{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:05:27Z","timestamp":1774541127511,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":99,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T00:00:00Z","timestamp":1696204800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Leading Innovative and Entrepreneur Team Introduction Program of Zhejiang","award":["2018R01005"],"award-info":[{"award-number":["2018R01005"]}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2021QY0703"],"award-info":[{"award-number":["2021QY0703"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21A20462"],"award-info":[{"award-number":["U21A20462"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62032021"],"award-info":[{"award-number":["62032021"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Institute of Cyberspace Governance in Zhejiang University"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,2]]},"DOI":"10.1145\/3570361.3592502","type":"proceedings-article","created":{"date-parts":[[2023,9,30]],"date-time":"2023-09-30T22:39:36Z","timestamp":1696113576000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Cancelling Speech Signals for Speech Privacy Protection against Microphone Eavesdropping"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1075-0564","authenticated-orcid":false,"given":"Ming","family":"Gao","sequence":"first","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3041-4610","authenticated-orcid":false,"given":"Yike","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9667-360X","authenticated-orcid":false,"given":"Yajie","family":"Liu","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5396-4554","authenticated-orcid":false,"given":"Jie","family":"Xiong","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5064-1955","authenticated-orcid":false,"given":"Jinsong","family":"Han","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3441-6277","authenticated-orcid":false,"given":"Kui","family":"Ren","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2023,10,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2003.811312"},{"key":"e_1_3_2_1_2_1","volume-title":"Linear and nonlinear ICA based on mutual information","author":"Almeida Luis","year":"2000","unstructured":"Luis Almeida . Linear and nonlinear ICA based on mutual information . In IEEE Adaptive Systems for Signal Processing, Communications , and Control Symposium , 2000 . Luis Almeida. Linear and nonlinear ICA based on mutual information. In IEEE Adaptive Systems for Signal Processing, Communications, and Control Symposium, 2000."},{"key":"e_1_3_2_1_3_1","volume-title":"Google is permanently nerfing all home minis because mine spied on everything i said 24\/7. https:\/\/www.androidpolice.com\/2017\/10\/10\/google-nerfing-home-minis-mine-spied-everything-said-247\/#1","author":"Artem Russakovskii","year":"2021","unstructured":"Russakovskii Artem . Google is permanently nerfing all home minis because mine spied on everything i said 24\/7. https:\/\/www.androidpolice.com\/2017\/10\/10\/google-nerfing-home-minis-mine-spied-everything-said-247\/#1 , 2021 . Russakovskii Artem. Google is permanently nerfing all home minis because mine spied on everything i said 24\/7. https:\/\/www.androidpolice.com\/2017\/10\/10\/google-nerfing-home-minis-mine-spied-everything-said-247\/#1, 2021."},{"key":"e_1_3_2_1_4_1","unstructured":"Avisoft Bioacoustics. Condenser Ultrasound Microphone. http:\/\/www.avisoft.com\/ultrasound-microphones\/cm16-cmpa\/ 2021.  Avisoft Bioacoustics. Condenser Ultrasound Microphone. http:\/\/www.avisoft.com\/ultrasound-microphones\/cm16-cmpa\/ 2021."},{"key":"e_1_3_2_1_5_1","volume-title":"Condenser ultrasound microphone. https:\/\/www.avisoft.com\/ultrasound-microphones\/cm24-cmpa\/","author":"Bioacoustics Avisoft","year":"2022","unstructured":"Avisoft Bioacoustics . Condenser ultrasound microphone. https:\/\/www.avisoft.com\/ultrasound-microphones\/cm24-cmpa\/ , 2022 . Avisoft Bioacoustics. Condenser ultrasound microphone. https:\/\/www.avisoft.com\/ultrasound-microphones\/cm24-cmpa\/, 2022."},{"key":"e_1_3_2_1_6_1","volume-title":"https:\/\/www.avisoft.com\/ultrasoundgate\/116hme\/#71165","author":"Bioacoustics Avisoft","year":"2022","unstructured":"Avisoft Bioacoustics . Ultra SoundGate 116 Hme . https:\/\/www.avisoft.com\/ultrasoundgate\/116hme\/#71165 , 2022 . Avisoft Bioacoustics. UltraSoundGate 116Hme. https:\/\/www.avisoft.com\/ultrasoundgate\/116hme\/#71165, 2022."},{"key":"e_1_3_2_1_7_1","volume-title":"Network and Distributed System Security Symposium","author":"Ba Zhongjie","year":"2020","unstructured":"Zhongjie Ba , Tianhang Zheng , Xinyu Zhang , Zhan Qin , Baochun Li , Xue Liu , and Kaili Ren . Learning-based practical smartphone eavesdropping with built-in accelerometer . In Network and Distributed System Security Symposium , 2020 . Zhongjie Ba, Tianhang Zheng, Xinyu Zhang, Zhan Qin, Baochun Li, Xue Liu, and Kaili Ren. Learning-based practical smartphone eavesdropping with built-in accelerometer. In Network and Distributed System Security Symposium, 2020."},{"key":"e_1_3_2_1_8_1","volume-title":"International Conference on Mobile Systems, Applications and Services","author":"Bai Yang","year":"2022","unstructured":"Yang Bai , Nakul Garg , and Nirupam Roy . SPiDR : Ultra-low-power acoustic spatial sensing for micro-robot navigation . In International Conference on Mobile Systems, Applications and Services , 2022 . Yang Bai, Nakul Garg, and Nirupam Roy. SPiDR: Ultra-low-power acoustic spatial sensing for micro-robot navigation. In International Conference on Mobile Systems, Applications and Services, 2022."