{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:32:52Z","timestamp":1771065172627,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,8]],"date-time":"2020-07-08T00:00:00Z","timestamp":1594166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100014718","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1947913"],"award-info":[{"award-number":["1947913"]}],"id":[{"id":"10.13039\/100014718","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,8]]},"DOI":"10.1145\/3395351.3399357","type":"proceedings-article","created":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T04:29:10Z","timestamp":1595392150000},"page":"254-265","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":46,"title":["Fingerprinting encrypted voice traffic on smart speakers with deep learning"],"prefix":"10.1145","author":[{"given":"Chenggang","family":"Wang","sequence":"first","affiliation":[{"name":"University of Cincinnati"}]},{"given":"Sean","family":"Kennedy","sequence":"additional","affiliation":[{"name":"University of Cincinnati"}]},{"given":"Haipeng","family":"Li","sequence":"additional","affiliation":[{"name":"University of Cincinnati"}]},{"given":"King","family":"Hudson","sequence":"additional","affiliation":[{"name":"University of Cincinnati"}]},{"given":"Gowtham","family":"Atluri","sequence":"additional","affiliation":[{"name":"University of Cincinnati"}]},{"given":"Xuetao","family":"Wei","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, China"}]},{"given":"Wenhai","family":"Sun","sequence":"additional","affiliation":[{"name":"Purdue University"}]},{"given":"Boyang","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Cincinnati"}]}],"member":"320","published-online":{"date-parts":[[2020,7,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Amazon Staff Are Listening To Alexa Conversations. https:\/\/www.forbes.com\/sites\/kateoflahertyuk\/2019\/04\/12\/amazon-staff-are-listening-to-alexa-conversations-heres-what-to-do  [n.d.]. Amazon Staff Are Listening To Alexa Conversations. https:\/\/www.forbes.com\/sites\/kateoflahertyuk\/2019\/04\/12\/amazon-staff-are-listening-to-alexa-conversations-heres-what-to-do"},{"key":"e_1_3_2_1_2_1","volume-title":"Worth USD 11.79 Billion by","year":"2023","unstructured":"[n.d.]. Smart Speaker Market , Worth USD 11.79 Billion by 2023 . https:\/\/www.marketsandmarkets.com\/ [n.d.]. Smart Speaker Market, Worth USD 11.79 Billion by 2023. https:\/\/www.marketsandmarkets.com\/"},{"key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. Voice Command Fingerprinting with Deep Learning. https:\/\/github.com\/SmartHomePrivacyProject\/DeepVCFingerprinting  [n.d.]. Voice Command Fingerprinting with Deep Learning. https:\/\/github.com\/SmartHomePrivacyProject\/DeepVCFingerprinting"},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. of NDSS'19","author":"Abdullah H.","unstructured":"H. Abdullah , W. Garcia , C. Peeters , P. Traynor , K. R. B. Butler , and J. Wilson . 2019. Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems . In Proc. of NDSS'19 . H. Abdullah, W. Garcia, C. Peeters, P. Traynor, K. R. B. Butler, and J. Wilson. 2019. Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems. In Proc. of NDSS'19."},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. of Aisa Pacific Advanced Network (APAN).","author":"Abe K.","unstructured":"K. Abe and S. Goto . 2016. Fingerprinting Attack on Tor Anonymity Using Deep Learning . In Proc. of Aisa Pacific Advanced Network (APAN). K. Abe and S. Goto. 2016. Fingerprinting Attack on Tor Anonymity Using Deep Learning. In Proc. of Aisa Pacific Advanced Network (APAN)."},{"key":"e_1_3_2_1_6_1","unstructured":"A. Acar H. Fereidooni T. Abera A. K. Sikder M. Miettinen H. Aksu M. Conti A. R. Sadeghi and A. Selcuk Uluagac. [n.d.]. Peek-a-Boo: I see your smart home activities even encrypted! ([n.d.]). https:\/\/arxiv.org\/pdf\/1808.02741.pdf.  A. Acar H. Fereidooni T. Abera A. K. Sikder M. Miettinen H. Aksu M. Conti A. R. Sadeghi and A. Selcuk Uluagac. [n.d.]