"given":"Jiaxin","family":"Sun","sequence":"additional","affiliation":[{"name":"Donghua University, Shanghai China"}]},{"given":"Anqi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Donghua University, Shanghai China"}]},{"given":"Sifan","family":"Ni","sequence":"additional","affiliation":[{"name":"Donghua University, Shanghai China"}]},{"given":"Guanglin","family":"Zhang","sequence":"additional","affiliation":[{"name":"Donghua University, Shanghai China"}]}],"member":"320","published-online":{"date-parts":[[2019,5,17]]},"reference":[{"volume-title":"Social network de-anonymization with overlapping communities: Analysis, algorithm and experiments,\" in Proc. of IEEE INFOCOM","year":"2018","author":"Xinyu W.","key":"e_1_3_2_1_1_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1109\/TNET.2018.2879437"},{"unstructured":"\"Apple admitted Siri voice data sharing \" Available at https:\/\/goo.gl\/rRHj4r.  \"Apple admitted Siri voice data sharing \" Available at https:\/\/goo.gl\/rRHj4r.","key":"e_1_3_2_1_3_1"},{"unstructured":"\"Samsung admitted voice data sharing \" Available at https:\/\/goo.gl\/bQPUDj.  \"Samsung admitted voice data sharing \" Available at https:\/\/goo.gl\/bQPUDj.","key":"e_1_3_2_1_4_1"},{"volume-title":"of IEEE INFOCOM","year":"2018","author":"Qian J.","key":"e_1_3_2_1_5_1"},{"volume-title":"Prio: Private, robust, and scalable computation of aggregate statistics.\" in Proc. of NSDI","year":"2017","author":"Corrigan-Gibbs H.","key":"e_1_3_2_1_6_1"},{"unstructured":"\"Apple's 'differential privacy' is about collecting your data-but not? Your data \" Available at https:\/\/www.wired.com\/2016\/06\/apples-differential-privacy-collecting-data\/.  \"Apple's 'differential privacy' is about collecting your data-but not? Your data \" Available at https:\/\/www.wired.com\/2016\/06\/apples-differential-privacy-collecting-data\/.","key":"e_1_3_2_1_7_1"},{"volume-title":"of Eleventh Annual Conference of the International Speech Communication Association","year":"2010","author":"Gillick D.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","first-page":"144","volume-title":"Towards a social psychology of voice variations,\" in Recent advances in language, communication, and social psychology","author":"Brown B. L.","year":"2018"},{"unstructured":"H. Zhao Z. Yang Z. Chen and X. Zhang \"Automatic chinese personality recognition based on prosodic features \" in Proc. of International Conference on Multimedia Modeling.  H. Zhao Z. Yang Z. Chen and X. Zhang \"Automatic chinese personality recognition based on prosodic features \" in Proc. of International Conference on Multimedia Modeling.","key":"e_1_3_2_1_10_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1121\/1.4927554"},{"key":"e_1_3_2_1_12_1","article-title":"Emotion recognition from speech with gaussian mixture models & via boosted gmm","volume":"3","author":"Patel P.","year":"2017","journal-title":"International Journal of Research In Science & Engineering"},{"volume-title":"The interspeech 2011 speaker state challenge,\" in Proc. of Twelfth Annual Conference of the International Speech Communication Association","year":"2011","author":"Schuller B.","key":"e_1_3_2_1_13_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/TNET.2018.2812851"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/TNET.2018.2879967"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1109\/TIFS.2016.2515513"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/2976749.2978331"},{"volume-title":"Large-scale secure computation: Multi-party computation for (parallel) ram programs,\" in Proc. of Annual Cryptology Conference","year":"2015","author":"Boyle E.","key":"e_1_3_2_1_18_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/3133956.3133982"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.18653\/v1\/N16-1030"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1016\/j.specom.2017.01.008"},{"unstructured":"\"Ted talks \" Available at https:\/\/www.ted.com\/.  \"Ted talks \" Available at https:\/\/www.ted.com\/.","key":"e_1_3_2_1_22_1"},{"unstructured":"V. Panayotov G. Chen D. Povey and S. Khudanpur \"Librispeech: an asr corpus based on public domain audio books \" in Proc. of IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP).  V. Panayotov G. Chen D. Povey and S. Khudanpur \"Librispeech: an asr corpus based on public domain audio books \" in Proc. of IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP).","key":"e_1_3_2_1_23_1"},{"unstructured":"R. Shokri M. Stronati C. Song and V. Shmatikov \"Membership inference attacks against machine learning models \" in Proc. of IEEE Symposium on Security and Privacy (S&P).  R. Shokri M. Stronati C. Song and V. Shmatikov \"Membership inference attacks against machine learning models \" in Proc. of IEEE Symposium on Security and Privacy (S&P).","key":"e_1_3_2_1_24_1"}],"event":{"acronym":"ACM TURC 2019","name":"ACM TURC 2019: ACM Turing Celebration Conference - China","location":"Chengdu China"},"container-title":["Proceedings of the ACM Turing Celebration Conference - China"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3321408.3321595","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3321408.3321595","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:10Z","timestamp":1750204390000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3321408.3321595"}},"subtitle":["practical secure protocol for speech data publishing"],"short-title":[],"issued":{"date-parts":[[2019,5,17]]},"references-count":24,"alternative-id":["10.1145\/3321408.3321595","10.1145\/3321408"],"URL":"https:\/\/doi.org\/10.1145\/3321408.3321595","relation":{},"subject":[],"published":{"date-parts":[[2019,5,17]]},"assertion":[{"value":"2019-05-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}