},{"key":"e_1_3_2_1_9_1","volume-title":"Interpreting and explaining deep neural networks for classification of audio signals. ArXiv preprint:1807.03418","author":"Becker S\u00f6ren","year":"2018","unstructured":"S\u00f6ren Becker , Marcel Ackermann , Sebastian Lapuschkin , Klaus-Robert M\u00fcller , and Wojciech Samek . Interpreting and explaining deep neural networks for classification of audio signals. ArXiv preprint:1807.03418 , 2018 . S\u00f6ren Becker, Marcel Ackermann, Sebastian Lapuschkin, Klaus-Robert M\u00fcller, and Wojciech Samek. Interpreting and explaining deep neural networks for classification of audio signals. ArXiv preprint:1807.03418, 2018."},{"key":"e_1_3_2_1_10_1","volume-title":"IEEE International Conference on Acoustics Speech and Signal Processing Proceedings","author":"Chakravarthy Sreeram","year":"2006","unstructured":"Sreeram Chakravarthy and Sen Kuo . Application of active noise control for reducing snore . In IEEE International Conference on Acoustics Speech and Signal Processing Proceedings , 2006 . Sreeram Chakravarthy and Sen Kuo. Application of active noise control for reducing snore. In IEEE International Conference on Acoustics Speech and Signal Processing Proceedings, 2006."},{"issue":"6","key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","first-page":"1648","DOI":"10.1002\/asjc.589","article-title":"Active noise control and its application to snore noise cancellation","volume":"15","author":"Chang Chengyuan","year":"2013","unstructured":"Chengyuan Chang , Shingtai Pan , and Kuochun Liao . Active noise control and its application to snore noise cancellation . Asian Journal of Control , 15 ( 6 ): 1648 -- 1654 , 2013 . Chengyuan Chang, Shingtai Pan, and Kuochun Liao. Active noise control and its application to snore noise cancellation. Asian Journal of Control, 15(6):1648--1654, 2013.","journal-title":"Asian Journal of Control"},{"key":"e_1_3_2_1_12_1","volume-title":"IEEE International Conference on Computer Communications","author":"Chen Yike","year":"2022","unstructured":"Yike Chen , Ming Gao , Yimin Li , Lingfeng Zhang , Li Lu , Feng Lin , Jinsong Han , and Kui Ren . Big brother is listening: An evaluation framework on ultrasonic microphone jammers . In IEEE International Conference on Computer Communications , 2022 . Yike Chen, Ming Gao, Yimin Li, Lingfeng Zhang, Li Lu, Feng Lin, Jinsong Han, and Kui Ren. Big brother is listening: An evaluation framework on ultrasonic microphone jammers. In IEEE International Conference on Computer Communications, 2022."},{"key":"e_1_3_2_1_13_1","volume-title":"Wearable microphone jamming. https:\/\/github.com\/y-x-c\/wearable-microphone-jamming\/","author":"Chen Yuxin","year":"2020","unstructured":"Yuxin Chen . Wearable microphone jamming. https:\/\/github.com\/y-x-c\/wearable-microphone-jamming\/ , 2020 . Yuxin Chen. Wearable microphone jamming. https:\/\/github.com\/y-x-c\/wearable-microphone-jamming\/, 2020."},{"key":"e_1_3_2_1_14_1","volume-title":"Understanding the effectiveness of ultrasonic microphone jammer. CoRR, abs\/1904.08490","author":"Chen Yuxin","year":"2019","unstructured":"Yuxin Chen , Huiying Li , Steven Nagels , Zhijing Li , Pedro Lopes , Ben Y. Zhao , and Haitao Zheng . Understanding the effectiveness of ultrasonic microphone jammer. CoRR, abs\/1904.08490 , 2019 . Yuxin Chen, Huiying Li, Steven Nagels, Zhijing Li, Pedro Lopes, Ben Y. Zhao, and Haitao Zheng. Understanding the effectiveness of ultrasonic microphone jammer. CoRR, abs\/1904.08490, 2019."},{"key":"e_1_3_2_1_15_1","volume-title":"International Conference on Human Factors in Computing Systems","author":"Chen Yuxin","year":"2020","unstructured":"Yuxin Chen , Huiying Li , Shan-Yuan Teng , Steven Nagels , Zhijing Li , Pedro Lopes , Ben Y. Zhao , and Haitao Zheng . Wearable microphone jamming . In International Conference on Human Factors in Computing Systems , 2020 . Yuxin Chen, Huiying Li, Shan-Yuan Teng, Steven Nagels, Zhijing Li, Pedro Lopes, Ben Y. Zhao, and Haitao Zheng. Wearable microphone jamming. In International Conference on Human Factors in Computing Systems, 2020."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mejo.2009.02.004"},{"key":"e_1_3_2_1_17_1","unstructured":"Detective Store. Speech jammer tower-a for blocking professional microphones and counter-surveillance. https:\/\/www.detective-store.com\/speech-jammer-tower-a-for-blocking-proffessional-microphones-counter-surveillance-1516.html 2021.  Detective Store. Speech jammer tower-a for blocking professional microphones and counter-surveillance. https:\/\/www.detective-store.com\/speech-jammer-tower-a-for-blocking-proffessional-microphones-counter-surveillance-1516.html 2021."},{"key":"e_1_3_2_1_18_1","volume-title":"International Conference on Computer, Information and Telecommunication Systems","author":"Dong Shumin","year":"2017","unstructured":"Shumin Dong , Bo Zhao , Ying Wang , and Tong Zou . A method of blind separation for coherent source based on single vector sensor . In International Conference on Computer, Information and Telecommunication Systems , 2017 . Shumin Dong, Bo Zhao, Ying Wang, and Tong Zou. A method of blind separation for coherent source based on single vector sensor. In International Conference on Computer, Information and Telecommunication Systems, 2017."},{"key":"e_1_3_2_1_19_1","volume-title":"Medical and non-medical protection standards for ultrasound and infrasound. Progress in biophysics and molecular biology, 93(1--3):176--191","author":"Duck Francis A","year":"2007","unstructured":"Francis A Duck . Medical and non-medical protection standards for ultrasound and infrasound. Progress in biophysics and molecular biology, 93(1--3):176--191 , 2007 . Francis A Duck. Medical and non-medical protection standards for ultrasound and infrasound. Progress in biophysics and molecular biology, 93(1--3):176--191, 2007."