{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:27Z","timestamp":1750220847666,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1718498"],"award-info":[{"award-number":["CNS-1718498"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359789.3359807","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"286-296","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Whisper"],"prefix":"10.1145","author":[{"given":"Tavish","family":"Vaidya","sequence":"first","affiliation":[{"name":"Georgetown University"}]},{"given":"Tim","family":"Walsh","sequence":"additional","affiliation":[{"name":"Georgetown University"}]},{"given":"Micah","family":"Sherr","sequence":"additional","affiliation":[{"name":"Georgetown University"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2019. Call Quality Metrics. https:\/\/www.voip-info.org\/call-quality-metrics\/.  2019. Call Quality Metrics. https:\/\/www.voip-info.org\/call-quality-metrics\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2019. Opus Interactive Audio Codec. http:\/\/opus-codec.org\/.  2019. Opus Interactive Audio Codec. http:\/\/opus-codec.org\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"2019. P.10 : Vocabulary for performance quality of service and quality of experience. https:\/\/www.itu.int\/rec\/T-REC-P.10.  2019. P.10 : Vocabulary for performance quality of service and quality of experience. https:\/\/www.itu.int\/rec\/T-REC-P.10.","DOI":"10.1145\/3300001.3300011"},{"key":"e_1_3_2_1_4_1","unstructured":"2019. SoX - Sound eXchange. http:\/\/sox.sourceforge.net\/.  2019. SoX - Sound eXchange. http:\/\/sox.sourceforge.net\/."},{"key":"e_1_3_2_1_5_1","unstructured":"2019. VoxForge. http:\/\/www.voxforge.org\/.  2019. VoxForge. http:\/\/www.voxforge.org\/."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382260"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198257"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"e_1_3_2_1_9_1","unstructured":"Philipp Hancke. 2015. webrtcH4cKS: - What's up with WhatsApp and WebRTC? https:\/\/webrtchacks.com\/whats-up-with-whatsapp-and-webrtc\/.  Philipp Hancke. 2015. webrtcH4cKS: - What's up with WhatsApp and WebRTC? https:\/\/webrtchacks.com\/whats-up-with-whatsapp-and-webrtc\/."},{"key":"e_1_3_2_1_10_1","first-page":"20","article-title":"Hearing Ranges of Laboratory Animals","volume":"46","author":"Heffner Henry E","year":"2007","unstructured":"Henry E Heffner and Rickye S Heffner . 2007 . Hearing Ranges of Laboratory Animals . Journal of the American Association for Laboratory Animal Science 46 , 1 (2007), 20 -- 22 . Henry E Heffner and Rickye S Heffner. 2007. Hearing Ranges of Laboratory Animals. Journal of the American Association for Laboratory Animal Science 46, 1 (2007), 20--22.","journal-title":"Journal of the American Association for Laboratory Animal Science"},{"key":"e_1_3_2_1_11_1","volume-title":"ViSQOL: an objective speech quality model. EURASIP Journal on Audio, Speech, and Music Processing","author":"Hines Andrew","year":"2015","unstructured":"Andrew Hines , Jan Skoglund , Anil C Kokaram , and Naomi Harte . 2015. ViSQOL: an objective speech quality model. EURASIP Journal on Audio, Speech, and Music Processing ( 2015 ). Andrew Hines, Jan Skoglund, Anil C Kokaram, and Naomi Harte. 2015. ViSQOL: an objective speech quality model. EURASIP Journal on Audio, Speech, and Music Processing (2015)."},{"key":"e_1_3_2_1_12_1","volume-title":"Fingerprinting Websites Using Traffic Analysis. In Privacy Enhancing Technologies Symposium (PETS).","author":"Hintz Andrew","year":"2003","unstructured":"Andrew Hintz . 2003 . Fingerprinting Websites Using Traffic Analysis. In Privacy Enhancing Technologies Symposium (PETS). Andrew Hintz. 2003. Fingerprinting Websites Using Traffic Analysis. In Privacy Enhancing Technologies Symposium (PETS)."},{"key":"e_1_3_2_1_13_1","volume-title":"Youssef","author":"Khan L. A.","year":"2010","unstructured":"L. A. Khan , M. S. Baig , and Amr M . Youssef . 2010 . Speaker Recognition from Encrypted VoIP Communications. Digital Investigation ( 2010). L. A. Khan, M. S. Baig, and Amr M. Youssef. 