. Peek-a-Boo: I see your smart home activities even encrypted! ([n.d.]). https:\/\/arxiv.org\/pdf\/1808.02741.pdf."},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. of ACM CODASPY'20","author":"Alshehri A.","unstructured":"A. Alshehri , J. Granley , and C. Yue . 2020. Attacking and Protecting Tunneled Traffic of Smart Home Devices . In Proc. of ACM CODASPY'20 . A. Alshehri, J. Granley, and C. Yue. 2020. Attacking and Protecting Tunneled Traffic of Smart Home Devices. In Proc. of ACM CODASPY'20."},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. of PETS'19","author":"Apthorpe N.","unstructured":"N. Apthorpe , D. Y. Huang , D. Reisman , A. Narayanan , and N. Feamster . 2019. Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping . In Proc. of PETS'19 . N. Apthorpe, D. Y. Huang, D. Reisman, A. Narayanan, and N. Feamster. 2019. Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping. In Proc. of PETS'19."},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. of ESORICS'10","author":"Backes M.","unstructured":"M. Backes , G. Doychev , M. Durmuth , and B. Kopf . 2010. Speaker Recognition in Encrypted Voice Streams . In Proc. of ESORICS'10 . M. Backes, G. Doychev, M. Durmuth, and B. Kopf. 2010. Speaker Recognition in Encrypted Voice Streams. In Proc. of ESORICS'10."},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. of Workshop on Attacks and Solutions in Hardware Security.","author":"Bezawada B.","unstructured":"B. Bezawada , M. Bachani , J. Peterson , H. Shirazi , I. Ray , and I. Ray . 2018. Behavioral Fingerprinting of IoT Devices . In Proc. of Workshop on Attacks and Solutions in Hardware Security. B. Bezawada, M. Bachani, J. Peterson, H. Shirazi, I. Ray, and I. Ray. 2018. Behavioral Fingerprinting of IoT Devices. In Proc. of Workshop on Attacks and Solutions in Hardware Security."},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. of PETS'19","author":"Bhat S.","unstructured":"S. Bhat , D. Lu , A. Kwon , and S. Devadas . 2019. Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning . In Proc. of PETS'19 . S. Bhat, D. Lu, A. Kwon, and S. Devadas. 2019. Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning. In Proc. of PETS'19."},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. of IEEE S&P'12","author":"Dyer Kevin P.","unstructured":"Kevin P. Dyer , Scott E. Coull , T. Ristenpart , and T. Shrimpton . 2012. Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail . In Proc. of IEEE S&P'12 . Kevin P. Dyer, Scott E. Coull, T. Ristenpart, and T. Shrimpton. 2012. Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail. In Proc. of IEEE S&P'12."},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. of USENIX Security'16","author":"Hayes J.","unstructured":"J. Hayes and G. Danezis . 2016. K-Fingerprinting: A Robust Scalable Website Fingerprinting Technique . In Proc. of USENIX Security'16 . J. Hayes and G. Danezis. 2016. K-Fingerprinting: A Robust Scalable Website Fingerprinting Technique. In Proc. of USENIX Security'16."},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. of ACM Workshop on Cloud Computing Security.","author":"Hermann D.","unstructured":"D. Hermann , R. Wendolsky , and H. Federrath . 2009. Website Fingertinging: Attacking Popular Privacy Enhancing Technologies with the Multinomial Naive-Bayes Classifier . In Proc. of ACM Workshop on Cloud Computing Security. D. Hermann, R. Wendolsky, and H. Federrath. 2009. Website Fingertinging: Attacking Popular Privacy Enhancing Technologies with the Multinomial Naive-Bayes Classifier. In Proc. of ACM Workshop on Cloud Computing Security."},{"key":"e_1_3_2_1_15_1","unstructured":"M. Imani M. S. Rahman N. Mathews and M. Wright. [n.d.]. Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces. ([n. d.]). https:\/\/arxiv.org\/abs\/1902.06626.  M. Imani M. S. Rahman N. Mathews and M. Wright. [n.d.]. Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces. ([n. d.]). https:\/\/arxiv.org\/abs\/1902.06626."