},{"key":"e_1_3_2_1_20_1","volume-title":"Algorithm 235: random permutation. Communications of the ACM, 7(7):420","author":"Durstenfeld Richard","year":"1964","unstructured":"Richard Durstenfeld . Algorithm 235: random permutation. Communications of the ACM, 7(7):420 , 1964 . Richard Durstenfeld. Algorithm 235: random permutation. Communications of the ACM, 7(7):420, 1964."},{"key":"e_1_3_2_1_21_1","volume-title":"European Signal Processing Conference","author":"Eriksson Jan","year":"2002","unstructured":"Jan Eriksson and Visa Koivunen . Blind identifiability of class of nonlinear instantaneous ICA models . In European Signal Processing Conference , 2002 . Jan Eriksson and Visa Koivunen. Blind identifiability of class of nonlinear instantaneous ICA models. In European Signal Processing Conference, 2002."},{"key":"e_1_3_2_1_22_1","unstructured":"Everfine. Pf9800 digital power meter. http:\/\/www.everfine.net\/en\/productsinfo.php?cid=65&id=320 2022.  Everfine. Pf9800 digital power meter. http:\/\/www.everfine.net\/en\/productsinfo.php?cid=65&id=320 2022."},{"key":"e_1_3_2_1_23_1","volume-title":"International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops","author":"Francillon Aur\u00e9lien","year":"2007","unstructured":"Aur\u00e9lien Francillon and Claude Castelluccia . Tinyrng : A cryptographic random number generator for wireless sensors network nodes . In International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops , 2007 . Aur\u00e9lien Francillon and Claude Castelluccia. Tinyrng: A cryptographic random number generator for wireless sensors network nodes. In International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops, 2007."},{"issue":"4","key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1109\/TEMC.2007.908845","article-title":"EMI susceptibility model of signal conditioning circuits based on operational amplifiers","volume":"49","author":"Gago Javier","year":"2007","unstructured":"Javier Gago , Josep Balcells , David Gonz\u00c1lez , Manuel Lamich , Juan Mon , and Alfonso Santolaria . EMI susceptibility model of signal conditioning circuits based on operational amplifiers . IEEE Transactions on Electromagnetic Compatibility , 49 ( 4 ): 849 -- 859 , 2007 . Javier Gago, Josep Balcells, David Gonz\u00c1lez, Manuel Lamich, Juan Mon, and Alfonso Santolaria. EMI susceptibility model of signal conditioning circuits based on operational amplifiers. IEEE Transactions on Electromagnetic Compatibility, 49(4):849--859, 2007.","journal-title":"IEEE Transactions on Electromagnetic Compatibility"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.apacoust.2012.04.001"},{"key":"e_1_3_2_1_26_1","volume-title":"Shmulik Markovich Golan, and Alexey Ozerov. A consolidated perspective on multimicrophone speech enhancement and source separation","author":"Gannot Sharon","year":"2017","unstructured":"Sharon Gannot , Emmanuel Vincent , Shmulik Markovich Golan, and Alexey Ozerov. A consolidated perspective on multimicrophone speech enhancement and source separation . IEEE\/ACM Transactions on Audio, Speech, and Language Processing , 25(4):692--730, 2017 . Sharon Gannot, Emmanuel Vincent, Shmulik Markovich Golan, and Alexey Ozerov. A consolidated perspective on multimicrophone speech enhancement and source separation. IEEE\/ACM Transactions on Audio, Speech, and Language Processing, 25(4):692--730, 2017."},{"key":"e_1_3_2_1_27_1","volume-title":"International Conference on Mobile Computing and Networking","author":"Gao Ming","year":"2020","unstructured":"Ming Gao , Feng Lin , Weiye Xu , Muertikepu Nuermaimaiti , Jinsong Han , Wenyao Xu , and Kui Ren . Deaf-aid : mobile IoT communication exploiting stealthy speaker-to-gyroscope channel . In International Conference on Mobile Computing and Networking , 2020 . Ming Gao, Feng Lin, Weiye Xu, Muertikepu Nuermaimaiti, Jinsong Han, Wenyao Xu, and Kui Ren. Deaf-aid: mobile IoT communication exploiting stealthy speaker-to-gyroscope channel. In International Conference on Mobile Computing and Networking, 2020."},{"key":"e_1_3_2_1_28_1","unstructured":"Global TSCM Group Inc. Anti-recoding system with battery pack. https:\/\/www.globaltscmgroup-usa.com\/ 2021.  Global TSCM Group Inc. Anti-recoding system with battery pack. https:\/\/www.globaltscmgroup-usa.com\/ 2021."},{"key":"e_1_3_2_1_29_1","volume-title":"Speech-to-text: Automatic speech recognition. https:\/\/cloud.google.com\/speech-to-text","author":"Cloud Google","year":"2021","unstructured":"Google Cloud . Speech-to-text: Automatic speech recognition. https:\/\/cloud.google.com\/speech-to-text , 2021 . Google Cloud. Speech-to-text: Automatic speech recognition. https:\/\/cloud.google.com\/speech-to-text, 2021."},{"key":"e_1_3_2_1_30_1","volume-title":"ACM\/IEEE International Conference on Information Processing in Sensor Networks","author":"Han Jun","year":"2017","unstructured":"Jun Han , Albert Jin Chung , and Patrick Tague . Pitchln : eavesdropping via intelligible speech reconstruction using non-acoustic sensor fusion . In ACM\/IEEE International Conference on Information Processing in Sensor Networks , 2017 . Jun Han, Albert Jin Chung, and Patrick Tague. Pitchln: eavesdropping via intelligible speech reconstruction using non-acoustic sensor fusion. In ACM\/IEEE International Conference on Information Processing in Sensor Networks, 2017."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/547203"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3345429"},{"key":"e_1_3_2_1_33_1","volume-title":"AIP Netural Networks for Computing","author":"Herault Jeanny","year":"1987","unstructured":"Jeanny Herault and Christian Jutten . Space or time adaptive signal processing by neural models . In AIP Netural Networks for Computing , 1987 . Jeanny Herault and Christian Jutten. Space or time adaptive signal processing by neural models. In AIP Netural Networks for Computing, 1987."