{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:25:19Z","timestamp":1771467919900,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T00:00:00Z","timestamp":1620259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,6]]},"DOI":"10.1145\/3411764.3445169","type":"proceedings-article","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T06:21:46Z","timestamp":1620454906000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["PrivacyMic: Utilizing Inaudible Frequencies for Privacy Preserving Daily Activity Recognition"],"prefix":"10.1145","author":[{"given":"Yasha","family":"Iravantchi","sequence":"first","affiliation":[{"name":"Electrical Engineering and Computer Science University of Michigan, United States"}]},{"given":"Karan","family":"Ahuja","sequence":"additional","affiliation":[{"name":"CMU, United States"}]},{"given":"Mayank","family":"Goel","sequence":"additional","affiliation":[{"name":"CMU, United States"}]},{"given":"Chris","family":"Harrison","sequence":"additional","affiliation":[{"name":"CMU, United States"}]},{"given":"Alanson","family":"Sample","sequence":"additional","affiliation":[{"name":"Electrical Engineering and Computer Science The University of Michigan, United States"}]}],"member":"320","published-online":{"date-parts":[[2021,5,7]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Website. Retrieved","year":"2019","unstructured":"Amazon.com. 2019 . Pioneer SP-BS22-LR . Website. Retrieved September 20, 2019 from https:\/\/www.amazon.com\/Pioneer-SP-BS22-LR-Designed-Bookshelf-Loudspeakers\/dp\/B008NCD2LG. Amazon.com. 2019. Pioneer SP-BS22-LR. Website. Retrieved September 20, 2019 from https:\/\/www.amazon.com\/Pioneer-SP-BS22-LR-Designed-Bookshelf-Loudspeakers\/dp\/B008NCD2LG."},{"key":"e_1_3_2_2_2_1","volume-title":"2017 IEEE European Symposium on Security and Privacy (EuroS P). 35\u201347","author":"Arp D.","unstructured":"D. Arp , E. Quiring , C. Wressnegger , and K. Rieck . 2017. Privacy Threats through Ultrasonic Side Channels on Mobile Devices . In 2017 IEEE European Symposium on Security and Privacy (EuroS P). 35\u201347 . D. Arp, E. Quiring, C. Wressnegger, and K. Rieck. 2017. Privacy Threats through Ultrasonic Side Channels on Mobile Devices. In 2017 IEEE European Symposium on Security and Privacy (EuroS P). 35\u201347."},{"key":"e_1_3_2_2_3_1","volume-title":"Website. Retrieved","year":"2019","unstructured":"Avisoft. 2019 . Knowles FG Response Curve . Website. Retrieved September 20, 2019 from https:\/\/www.avisoft.com\/usg\/KnowlesFGO.htm. Avisoft. 2019. Knowles FG Response Curve. Website. Retrieved September 20, 2019 from https:\/\/www.avisoft.com\/usg\/KnowlesFGO.htm."},{"key":"e_1_3_2_2_4_1","volume-title":"Soundnet: Learning sound representations from unlabeled video. In Advances in neural information processing systems. 892\u2013900.","author":"Aytar Yusuf","year":"2016","unstructured":"Yusuf Aytar , Carl Vondrick , and Antonio Torralba . 2016 . Soundnet: Learning sound representations from unlabeled video. In Advances in neural information processing systems. 892\u2013900. Yusuf Aytar, Carl Vondrick, and Antonio Torralba. 2016. Soundnet: Learning sound representations from unlabeled video. In Advances in neural information processing systems. 892\u2013900."},{"key":"e_1_3_2_2_5_1","volume-title":"Website. Retrieved","year":"2019","unstructured":"BlueDesigns. 2019 . Blue Yeti Microphone . Website. Retrieved September 20, 2019 from https:\/\/www.bluedesigns.com\/products\/yeti\/#. BlueDesigns. 2019. Blue Yeti Microphone. Website. Retrieved September 20, 2019 from https:\/\/www.bluedesigns.com\/products\/yeti\/#."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2017.2690575"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3193025.3193031"},{"key":"e_1_3_2_2_8_1","volume-title":"Website. Retrieved","year":"2019","unstructured":"Dodotronic. 2019 . Ultramic384K . Website. Retrieved September 20, 2019 from https:\/\/www.dodotronic.com\/ultramic384k\/. Dodotronic. 2019. Ultramic384K. Website. Retrieved September 20, 2019 from https:\/\/www.dodotronic.com\/ultramic384k\/."