},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. of IEEE MILCOM'18","author":"Jafari H.","unstructured":"H. Jafari , O. Omeotere , D. Adesina , H. Wu , and L. Qian . 2018. IoT Devices Fingerprint Using Deep Learning . In Proc. of IEEE MILCOM'18 . H. Jafari, O. Omeotere, D. Adesina, H. Wu, and L. Qian. 2018. IoT Devices Fingerprint Using Deep Learning. In Proc. of IEEE MILCOM'18."},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. of ESORICS'16","author":"Juarez M.","unstructured":"M. Juarez , M. Imani , M. Perry , C. Diaz , and M. Wright . 2016. Toward an Efficient Website Fingerprinting Defense . In Proc. of ESORICS'16 . M. Juarez, M. Imani, M. Perry, C. Diaz, and M. Wright. 2016. Toward an Efficient Website Fingerprinting Defense. In Proc. of ESORICS'16."},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. of IEEE CNS'19","author":"Kennedy S.","unstructured":"S. Kennedy , H. Li , C. Wang , H. Liu , B. Wang , and W. Sun . 2019. I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home Speakers . In Proc. of IEEE CNS'19 . S. Kennedy, H. Li, C. Wang, H. Liu, B. Wang, and W. Sun. 2019. I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home Speakers. In Proc. of IEEE CNS'19."},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. of Wisec'19","author":"Kohls K.","unstructured":"K. Kohls , D. Rupprecht , T. Holz , and C. Popper . 2019. Lost Traffic Encryption: Fingerprinting LET\/4G Traffic on Layer Two . In Proc. of Wisec'19 . K. Kohls, D. Rupprecht, T. Holz, and C. Popper. 2019. Lost Traffic Encryption: Fingerprinting LET\/4G Traffic on Layer Two. In Proc. of Wisec'19."},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. of USENIX Security'18","author":"Kumar D.","unstructured":"D. Kumar , R. Paccagnella , P. Murley , E. Hennenfent , J. Mason , A. Bates , and M. Bailey . 2018. Skill Squatting Attacks on Amazon Alexa . In Proc. of USENIX Security'18 . D. Kumar, R. Paccagnella, P. Murley, E. Hennenfent, J. Mason, A. Bates, and M. Bailey. 2018. Skill Squatting Attacks on Amazon Alexa. In Proc. of USENIX Security'18."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. of ACM CCS'06","author":"Liberatore M.","unstructured":"M. Liberatore and B. N. Levine . 2006. Inferring the Source of Encrypted HTTP Connections . In Proc. of ACM CCS'06 . M. Liberatore and B. N. Levine. 2006. Inferring the Source of Encrypted HTTP Connections. In Proc. of ACM CCS'06."},{"key":"e_1_3_2_1_23_1","unstructured":"M. H. Mazhar and Z. Shafiq. [n.d.]. Characterizing Smart Home IoT Traffic in the Wild. ([n. d.]). https:\/\/arxiv.org\/pdf\/2001.08288.pdf.  M. H. Mazhar and Z. Shafiq. [n.d.]. Characterizing Smart Home IoT Traffic in the Wild. ([n. d.]). https:\/\/arxiv.org\/pdf\/2001.08288.pdf."},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. of IEEE WCNC'19","author":"Msadek N.","unstructured":"N. Msadek , R. Soua , and T. Engel . 2019. IoT Device Fingerprinting: Machine Learning based Encrypted Traffic Analysis . In Proc. of IEEE WCNC'19 . N. Msadek, R. Soua, and T. Engel. 2019. IoT Device Fingerprinting: Machine Learning based Encrypted Traffic Analysis. In Proc. of IEEE WCNC'19."},{"key":"e_1_3_2_1_25_1","volume-title":"Proc. of PETS'19","author":"Oh S. E.","unstructured":"S. E. Oh , S. Sunkam , and N. Hopper . 2019. p-FP: Extraction, Classification, and Predication of Website Fingerprints . In Proc. of PETS'19 . S. E. Oh, S. Sunkam, and N. Hopper. 2019. p-FP: Extraction, Classification, and Predication of Website Fingerprints. In Proc. of PETS'19."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"D. Opitz and R. Maclin. 1999. Popular ensemble methods: An empirical study. Journal of Artificial Intelligence Research (1999).  D. Opitz and R. Maclin. 1999. Popular ensemble methods: An empirical study. Journal of Artificial Intelligence Research (1999).","DOI":"10.1613\/jair.614"},{"key":"e_1_3_2_1_27_1","volume-title":"Proc. of NDSS'16","author":"Panchenko A.","unstructured":"A. Panchenko , F. Lanze , A. Zinnen , M. Henze , J. Penekamp , K. Wehrle , and T. Engel . 