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSA.2005.854089"},{"key":"e_1_3_2_1_35_1","volume-title":"Hirsch and Stephen Smale. Differential equations, dynamical systems, and linear algebra","author":"Morris","year":"1974","unstructured":"Morris W. Hirsch and Stephen Smale. Differential equations, dynamical systems, and linear algebra . Academic Press , 1974 . Morris W. Hirsch and Stephen Smale. Differential equations, dynamical systems, and linear algebra. Academic Press, 1974."},{"issue":"24","key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","first-page":"6521","DOI":"10.1109\/TSP.2014.2367474","article-title":"Blind separation of parametric nonlinear mixtures of possibly autocorrelated and non-stationary sources","volume":"62","author":"Hosseini Shahram","year":"2014","unstructured":"Shahram Hosseini and Yannick Deville . Blind separation of parametric nonlinear mixtures of possibly autocorrelated and non-stationary sources . IEEE Transactions on Signal Processing , 62 ( 24 ): 6521 -- 6533 , 2014 . Shahram Hosseini and Yannick Deville. Blind separation of parametric nonlinear mixtures of possibly autocorrelated and non-stationary sources. IEEE Transactions on Signal Processing, 62(24):6521--6533, 2014.","journal-title":"IEEE Transactions on Signal Processing"},{"key":"e_1_3_2_1_37_1","volume-title":"International Conference on Mobile Computing and Networking","author":"Huang Long","year":"2021","unstructured":"Long Huang and Chen Wang . Notification privacy protection via unobtrusive gripping hand verification using media sounds . In International Conference on Mobile Computing and Networking , 2021 . Long Huang and Chen Wang. Notification privacy protection via unobtrusive gripping hand verification using media sounds. In International Conference on Mobile Computing and Networking, 2021."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1998.0193"},{"key":"e_1_3_2_1_39_1","volume-title":"IEEE International Conference on Acoustics Speech and Signal Processing Proceedings","author":"Huggins-Daines David","year":"2006","unstructured":"David Huggins-Daines , Mohit Kumar , Arthur Chan , Alan W. Black , Mosur Ravishankar , and Alexander I. Rudnicky . Pocketsphinx: A free, real-time continuous speech recognition system for hand-held devices . In IEEE International Conference on Acoustics Speech and Signal Processing Proceedings , 2006 . David Huggins-Daines, Mohit Kumar, Arthur Chan, Alan W. Black, Mosur Ravishankar, and Alexander I. Rudnicky. Pocketsphinx: A free, real-time continuous speech recognition system for hand-held devices. In IEEE International Conference on Acoustics Speech and Signal Processing Proceedings, 2006."},{"key":"e_1_3_2_1_40_1","volume-title":"iFLYTEK open platform-an artificial intelligence platform focusing on intelligent speech interaction wihch provides solutions for global developers. https:\/\/global.xfyun.cn\/","author":"iFLYTEK Co.","year":"2021","unstructured":"iFLYTEK Co. , Ltd. iFLYTEK open platform-an artificial intelligence platform focusing on intelligent speech interaction wihch provides solutions for global developers. https:\/\/global.xfyun.cn\/ , 2021 . iFLYTEK Co., Ltd. iFLYTEK open platform-an artificial intelligence platform focusing on intelligent speech interaction wihch provides solutions for global developers. https:\/\/global.xfyun.cn\/, 2021."},{"key":"e_1_3_2_1_41_1","volume-title":"IEEE Radio Frequency Integrated Circuits Symposium","author":"Jeong Chanyoung","year":"2009","unstructured":"Chanyoung Jeong , Dongho Choi , and Changsik Yoo . A fast automatic frequency calibration (AFC) scheme for phase-locked loop (PLL) frequency synthesizer . In IEEE Radio Frequency Integrated Circuits Symposium , 2009 . Chanyoung Jeong, Dongho Choi, and Changsik Yoo. A fast automatic frequency calibration (AFC) scheme for phase-locked loop (PLL) frequency synthesizer. In IEEE Radio Frequency Integrated Circuits Symposium, 2009."},{"key":"e_1_3_2_1_42_1","unstructured":"Jinci Technologies. Product review. http:\/\/www.jinci.cn\/en\/goods\/112.html 2021.  Jinci Technologies. Product review. http:\/\/www.jinci.cn\/en\/goods\/112.html 2021."},{"key":"e_1_3_2_1_43_1","unstructured":"JingGlass Inc. Hollow glass. http:\/\/www.jingglass.com\/news\/Hollow-glass.html 2017.  JingGlass Inc. Hollow glass. http:\/\/www.jingglass.com\/news\/Hollow-glass.html 2017."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2003.10.011"},{"key":"e_1_3_2_1_45_1","volume-title":"IEEE International Conference on Automatic Face & Gesture Recognition","author":"Kalgaonkar Kaustubh","year":"2008","unstructured":"Kaustubh Kalgaonkar and Bhiksha Raj . Recognizing talking faces from acoustic Doppler reflections . In IEEE International Conference on Automatic Face & Gesture Recognition , 2008 . Kaustubh Kalgaonkar and Bhiksha Raj. Recognizing talking faces from acoustic Doppler reflections. In IEEE International Conference on Automatic Face & Gesture Recognition, 2008."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.20"},{"key":"e_1_3_2_1_47_1","volume-title":"IEEE Symposium on Security and Privacy","author":"Kwong Andrew","year":"2019","unstructured":"Andrew Kwong , Wenyuan Xu , and Kevin Fu . Hard drive of hearing: Disks that eavesdrop with a synthesized microphone . In IEEE Symposium on Security and Privacy , 2019 . Andrew Kwong, Wenyuan Xu, and Kevin Fu. Hard drive of hearing: Disks that eavesdrop with a synthesized microphone. In IEEE Symposium on Security and Privacy, 2019."},{"key":"e_1_3_2_1_48_1","volume-title":"International Conference on Embedded Networked Sensor Systems","author":"Li Lingkun","year":"2020","unstructured":"Lingkun Li , Manni Liu , Yuguang Yao , Fan Dang , Zhichao Cao , and Yunhao Liu . Patronus : Preventing unauthorized speech recordings with support for selective unscrambling . In International Conference on Embedded Networked Sensor Systems , 2020 . Lingkun Li, Manni Liu, Yuguang Yao, Fan Dang, Zhichao Cao, and Yunhao Liu. Patronus: Preventing unauthorized speech recordings with support for selective unscrambling. In International Conference on Embedded Networked Sensor Systems, 2020."