{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T05:54:31Z","timestamp":1768802071526,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T00:00:00Z","timestamp":1687910400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Union?s Horizon 2020","award":["860813"],"award-info":[{"award-number":["860813"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,28]]},"DOI":"10.1145\/3577163.3595102","type":"proceedings-article","created":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T22:10:56Z","timestamp":1687212656000},"page":"127-132","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Differentially Private Adversarial Auto-Encoder to Protect Gender in Voice Biometrics"],"prefix":"10.1145","author":[{"given":"Ouba\u00efda","family":"Chouchane","sequence":"first","affiliation":[{"name":"EURECOM, Biot, France"}]},{"given":"Michele","family":"Panariello","sequence":"additional","affiliation":[{"name":"EURECOM, Biot, France"}]},{"given":"Oualid","family":"Zari","sequence":"additional","affiliation":[{"name":"EURECOM, Biot, France"}]},{"given":"Ismet","family":"Kerenciler","sequence":"additional","affiliation":[{"name":"EURECOM, Biot, France"}]},{"given":"Imen","family":"Chihaoui","sequence":"additional","affiliation":[{"name":"EURECOM, Biot, France"}]},{"given":"Massimiliano","family":"Todisco","sequence":"additional","affiliation":[{"name":"EURECOM, Biot, France"}]},{"given":"Melek","family":"\u00d6nen","sequence":"additional","affiliation":[{"name":"EURECOM, Biot, France"}]}],"member":"320","published-online":{"date-parts":[[2023,6,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3226070"},{"key":"e_1_3_2_1_3_1","volume-title":"Emotionless: Privacy- preserving speech analysis for voice assistants. arXiv preprint arXiv:1908.03632","author":"Aloufi Ranya","year":"2019","unstructured":"Ranya Aloufi, Hamed Haddadi, and David Boyle. 2019. Emotionless: Privacy- preserving speech analysis for voice assistants. arXiv preprint arXiv:1908.03632 (2019)."},{"key":"e_1_3_2_1_4_1","volume-title":"Beyond Voice Identity Conversion: Manipulating Voice Attributes by Adversarial Learning of Structured Disentangled Representations. arXiv preprint arXiv:2107.12346","author":"Benaroya Laurent","year":"2021","unstructured":"Laurent Benaroya, Nicolas Obin, and Axel Roebel. 2021. Beyond Voice Identity Conversion: Manipulating Voice Attributes by Adversarial Learning of Structured Disentangled Representations. arXiv preprint arXiv:2107.12346 (2021)."},{"key":"e_1_3_2_1_5_1","volume-title":"2020 15th IEEE International Conference on Automatic Face and Gesture Recognition (FG","author":"Ivanovska Marija","year":"2020","unstructured":"Bla? Bortolato, Marija Ivanovska, Peter Rot, Janez Kri?aj, Philipp Terh\u00f6rst, Naser Damer, Peter Peer, and Vitomir ?truc. 2020. Learning privacy-enhancing face representations through feature disentanglement. In 2020 15th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2020). IEEE, 495--502."},{"key":"e_1_3_2_1_6_1","unstructured":"J Michelle Brock and Ralph De Haas. 2021. EVIDENCE FROM BANKERS IN THE LAB. (2021)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2021--983"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"J. S. Chung A. Nagrani and A. Zisserman. 2018. VoxCeleb2: Deep Speaker Recognition. In INTERSPEECH.","DOI":"10.21437\/Interspeech.2018-1929"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-015-2948-y"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2021-941"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_12_1","first-page":"3","article-title":"The algorithmic foundations of differ- ential privacy","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork, Aaron Roth, et al. 2014. The algorithmic foundations of differ- ential privacy. Found. Trends Theor. Comput. Sci. 9, 3--4 (2014), 211--407.","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1137\/090756090"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00044"},{"key":"e_1_3_2_1_15_1","volume-title":"Improving speaker recognition by biometric voice deconstruction. Frontiers in bioengineering and biotechnology 3","author":"Mazaira-Fernandez Luis Miguel","year":"2015","unstructured":"Luis Miguel Mazaira-Fernandez, Agust\u00edn \u00c1lvarez-Marquina, and Pedro G\u00f3mez-Vilda. 2015. Improving speaker recognition by biometric voice deconstruction. Frontiers in bioengineering and biotechnology 3 (2015), 126."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW58289.2023.00036"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICB2018.2018.00023"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698605"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924619"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.3015420"},{"key":"e_1_3_2_1_21_1","volume-title":"Joon Son Chung, and Andrew Zisserman","author":"Nagrani Arsha","year":"2017","unstructured":"Arsha Nagrani, Joon Son Chung, and Andrew Zisserman. 2017. Voxceleb: a large-scale speaker identification dataset. arXiv preprint arXiv:1706.08612 (2017)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-73003-5_225"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250803"},{"key":"e_1_3_2_1_24_1","volume-title":"Adversarial disentanglement of speaker representation for attribute-driven privacy preservation. arXiv preprint arXiv:2012.04454","author":"No\u00e9 Paul-Gauthier","year":"2020","unstructured":"Paul-Gauthier No\u00e9, Mohammad Mohammadamini, Driss Matrouf, Titouan Parcollet, Andreas Nautsch, and Jean-Fran\u00e7ois Bonastre. 2020. Adversarial disentanglement of speaker representation for attribute-driven privacy preservation. arXiv preprint arXiv:2012.04454 (2020)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00772"},{"key":"e_1_3_2_1_26_1","volume-title":"John HL Hansen, and Jian Wu","author":"Sang Mufan","year":"2023","unstructured":"Mufan Sang, Yong Zhao, Gang Liu, John HL Hansen, and Jian Wu. 2023. Improving Transformer-based Networks With Locality For Automatic Speaker Verification. arXiv preprint arXiv:2302.08639 (2023)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8461375"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3155878"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987331"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2994960"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF55382.2022.9794535"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","unstructured":"Syed Rohit Zaman Dipan Sadekeen M Aqib Alfaz and Rifat Shahriyar. 2021. One Source to Detect them All: Gender Age and Emotion Detection from Voice. In 2021 IEEE 45th Annual Computers Software and Applications Conference (COMP- SAC). 338--343. https:\/\/doi.org\/10.1109\/COMPSAC51774.2021.00055","DOI":"10.1109\/COMPSAC51774.2021.00055"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i12.17333"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-021-93030-0"}],"event":{"name":"IH&MMSec '23: ACM Workshop on Information Hiding and Multimedia Security","location":"Chicago IL USA","acronym":"IH&MMSec '23","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3577163.3595102","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3577163.3595102","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:10Z","timestamp":1750182670000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3577163.3595102"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,28]]},"references-count":34,"alternative-id":["10.1145\/3577163.3595102","10.1145\/3577163"],"URL":"https:\/\/doi.org\/10.1145\/3577163.3595102","relation":{},"subject":[],"published":{"date-parts":[[2023,6,28]]},"assertion":[{"value":"2023-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}