2016. Website Fingerprinting at Internet Scale . In Proc. of NDSS'16 . A. Panchenko, F. Lanze, A. Zinnen, M. Henze, J. Penekamp, K. Wehrle, and T. Engel. 2016. Website Fingerprinting at Internet Scale. In Proc. of NDSS'16."},{"key":"e_1_3_2_1_28_1","volume-title":"Proc. of Workshop on Privacy in the Electronic Society.","author":"Panchenko A.","unstructured":"A. Panchenko , L. Niessen , A. Zinnen , and T. Engel . 2011. Website Fingerprinting in Onion Routing Based Anonymization Networks . In Proc. of Workshop on Privacy in the Electronic Society. A. Panchenko, L. Niessen, A. Zinnen, and T. Engel. 2011. Website Fingerprinting in Onion Routing Based Anonymization Networks. In Proc. of Workshop on Privacy in the Electronic Society."},{"key":"e_1_3_2_1_29_1","volume-title":"Proc. of PETS'20","author":"Rahman M. S.","unstructured":"M. S. Rahman , P. Sirinam , N. Mathews , K. G. Gangadhara , and M. Wright . 2020. Tik-Tok: The Utility of Packet Time in Website Fingerprinting Attacks . In Proc. of PETS'20 . M. S. Rahman, P. Sirinam, N. Mathews, K. G. Gangadhara, and M. Wright. 2020. Tik-Tok: The Utility of Packet Time in Website Fingerprinting Attacks. In Proc. of PETS'20."},{"key":"e_1_3_2_1_30_1","volume-title":"Proc. of NDSS'18","author":"Rimmer V.","unstructured":"V. Rimmer , D. Preuveneers , M. Juarez , T. V. Goethem , and W. Joosen . 2018. Automated Website Fingerprinting through Deep Learning . In Proc. of NDSS'18 . V. Rimmer, D. Preuveneers, M. Juarez, T. V. Goethem, and W. Joosen. 2018. Automated Website Fingerprinting through Deep Learning. In Proc. of NDSS'18."},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. of 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI'18)","author":"Roy N.","unstructured":"N. Roy , S. Shen , H. Hassanieh , and R. R. Choudhury . 2018. Inaudible Voice Commands: The Long-Range Attack and Defense . In Proc. of 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI'18) . N. Roy, S. Shen, H. Hassanieh, and R. R. Choudhury. 2018. Inaudible Voice Commands: The Long-Range Attack and Defense. In Proc. of 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI'18)."},{"key":"e_1_3_2_1_32_1","volume-title":"Burst: Remote Identification of Encrypted Video Streams. In Proc. of USENIX Security'17.","author":"Schuster R.","year":"2017","unstructured":"R. Schuster , V. Shmatikov , and E. Tromer . 2017 . Beauty and the Burst: Remote Identification of Encrypted Video Streams. In Proc. of USENIX Security'17. R. Schuster, V. Shmatikov, and E. Tromer. 2017. Beauty and the Burst: Remote Identification of Encrypted Video Streams. In Proc. of USENIX Security'17."},{"key":"e_1_3_2_1_33_1","volume-title":"Proc. of ESORICS'06","author":"Shamtikov V.","unstructured":"V. Shamtikov and M. H. Wang . 2006. Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses . In Proc. of ESORICS'06 . V. Shamtikov and M. H. Wang. 2006. Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses. In Proc. of ESORICS'06."},{"key":"e_1_3_2_1_34_1","volume-title":"Proc. of USENIX Security'19","author":"Shusterman A.","unstructured":"A. Shusterman , L. Kang , Y. Haskal , Y. Meltser , P. Mittal , Y. Oren , and Y. Yarom . 2019. Robust Website Fingerprinting Through the Cache Occupancy Channel . In Proc. of USENIX Security'19 . A. Shusterman, L. Kang, Y. Haskal, Y. Meltser, P. Mittal, Y. Oren, and Y. Yarom. 2019. Robust Website Fingerprinting Through the Cache Occupancy Channel. In Proc. of USENIX Security'19."},{"key":"e_1_3_2_1_35_1","volume-title":"Proc. of ACM CCS'18","author":"Sirinam P.","unstructured":"P. Sirinam , M. Imani , M. Juarez , and M. Wright . 2018. Deep Fingerprinting: Understanding Website Fingerprinting Defenses with Deep Learning . In Proc. of ACM CCS'18 . P. Sirinam, M. Imani, M. Juarez, and M. Wright. 