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3300139"},{"key":"e_1_3_2_1_50_1","volume-title":"International Conference on Mobile Computing and Networking","author":"Liu Jian","year":"2015","unstructured":"Jian Liu , Yan Wang , Gorkem Kar , Yingying Chen , Jie Yang , and Marco Gruteser . Snooping keystrokes with mm-level audio ranging on a single phone . In International Conference on Mobile Computing and Networking , 2015 . Jian Liu, Yan Wang, Gorkem Kar, Yingying Chen, Jie Yang, and Marco Gruteser. Snooping keystrokes with mm-level audio ranging on a single phone. In International Conference on Mobile Computing and Networking, 2015."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-6479-1"},{"key":"e_1_3_2_1_52_1","volume-title":"VoiceArrest Sound Masking Features. https:\/\/mpsacoustics.com\/sound-masking\/","author":"Simple Masking Privacy","year":"2021","unstructured":"Masking Privacy Simple . VoiceArrest Sound Masking Features. https:\/\/mpsacoustics.com\/sound-masking\/ , 2021 . Masking Privacy Simple. VoiceArrest Sound Masking Features. https:\/\/mpsacoustics.com\/sound-masking\/, 2021."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.robot.2007.05.006"},{"key":"e_1_3_2_1_54_1","volume-title":"USENIX Security Symposium","author":"Michalevsky Yan","year":"2014","unstructured":"Yan Michalevsky , Dan Boneh , and Gabi Nakibly . Gyrophone : Recognizing speech from gyroscope signals . In USENIX Security Symposium , 2014 . Yan Michalevsky, Dan Boneh, and Gabi Nakibly. Gyrophone: Recognizing speech from gyroscope signals. In USENIX Security Symposium, 2014."},{"key":"e_1_3_2_1_55_1","volume-title":"Ivan Gligorijevic, Joachim Taelman, and Sabine Van Huffel. Source separation from single-channel recordings by combining empirical-mode decomposition and independent component analysis","author":"Mijovic Bogdan","year":"2010","unstructured":"Bogdan Mijovic , Maarten De Vos , Ivan Gligorijevic, Joachim Taelman, and Sabine Van Huffel. Source separation from single-channel recordings by combining empirical-mode decomposition and independent component analysis . IEEE transactions on biomedical engineering, 57(9):2188--2196, 2010 . Bogdan Mijovic, Maarten De Vos, Ivan Gligorijevic, Joachim Taelman, and Sabine Van Huffel. Source separation from single-channel recordings by combining empirical-mode decomposition and independent component analysis. IEEE transactions on biomedical engineering, 57(9):2188--2196, 2010."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858580"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2010.2053027"},{"key":"e_1_3_2_1_58_1","unstructured":"Oeler Industries Inc. Sound Masking Systems. https:\/\/www.oeler.com\/sound-masking-systems\/ 2020.  Oeler Industries Inc. Sound Masking Systems. https:\/\/www.oeler.com\/sound-masking-systems\/ 2020."},{"key":"e_1_3_2_1_59_1","volume-title":"IEEE International Conference on Acoustics, Speech and Signal Processing","author":"Panayotov Vassil","year":"2015","unstructured":"Vassil Panayotov , Guoguo Chen , Daniel Povey , and Sanjeev Khudanpur . Librispeech : An ASR corpus based on public domain audio books . In IEEE International Conference on Acoustics, Speech and Signal Processing , 2015 . Vassil Panayotov, Guoguo Chen, Daniel Povey, and Sanjeev Khudanpur. Librispeech: An ASR corpus based on public domain audio books. In IEEE International Conference on Acoustics, Speech and Signal Processing, 2015."},{"key":"e_1_3_2_1_60_1","volume-title":"International Conference on Embedded Networked Sensor Systems","author":"Peng Chunyi","year":"2007","unstructured":"Chunyi Peng , Guobin Shen , Yongguang Zhang , Yanlin Li , and Kun Tan . BeepBeep : A high accuracy acoustic ranging system using COTS mobile devices . In International Conference on Embedded Networked Sensor Systems , 2007 . Chunyi Peng, Guobin Shen, Yongguang Zhang, Yanlin Li, and Kun Tan. BeepBeep: A high accuracy acoustic ranging system using COTS mobile devices. In International Conference on Embedded Networked Sensor Systems, 2007."},{"issue":"1","key":"e_1_3_2_1_61_1","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1631\/FITEE.1700814","article-title":"Past review, current progress, and challenges ahead on the cocktail party problem","volume":"19","author":"Qian Yanmin","year":"2018","unstructured":"Yanmin Qian , Chao Weng , Xuankai Chang , Shuai Wang , and Dong Yu . Past review, current progress, and challenges ahead on the cocktail party problem . Frontiers of Information Technology & Electronic Engineering , 19 ( 1 ): 40 -- 63 , 2018 . Yanmin Qian, Chao Weng, Xuankai Chang, Shuai Wang, and Dong Yu. Past review, current progress, and challenges ahead on the cocktail party problem. Frontiers of Information Technology & Electronic Engineering, 19(1):40--63, 2018.","journal-title":"Frontiers of Information Technology & Electronic Engineering"},{"key":"e_1_3_2_1_62_1","volume-title":"USENIX Security Symposium","author":"Ramesh Soundarya","year":"2021","unstructured":"Soundarya Ramesh , Rui Xiao , Anindya Maiti , Jong Taek Lee , Harini Ramprasad , Ananda Kumar , Murtuza Jadliwala , and Jun Han . Acoustics to the rescue: Physical key inference attack revisited . In USENIX Security Symposium , 2021 . Soundarya Ramesh, Rui Xiao, Anindya Maiti, Jong Taek Lee, Harini Ramprasad, Ananda Kumar, Murtuza Jadliwala, and Jun Han. Acoustics to the rescue: Physical key inference attack revisited. In USENIX Security Symposium, 2021."