},{"key":"e_1_3_2_2_9_1","unstructured":"Benjamin Elizalde Rohan Badlani Ankit Shah Anurag Kumar and Bhiksha Raj. 2018. Nels-never-ending learner of sounds. (2018). arxiv:1801.05544  Benjamin Elizalde Rohan Badlani Ankit Shah Anurag Kumar and Bhiksha Raj. 2018. Nels-never-ending learner of sounds. (2018). arxiv:1801.05544"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSA.2005.854103"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2015.06.026"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2502081.2502245"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1620545.1620581"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7952261"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2017.2766049"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858401"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864349.1864375"},{"key":"e_1_3_2_2_18_1","volume-title":"Website. Retrieved","year":"2019","unstructured":"Infiltec. 2019 . Infiltec INFRA20 Infrasound Sensor . Website. Retrieved September 20, 2019 from http:\/\/www.infiltec.com\/Infrasound@home\/. Infiltec. 2019. Infiltec INFRA20 Infrasound Sensor. Website. Retrieved September 20, 2019 from http:\/\/www.infiltec.com\/Infrasound@home\/."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300245"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300506"},{"key":"e_1_3_2_2_21_1","volume-title":"Website. Retrieved","year":"2019","unstructured":"KeySight. 2019 . Agilent 33521A Function Generator . Website. Retrieved September 20, 2019 from https:\/\/www.keysight.com\/en\/pd-1871159-pn-33521A\/function-arbitrary-waveform- generator-30-mhz?&cc=US&lc=eng. KeySight. 2019. Agilent 33521A Function Generator. Website. Retrieved September 20, 2019 from https:\/\/www.keysight.com\/en\/pd-1871159-pn-33521A\/function-arbitrary-waveform- generator-30-mhz?&cc=US&lc=eng."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2018.00026"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3242587.3242609"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025773"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030112.2030163"},{"key":"e_1_3_2_2_26_1","volume-title":"Configurable Pulmonary-Tuned Privacy Preservation Algorithm for Mobile Devices. In 2018 IEEE International Conference on Bioinformatics and Biomedicine (BIBM). 1107\u20131112","author":"Lee S.","unstructured":"S. Lee , E. Nemati , and J. Kuang . 2018 . Configurable Pulmonary-Tuned Privacy Preservation Algorithm for Mobile Devices. In 2018 IEEE International Conference on Bioinformatics and Biomedicine (BIBM). 1107\u20131112 . S. Lee, E. Nemati, and J. Kuang. 2018. Configurable Pulmonary-Tuned Privacy Preservation Algorithm for Mobile Devices. In 2018 IEEE International Conference on Bioinformatics and Biomedicine (BIBM). 1107\u20131112."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278721.3278773"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025807"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-10-213"},{"key":"e_1_3_2_2_30_1","volume-title":"Website. Retrieved","author":"Ornithology The","year":"2019","unstructured":"The Cornell\u00a0Lab of Ornithology . 2019 . Elephant Listening Project: Deep into Infrasound . Website. Retrieved September 20, 2019 from https:\/\/elephantlisteningproject.org\/all-about-infrasound\/. The Cornell\u00a0Lab of Ornithology. 2019. Elephant Listening Project: Deep into Infrasound. Website. Retrieved September 20, 2019 from https:\/\/elephantlisteningproject.org\/all-about-infrasound\/."},{"key":"e_1_3_2_2_31_1","volume-title":"Website. Retrieved","author":"Privacy\u00a0Forum Future","year":"2020","unstructured":"Future of Privacy\u00a0Forum . 2020 . \u201d Always On: Privacy Implications of Microphone-Enabled Devices \u201d. Website. Retrieved Sept 17, 2020 from https:\/\/www.ftc.gov\/system\/files\/documents\/public_comments\/2016\/08\/00003-128652.pdf. Future of Privacy\u00a0Forum. 