2018. Deep Fingerprinting: Understanding Website Fingerprinting Defenses with Deep Learning. In Proc. of ACM CCS'18."},{"key":"e_1_3_2_1_36_1","volume-title":"Proc. of ACM CCS'19","author":"Sirinam P.","unstructured":"P. Sirinam , N. Mathews , M. S. Rahman , and M. Wright . 2019. Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning . In Proc. of ACM CCS'19 . P. Sirinam, N. Mathews, M. S. Rahman, and M. Wright. 2019. Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning. In Proc. of ACM CCS'19."},{"key":"e_1_3_2_1_37_1","volume-title":"Proc. of ICLR'14","author":"Szegedy C.","unstructured":"C. Szegedy , W. Zaremba , I. Sutskever , J. Bruna , D. Erhan , I. Goodfellow , and R. Fergus . 2014. Intriguing Properties of Neural Networks . In Proc. of ICLR'14 . C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, and R. Fergus. 2014. Intriguing Properties of Neural Networks. In Proc. of ICLR'14."},{"key":"e_1_3_2_1_38_1","volume-title":"DEFT: A Distributed IoT Fingerprinting Technique","author":"Thangavelu V.","year":"2019","unstructured":"V. Thangavelu , D. M. Divakaran , R. Sairam , S. S. Bhunia , and M. Gurusamy . 2019 . DEFT: A Distributed IoT Fingerprinting Technique . IEEE Internet of Things Journal ( 2019). V. Thangavelu, D. M. Divakaran, R. Sairam, S. S. Bhunia, and M. Gurusamy. 2019. DEFT: A Distributed IoT Fingerprinting Technique. IEEE Internet of Things Journal (2019)."},{"key":"e_1_3_2_1_39_1","volume-title":"Proc. of NDSS'20","author":"Trimananda R.","unstructured":"R. Trimananda , J. Varmarken , A. Markopoulou , and B. Demsky . 2020. Packet-Level Signatures for Smart Home Devices . In Proc. of NDSS'20 . R. Trimananda, J. Varmarken, A. Markopoulou, and B. Demsky. 2020. Packet-Level Signatures for Smart Home Devices. In Proc. of NDSS'20."},{"key":"e_1_3_2_1_40_1","volume-title":"Proc. of IEEE CNS'13","author":"Uluagac A. S.","unstructured":"A. S. Uluagac , S. V. Radhakrishnan , C. Corbett , A. Baca , and R. Beyah . 2013. A Passive Technique for Fingerprinting Wireless Devices with Wired-Side Observations . In Proc. of IEEE CNS'13 . A. S. Uluagac, S. V. Radhakrishnan, C. Corbett, A. Baca, and R. Beyah. 2013. A Passive Technique for Fingerprinting Wireless Devices with Wired-Side Observations. In Proc. of IEEE CNS'13."},{"key":"e_1_3_2_1_41_1","volume-title":"Proc. of 23rd USENIX Security Symposium.","author":"Wang T.","unstructured":"T. Wang , X. Cui , R. Nithyannand , R. Johnson , and I. Goldberg . 2014. Effective Attacks on Proable Defenses for Website Fingerprinting . In Proc. of 23rd USENIX Security Symposium. T. Wang, X. Cui, R. Nithyannand, R. Johnson, and I. Goldberg. 2014. Effective Attacks on Proable Defenses for Website Fingerprinting. In Proc. of 23rd USENIX Security Symposium."},{"key":"e_1_3_2_1_42_1","volume-title":"Proc. of USENIX Security'17","author":"Wang T.","unstructured":"T. Wang and I. Goldberg . 2017. Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks . In Proc. of USENIX Security'17 . T. Wang and I. Goldberg. 2017. Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks. In Proc. of USENIX Security'17."},{"key":"e_1_3_2_1_43_1","volume-title":"Proc. of ACM CCS'05","author":"Wang X.","unstructured":"X. Wang , S. Chen , and S. Jajodia . 2005. Tracking Anonymous Peer-to-Peer VoIP Calls on the Internet . In Proc. of ACM CCS'05 . X. Wang, S. Chen, and S. Jajodia. 2005. Tracking Anonymous Peer-to-Peer VoIP Calls on the Internet. In Proc. of ACM CCS'05."},{"key":"e_1_3_2_1_44_1","volume-title":"Proc. of IEEE S&P'11","author":"White A. M.","unstructured":"A. M. White , A. R. Matthews , K. Z. Snow , and F. Monrose . 2011. Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks . In Proc. of IEEE S&P'11 . A. M. White, A. R. Matthews, K. Z. Snow, and F. Monrose. 2011. Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks. In Proc. of IEEE S&P'11."},{"key":"e_1_3_2_1_45_1","volume-title":"Proc. of USENIX Security'07","author":"Wright C.","unstructured":"C. Wright , L. Ballard , F. Monrose , and G. M. Masson . 