},{"key":"e_1_3_2_1_63_1","volume-title":"International Conference on Mobile Systems, Applications, and Services","author":"Roy Nirupam","year":"2017","unstructured":"Nirupam Roy , Haitham Hassanieh , and Romit Roy Choudhury . Backdoor : Making microphones hear inaudible sounds . In International Conference on Mobile Systems, Applications, and Services , 2017 . Nirupam Roy, Haitham Hassanieh, and Romit Roy Choudhury. Backdoor: Making microphones hear inaudible sounds. In International Conference on Mobile Systems, Applications, and Services, 2017."},{"key":"e_1_3_2_1_64_1","volume-title":"USENIX Symposium on Networked Systems Design and Implementation","author":"Roy Nirupam","year":"2018","unstructured":"Nirupam Roy , Sheng Shen , Haitham Hassanieh , and Romit Roy Choudhury . Inaudible voice commands: The long-range attack and defense . In USENIX Symposium on Networked Systems Design and Implementation , 2018 . Nirupam Roy, Sheng Shen, Haitham Hassanieh, and Romit Roy Choudhury. Inaudible voice commands: The long-range attack and defense. In USENIX Symposium on Networked Systems Design and Implementation, 2018."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1121\/1.383662"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2918261"},{"key":"e_1_3_2_1_67_1","volume-title":"Conference of the ACM Special Interest Group on Data Communication","author":"Shen Sheng","year":"2018","unstructured":"Sheng Shen , Nirupam Roy , Junfeng Guan , Haitham Hassanieh , and Romit Roy Choudhury . MUTE : Bringing IoT to noise cancellation . In Conference of the ACM Special Interest Group on Data Communication , 2018 . Sheng Shen, Nirupam Roy, Junfeng Guan, Haitham Hassanieh, and Romit Roy Choudhury. MUTE: Bringing IoT to noise cancellation. In Conference of the ACM Special Interest Group on Data Communication, 2018."},{"key":"e_1_3_2_1_68_1","volume-title":"ACM conference on computer and communications security","author":"Song Liwei","year":"2017","unstructured":"Liwei Song and Prateek Mittal . Poster : Inaudible voice commands . In ACM conference on computer and communications security , 2017 . Liwei Song and Prateek Mittal. Poster: Inaudible voice commands. In ACM conference on computer and communications security, 2017."},{"key":"e_1_3_2_1_69_1","volume-title":"International Conference on Embedded Networked Sensor Systems","author":"Sun Ke","year":"2020","unstructured":"Ke Sun , Chen Chen , and Xinyu Zhang . \"Alexa , stop spying on me!\": Speech privacy protection against voice assistants . In International Conference on Embedded Networked Sensor Systems , 2020 . Ke Sun, Chen Chen, and Xinyu Zhang. \"Alexa, stop spying on me!\": Speech privacy protection against voice assistants. In International Conference on Embedded Networked Sensor Systems, 2020."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2002.800399"},{"key":"e_1_3_2_1_71_1","volume-title":"Apple apologises for allowing workers to listen to siri recordings. https:\/\/www.theguardian.com\/technology\/2019\/aug\/29\/apple-apologises-listen-siri-recordings","author":"Guardian The","year":"2019","unstructured":"The Guardian . Apple apologises for allowing workers to listen to siri recordings. https:\/\/www.theguardian.com\/technology\/2019\/aug\/29\/apple-apologises-listen-siri-recordings , 2019 . The Guardian. Apple apologises for allowing workers to listen to siri recordings. https:\/\/www.theguardian.com\/technology\/2019\/aug\/29\/apple-apologises-listen-siri-recordings, 2019."},{"key":"e_1_3_2_1_72_1","volume-title":"Ukraine prime minister offers resignation after leaked recording. https:\/\/www.theguardian.com\/world\/2020\/jan\/17\/ukraine-prime-minister-oleksiy-goncharuk-offers-resignation-after-leaked-recording","author":"Guardian The","year":"2020","unstructured":"The Guardian . Ukraine prime minister offers resignation after leaked recording. https:\/\/www.theguardian.com\/world\/2020\/jan\/17\/ukraine-prime-minister-oleksiy-goncharuk-offers-resignation-after-leaked-recording , 2020 . The Guardian. Ukraine prime minister offers resignation after leaked recording. https:\/\/www.theguardian.com\/world\/2020\/jan\/17\/ukraine-prime-minister-oleksiy-goncharuk-offers-resignation-after-leaked-recording, 2020."},{"key":"e_1_3_2_1_73_1","volume-title":"International Conference on Mobile Computing and Networking","author":"Tung Yu-Chih","year":"2015","unstructured":"Yu-Chih Tung and Kang G. Shin . EchoTag: Accurate infrastructure-free indoor location tagging with smartphones . In International Conference on Mobile Computing and Networking , 2015 . Yu-Chih Tung and Kang G. Shin. EchoTag: Accurate infrastructure-free indoor location tagging with smartphones. In International Conference on Mobile Computing and Networking, 2015."},{"key":"e_1_3_2_1_74_1","volume-title":"Portable ultrasonic microphone defeater. https:\/\/uspystore.com\/portable-ultrasonic-microphone-defeater\/","year":"2021","unstructured":"U-spy Store. Portable ultrasonic microphone defeater. https:\/\/uspystore.com\/portable-ultrasonic-microphone-defeater\/ , 2021 . U-spy Store. Portable ultrasonic microphone defeater. https:\/\/uspystore.com\/portable-ultrasonic-microphone-defeater\/, 2021."},{"key":"e_1_3_2_1_75_1","volume-title":"Silent ultrasonic microphone defeater. https:\/\/uspystore.com\/silent-ultrasonic-microphone-defeater\/","year":"2021","unstructured":"U-spy Store. Silent ultrasonic microphone defeater. https:\/\/uspystore.com\/silent-ultrasonic-microphone-defeater\/ , 2021 . U-spy Store. Silent ultrasonic microphone defeater. https:\/\/uspystore.com\/silent-ultrasonic-microphone-defeater\/, 2021."},{"key":"e_1_3_2_1_76_1","volume-title":"Demos of the prototype of micfrozen on anti-eavesdropping. https:\/\/youtu.be\/8g2UykkPZ-M","year":"2022","unstructured":"Unname. Demos of the prototype of micfrozen on anti-eavesdropping. https:\/\/youtu.be\/8g2UykkPZ-M , 2022 . Unname. Demos of the prototype of micfrozen on anti-eavesdropping. https:\/\/youtu.be\/8g2UykkPZ-M, 2022."