2010. Speaker Recognition from Encrypted VoIP Communications. Digital Investigation (2010)."},{"key":"e_1_3_2_1_14_1","volume-title":"Maloof","author":"Moore W. Brad","year":"2015","unstructured":"W. Brad Moore , Henry Tan , Micah Sherr , and Marcus A . Maloof . 2015 . Multi-Class Traffic Morphing for Encrypted VoIP Communication. In Financial Cryptography and Data Security (FC) . W. Brad Moore, Henry Tan, Micah Sherr, and Marcus A. Maloof. 2015. Multi-Class Traffic Morphing for Encrypted VoIP Communication. In Financial Cryptography and Data Security (FC)."},{"key":"e_1_3_2_1_15_1","volume-title":"Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior research methods 46","author":"Peer Eyal","year":"2014","unstructured":"Eyal Peer , Joachim Vosgerau , and Alessandro Acquisti . 2014. Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior research methods 46 ( 2014 ). Eyal Peer, Joachim Vosgerau, and Alessandro Acquisti. 2014. Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior research methods 46 (2014)."},{"key":"e_1_3_2_1_16_1","unstructured":"Nate Rand. 2017. Bandwidth Consumption. https:\/\/www.top10voiplist.com\/bandwidth-consumption\/.  Nate Rand. 2017. Bandwidth Consumption. https:\/\/www.top10voiplist.com\/bandwidth-consumption\/."},{"key":"e_1_3_2_1_17_1","unstructured":"K. Vox S. Jensen and K. Soerensen. 2010. SILK Speech Codec. Internet-Draft draft-vos-silk-01. Internet Engineering Task Force.  K. Vox S. Jensen and K. Soerensen. 2010. SILK Speech Codec. Internet-Draft draft-vos-silk-01. Internet Engineering Task Force."},{"key":"e_1_3_2_1_18_1","volume-title":"Effective Attacks and Provable Defenses for Website Fingerprinting. In USENIX Security Symposium (USENIX).","author":"Wang Tao","year":"2014","unstructured":"Tao Wang , Xiang Cai , Rishab Nithyanand , Rob Johnson , and Ian Goldberg . 2014 . Effective Attacks and Provable Defenses for Website Fingerprinting. In USENIX Security Symposium (USENIX). Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, and Ian Goldberg. 2014. Effective Attacks and Provable Defenses for Website Fingerprinting. In USENIX Security Symposium (USENIX)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.34"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.21"},{"key":"e_1_3_2_1_21_1","volume-title":"USENIX Security Symposium","volume":"3","author":"Wright Charles V","year":"2007","unstructured":"Charles V Wright , Lucas Ballard , Fabian Monrose , and Gerald M Masson . 2007 . Language identification of encrypted voip traffic: Alejandra y roberto or alice and bob? . In USENIX Security Symposium , Vol. 3 . 43--54. Charles V Wright, Lucas Ballard, Fabian Monrose, and Gerald M Masson. 2007. Language identification of encrypted voip traffic: Alejandra y roberto or alice and bob?. In USENIX Security Symposium, Vol. 3. 43--54."},{"key":"e_1_3_2_1_22_1","volume-title":"NDSS","volume":"9","author":"Wright Charles V","year":"2009","unstructured":"Charles V Wright , Scott E Coull , and Fabian Monrose . 2009 . Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis .. In NDSS , Vol. 9 . Charles V Wright, Scott E Coull, and Fabian Monrose. 2009. Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis.. In NDSS, Vol. 9."}],"event":{"name":"ACSAC '19: 2019 Annual Computer Security Applications Conference","acronym":"ACSAC '19","location":"San Juan Puerto Rico USA"},"container-title":["Proceedings of the 35th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359807","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359807","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359807","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:07Z","timestamp":1750202587000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359807"}},"subtitle":["a unilateral defense against VoIP traffic re-identification attacks"],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":22,"alternative-id":["10.1145\/3359789.3359807","10.1145\/3359789"],"URL":"https:\/\/doi.org\/10.1145\/3359789.3359807","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}