2007. Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob? . In Proc. of USENIX Security'07 . C. Wright, L. Ballard, F. Monrose, and G. M. Masson. 2007. Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob?. In Proc. of USENIX Security'07."},{"key":"e_1_3_2_1_46_1","volume-title":"Proc. of IEEE S&P'08","author":"Wright C. V.","unstructured":"C. V. Wright , L. Ballard , S. E. Coull , F. Monrose , and G. M. Masson . 2008. Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations . In Proc. of IEEE S&P'08 . C. V. Wright, L. Ballard, S. E. Coull, F. Monrose, and G. M. Masson. 2008. Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations. In Proc. of IEEE S&P'08."},{"key":"e_1_3_2_1_47_1","volume-title":"Proc. of ACM CCS'15","author":"Xiao Q.","unstructured":"Q. Xiao , M. K. Reiter , and Y. Zhang . 2015. Mitigating Storage Side Channels Using Statistical Privacy Mechanisms . In Proc. of ACM CCS'15 . Q. Xiao, M. K. Reiter, and Y. Zhang. 2015. Mitigating Storage Side Channels Using Statistical Privacy Mechanisms. In Proc. of ACM CCS'15."},{"key":"e_1_3_2_1_48_1","volume-title":"Proc. of USENIX Security'18","author":"Yuan X.","unstructured":"X. Yuan , Y Chen , Y. Zhao , Y. Long , X. Liu , K. Chen , S. Zhang , H. Huang , X. Wang , and C. A. Gunter . 2018. CommandSong: A Systematic Approach for Practical Adversarial Voice Recognition . In Proc. of USENIX Security'18 . X. Yuan, Y Chen, Y. Zhao, Y. Long, X. Liu, K. Chen, S. Zhang, H. Huang, X. Wang, and C. A. Gunter. 2018. CommandSong: A Systematic Approach for Practical Adversarial Voice Recognition. In Proc. of USENIX Security'18."},{"key":"e_1_3_2_1_49_1","volume-title":"Proc. of ACM CCS'17","author":"Zhang G.","unstructured":"G. Zhang , C. Yan , X. Ji , T. Zhang , T. Zhang , and W. Xu . 2017. Dolphin Attack: Inaudible Voice Commands . In Proc. of ACM CCS'17 . G. Zhang, C. Yan, X. Ji, T. Zhang, T. Zhang, and W. Xu. 2017. Dolphin Attack: Inaudible Voice Commands. In Proc. of ACM CCS'17."},{"key":"e_1_3_2_1_50_1","volume-title":"Proc. of IEEE S&P'19","author":"Zhang N.","unstructured":"N. Zhang , X. Mi , X. Feng , X. Wang , Y. Tian , and F. Qian . 2019. Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems . In Proc. of IEEE S&P'19 . N. Zhang, X. Mi, X. Feng, X. Wang, Y. Tian, and F. Qian. 2019. Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems. In Proc. of IEEE S&P'19."},{"key":"e_1_3_2_1_51_1","volume-title":"Proc. of NDSS'19","author":"Zhang X.","unstructured":"X. Zhang , J. Hamm , M. K. Reiter , and Y. Zhang . 2019. Statistical Privacy for Streaming Traffic . In Proc. of NDSS'19 . X. Zhang, J. Hamm, M. K. Reiter, and Y. Zhang. 2019. Statistical Privacy for Streaming Traffic. In Proc. of NDSS'19."},{"key":"e_1_3_2_1_52_1","volume-title":"Proc. of NDSS'19","author":"Zhang Y.","unstructured":"Y. Zhang , L. Xu , A. Mendoza , G. Yang , P. Chinprutthiwong , and G. Gu . 2019. Life after Speech Recognition: Fuzzing Semantic Misinterpretation for Voice Assistant Applications . In Proc. of NDSS'19 . Y. Zhang, L. Xu, A. Mendoza, G. Yang, P. Chinprutthiwong, and G. Gu. 2019. Life after Speech Recognition: Fuzzing Semantic Misinterpretation for Voice Assistant Applications. In Proc. of NDSS'19."}],"event":{"name":"WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"Linz Austria","acronym":"WiSec '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395351.3399357","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3395351.3399357","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:34Z","timestamp":1750199914000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395351.3399357"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,8]]},"references-count":52,"alternative-id":["10.1145\/3395351.3399357","10.1145\/3395351"],"URL":"https:\/\/doi.org\/10.1145\/3395351.3399357","relation":{},"subject":[],"published":{"date-parts":[[2020,7,8]]},"assertion":[{"value":"2020-07-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}