2020. \u201dAlways On: Privacy Implications of Microphone-Enabled Devices\u201d. Website. Retrieved Sept 17, 2020 from https:\/\/www.ftc.gov\/system\/files\/documents\/public_comments\/2016\/08\/00003-128652.pdf."},{"key":"e_1_3_2_2_32_1","volume-title":"Website. Retrieved","year":"2019","unstructured":"PUIAudio. 2019 . PUI Audio AB1290B . Website. Retrieved September 20, 2019 from http:\/\/www.puiaudio.com\/product-detail.aspx?categoryId=5&partnumber=AB1290B. PUIAudio. 2019. PUI Audio AB1290B. Website. Retrieved September 20, 2019 from http:\/\/www.puiaudio.com\/product-detail.aspx?categoryId=5&partnumber=AB1290B."},{"key":"e_1_3_2_2_33_1","volume-title":"The Audible Spectrum. Sunderland Associates","author":"Purves Dale","unstructured":"Dale Purves . 2001. The Audible Spectrum. Sunderland Associates , Sunderland, MA, USA . Dale Purves. 2001. The Audible Spectrum. Sunderland Associates, Sunderland, MA, USA."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1126\/sciadv.1500355"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081366"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081366"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87481-2_21"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2910674.2910718"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702207"},{"key":"e_1_3_2_2_40_1","volume-title":"Location and Forensic Analysis. Website. Retrieved","year":"2019","unstructured":"ShotSpotter. 2019 . ShotSpotter Gunshot Detection , Location and Forensic Analysis. Website. Retrieved September 20, 2019 from https:\/\/www.shotspotter.com. ShotSpotter. 2019. ShotSpotter Gunshot Detection, Location and Forensic Analysis. Website. Retrieved September 20, 2019 from https:\/\/www.shotspotter.com."},{"key":"e_1_3_2_2_41_1","volume-title":"Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Sugawara Takeshi","year":"2020","unstructured":"Takeshi Sugawara , Benjamin Cyr , Sara Rampazzi , Daniel Genkin , and Kevin Fu . 2020 . Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems. In 29th USENIX Security Symposium (USENIX Security 20) . Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, and Kevin Fu. 2020. Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems. In 29th USENIX Security Symposium (USENIX Security 20)."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"crossref","unstructured":"Ingo\u00a0R Titze and Daniel\u00a0W Martin. 1998. Principles of voice production.  Ingo\u00a0R Titze and Daniel\u00a0W Martin. 1998. Principles of voice production.","DOI":"10.1121\/1.424266"},{"key":"e_1_3_2_2_43_1","volume-title":"Website. Retrieved","year":"2020","unstructured":"Wikipedia. 2020 . \u201d Wikipedia: Hearing range \u201d. Website. Retrieved Sept 17, 2020 from https:\/\/en.wikipedia.org\/wiki\/Hearing_range. Wikipedia. 2020. \u201dWikipedia: Hearing range\u201d. Website. Retrieved Sept 17, 2020 from https:\/\/en.wikipedia.org\/wiki\/Hearing_range."},{"key":"e_1_3_2_2_44_1","volume-title":"Website. Retrieved","year":"2020","unstructured":"Wikipedia. 2020 . \u201d Wikipedia: Mel scale \u201d. Website. Retrieved Sept 17, 2020 from https:\/\/en.wikipedia.org\/wiki\/Mel_scale. Wikipedia. 2020. \u201dWikipedia: Mel scale\u201d. Website. Retrieved Sept 17, 2020 from https:\/\/en.wikipedia.org\/wiki\/Mel_scale."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174011"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3300125"}],"event":{"name":"CHI '21: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '21","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445169","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411764.3445169","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:42Z","timestamp":1750195722000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445169"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,6]]},"references-count":46,"alternative-id":["10.1145\/3411764.3445169","10.1145\/3411764"],"URL":"https:\/\/doi.org\/10.1145\/3411764.3445169","relation":{},"subject":[],"published":{"date-parts":[[2021,5,6]]},"assertion":[{"value":"2021-05-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}