},{"key":"e_1_3_2_1_77_1","volume-title":"Google employees are eavesdropping, even in your living room. https:\/\/www.vrt.be\/vrtnws\/en\/2019\/07\/10\/google-employees-are-eavesdropping-even-in-flemish-living-rooms\/","author":"VRT","year":"2019","unstructured":"VRT NWS. Google employees are eavesdropping, even in your living room. https:\/\/www.vrt.be\/vrtnws\/en\/2019\/07\/10\/google-employees-are-eavesdropping-even-in-flemish-living-rooms\/ , 2019 . VRT NWS. Google employees are eavesdropping, even in your living room. https:\/\/www.vrt.be\/vrtnws\/en\/2019\/07\/10\/google-employees-are-eavesdropping-even-in-flemish-living-rooms\/, 2019."},{"key":"e_1_3_2_1_78_1","volume-title":"International Conference on Mobile Systems, Applications, and Services","author":"Wang Junjue","year":"2014","unstructured":"Junjue Wang , Kaichen Zhao , Xinyu Zhang , and Chunyi Peng . Ubiquitous keyboard for small mobile devices: Harnessing multipath fading for fine-grained keystroke localization . In International Conference on Mobile Systems, Applications, and Services , 2014 . Junjue Wang, Kaichen Zhao, Xinyu Zhang, and Chunyi Peng. Ubiquitous keyboard for small mobile devices: Harnessing multipath fading for fine-grained keystroke localization. In International Conference on Mobile Systems, Applications, and Services, 2014."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.752618"},{"key":"e_1_3_2_1_80_1","volume-title":"International Conference on Computer Communication and Networks","author":"Wang Xuyu","year":"2017","unstructured":"Xuyu Wang , Runze Huang , and Shiwen Mao . Sonarbeat : Sonar phase for breathing beat monitoring with smartphones . In International Conference on Computer Communication and Networks , 2017 . Xuyu Wang, Runze Huang, and Shiwen Mao. Sonarbeat: Sonar phase for breathing beat monitoring with smartphones. In International Conference on Computer Communication and Networks, 2017."},{"key":"e_1_3_2_1_81_1","volume-title":"ACM Conference on Embedded Networked Sensor Systems","author":"Wang Ziqi","year":"2020","unstructured":"Ziqi Wang , Zhe Chen , Akash Deep Singh , Luis Garcia , Jun Luo , and Mani B. Srivastava . Uwhear: through-wall extraction and separation of audio vibrations using wireless signals . In ACM Conference on Embedded Networked Sensor Systems , 2020 . Ziqi Wang, Zhe Chen, Akash Deep Singh, Luis Garcia, Jun Luo, and Mani B. Srivastava. Uwhear: through-wall extraction and separation of audio vibrations using wireless signals. In ACM Conference on Embedded Networked Sensor Systems, 2020."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.823483"},{"key":"e_1_3_2_1_83_1","volume-title":"Finite impulse response. https:\/\/en.wikipedia.org\/w\/index.php?title=Finite_impulse_response&oldid=1044909269","year":"2021","unstructured":"Wikipedia. Finite impulse response. https:\/\/en.wikipedia.org\/w\/index.php?title=Finite_impulse_response&oldid=1044909269 , 2021 . Wikipedia. Finite impulse response. https:\/\/en.wikipedia.org\/w\/index.php?title=Finite_impulse_response&oldid=1044909269, 2021."},{"key":"e_1_3_2_1_84_1","volume-title":"Ensemble empirical mode decomposition: a noise-assisted data analysis method. Advances in adaptive data analysis, 1(1):1--41","author":"Wu Zhaohua","year":"2009","unstructured":"Zhaohua Wu and Norden E Huang . Ensemble empirical mode decomposition: a noise-assisted data analysis method. Advances in adaptive data analysis, 1(1):1--41 , 2009 . Zhaohua Wu and Norden E Huang. Ensemble empirical mode decomposition: a noise-assisted data analysis method. Advances in adaptive data analysis, 1(1):1--41, 2009."},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2014.10.005"},{"key":"e_1_3_2_1_86_1","volume-title":"International Conference on Mobile Systems, Applications, and Services","author":"Xu Chenhan","year":"2019","unstructured":"Chenhan Xu , Zhengxiong Li , Hanbin Zhang , Aditya Singh Rathore , Huining Li , Chen Song , Kun Wang , and Wenyao Xu. WaveEar : Exploring a mmwave-based noise-resistant speech sensing for voice-user interface . In International Conference on Mobile Systems, Applications, and Services , 2019 . Chenhan Xu, Zhengxiong Li, Hanbin Zhang, Aditya Singh Rathore, Huining Li, Chen Song, Kun Wang, and Wenyao Xu. WaveEar: Exploring a mmwave-based noise-resistant speech sensing for voice-user interface. In International Conference on Mobile Systems, Applications, and Services, 2019."},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2012.08.010"},{"key":"e_1_3_2_1_88_1","volume-title":"Network and Distributed System Security Symposium","author":"Yan Qiben","year":"2020","unstructured":"Qiben Yan , Kehai Liu , Qin Zhou , Hanqing Guo , and Ning Zhang . SurfingAttack : Interactive hidden attack on voice assistants using ultrasonic guided waves . In Network and Distributed System Security Symposium , 2020 . Qiben Yan, Kehai Liu, Qin Zhou, Hanqing Guo, and Ning Zhang. SurfingAttack: Interactive hidden attack on voice assistants using ultrasonic guided waves. In Network and Distributed System Security Symposium, 2020."},{"key":"e_1_3_2_1_89_1","volume-title":"International Conference on Mobile Systems, Applications, and Services","author":"Yun Sangki","year":"2015","unstructured":"Sangki Yun , Yi-Chao Chen , and Lili Qiu . Turning a mobile device into a mouse in the air . In International Conference on Mobile Systems, Applications, and Services , 2015 . Sangki Yun, Yi-Chao Chen, and Lili Qiu. Turning a mobile device into a mouse in the air. In International Conference on Mobile Systems, Applications, and Services, 2015."},{"key":"e_1_3_2_1_90_1","volume-title":"Annual Network and Distributed System Security Symposium","author":"Zhang Guoming","year":"2021","unstructured":"Guoming Zhang , Xiaoyu Ji , Xinfeng Li , Gang Qu , and Wenyuan Xu. Eararray : Defending against DolphinAttack via acoustic attenuation . In Annual Network and Distributed System Security Symposium , 2021 . Guoming Zhang, Xiaoyu Ji, Xinfeng Li, Gang Qu, and Wenyuan Xu. Eararray: Defending against DolphinAttack via acoustic attenuation. In Annual Network and Distributed System Security Symposium, 2021."},{"key":"e_1_3_2_1_91_1","volume-title":"Security and Robustness in Heterogeneous Systems","author":"Zhang Guoming","year":"2019","unstructured":"Guoming Zhang , Xiaoyu Ji , Xinyan Zhou , Dong-lian Qi, and Wenyuan Xu. UltraComm : High-speed and inaudible acoustic communication. In Quality, Reliability , Security and Robustness in Heterogeneous Systems , 2019 . Guoming Zhang, Xiaoyu Ji, Xinyan Zhou, Dong-lian Qi, and Wenyuan Xu. UltraComm: High-speed and inaudible acoustic communication. In Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2019."},{"key":"e_1_3_2_1_92_1","volume-title":"ACM Conference on Computer and Communications Security","author":"Zhang Guoming","year":"2017","unstructured":"Guoming Zhang , Chen Yan , Xiaoyu Ji , Tianchen Zhang , Taimin Zhang , and Wenyuan Xu. Dolphinattack : Inaudible voice commands . In ACM Conference on Computer and Communications Security , 2017 . Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, and Wenyuan Xu. Dolphinattack: Inaudible voice commands. In ACM Conference on Computer and Communications Security, 2017."},{"key":"e_1_3_2_1_93_1","volume-title":"International Conference on Mobile Systems, Applications, and Services","author":"Zhang Zengbin","year":"2012","unstructured":"Zengbin Zhang , David Chu , Xiaomeng Chen , and Thomas Moscibroda . SwordFight : Enabling a new class of phone-to-phone action games on commodity phones . In International Conference on Mobile Systems, Applications, and Services , 2012 . Zengbin Zhang, David Chu, Xiaomeng Chen, and Thomas Moscibroda. SwordFight: Enabling a new class of phone-to-phone action games on commodity phones. In International Conference on Mobile Systems, Applications, and Services, 2012."},{"key":"e_1_3_2_1_94_1","volume-title":"International Conference on Mobile Systems, Applications, and Services","author":"Zhou Bing","year":"2017","unstructured":"Bing Zhou , Mohammed Elbadry , Ruipeng Gao , and Fan Ye. BatMapper : Acoustic sensing based indoor floor plan construction using smart-phones . In International Conference on Mobile Systems, Applications, and Services , 2017 . Bing Zhou, Mohammed Elbadry, Ruipeng Gao, and Fan Ye. BatMapper: Acoustic sensing based indoor floor plan construction using smart-phones. In International Conference on Mobile Systems, Applications, and Services, 2017."},{"key":"e_1_3_2_1_95_1","volume-title":"ACM Conference on Embedded Network Sensor Systems","author":"Zhou Bing","year":"2017","unstructured":"Bing Zhou , Mohammed Elbadry , Ruipeng Gao , and Fan Ye. BatTracker : High precision infrastructure-free mobile device tracking in indoor environments . In ACM Conference on Embedded Network Sensor Systems , 2017 . Bing Zhou, Mohammed Elbadry, Ruipeng Gao, and Fan Ye. BatTracker: High precision infrastructure-free mobile device tracking in indoor environments. In ACM Conference on Embedded Network Sensor Systems, 2017."},{"key":"e_1_3_2_1_96_1","volume-title":"International Conference on Mobile Computing and Networking","author":"Zhou Bing","year":"2018","unstructured":"Bing Zhou , Jay Lohokare , Ruipeng Gao , and Fan Ye. Echoprint : Two-factor authentication using acoustics and vision on smartphones . In International Conference on Mobile Computing and Networking , 2018 . Bing Zhou, Jay Lohokare, Ruipeng Gao, and Fan Ye. Echoprint: Two-factor authentication using acoustics and vision on smartphones. In International Conference on Mobile Computing and Networking, 2018."},{"key":"e_1_3_2_1_97_1","volume-title":"IEEE Conference on Computer Communications","author":"Zhou Xinyan","year":"2019","unstructured":"Xinyan Zhou , Xiaoyu Ji , Chen Yan , Jiangyi Deng , and Wenyuan Xu. Nauth : Secure face-to-face device authentication via nonlinearity . In IEEE Conference on Computer Communications , 2019 . Xinyan Zhou, Xiaoyu Ji, Chen Yan, Jiangyi Deng, and Wenyuan Xu. Nauth: Secure face-to-face device authentication via nonlinearity. In IEEE Conference on Computer Communications, 2019."},{"key":"e_1_3_2_1_98_1","volume-title":"International Workshop on Independent Component Analysis and Blind Signal Separation","author":"Ziehe Andreas","year":"2001","unstructured":"Andreas Ziehe , Motoaki Kawanabe , Stefan Harmeling , and Klaus-Robert M\u00fcller . Separation of post-nonlinear mixtures using ace and temporal decorrelation . In International Workshop on Independent Component Analysis and Blind Signal Separation , 2001 . Andreas Ziehe, Motoaki Kawanabe, Stefan Harmeling, and Klaus-Robert M\u00fcller. Separation of post-nonlinear mixtures using ace and temporal decorrelation. In International Workshop on Independent Component Analysis and Blind Signal Separation, 2001."},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.5555\/945365.964308"}],"event":{"name":"ACM MobiCom '23: 29th Annual International Conference on Mobile Computing and Networking","location":"Madrid Spain","acronym":"ACM MobiCom '23","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 29th Annual International Conference on Mobile Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3570361.3592502","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:27Z","timestamp":1750182567000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3570361.3592502"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,2]]},"references-count":99,"alternative-id":["10.1145\/3570361.3592502","10.1145\/3570361"],"URL":"https:\/\/doi.org\/10.1145\/3570361.3592502","relation":{},"subject":[],"published":{"date-parts":[[2023,10,2]]},"assertion":[{"value":"2023-10-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}