{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T20:10:36Z","timestamp":1759435836600,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2023YFB2904000","2023YFB2904001","2023YFB3107402"],"award-info":[{"award-number":["2023YFB2904000","2023YFB2904001","2023YFB3107402"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Zhejiang Provincial Natural Science Foundation of China","award":["LD24F020010","LY24F020007"],"award-info":[{"award-number":["LD24F020010","LY24F020007"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172359","62472372"],"award-info":[{"award-number":["62172359","62472372"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research and Development Program of Hangzhou City","award":["2024SZD1A27"],"award-info":[{"award-number":["2024SZD1A27"]}]},{"name":"Key R&D Programme of Zhejiang Province","award":["2025C02264"],"award-info":[{"award-number":["2025C02264"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,23]]},"DOI":"10.1145\/3711875.3729142","type":"proceedings-article","created":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T19:30:22Z","timestamp":1759433422000},"page":"515-527","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["SecHeadset: A Practical Privacy Protection System for Real-time Voice Communication"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4379-8871","authenticated-orcid":false,"given":"Peng","family":"Huang","sequence":"first","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8931-2546","authenticated-orcid":false,"given":"Kun","family":"Pan","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7265-0497","authenticated-orcid":false,"given":"Qinglong","family":"Wang","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, Zhejiang, China"},{"name":"Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, Hangzhou, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4453-2274","authenticated-orcid":false,"given":"Peng","family":"Cheng","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, Zhejiang, China"},{"name":"Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, Hangzhou, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5230-3749","authenticated-orcid":false,"given":"Li","family":"Lu","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, Zhejiang, China"},{"name":"Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, Hangzhou, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0921-8869","authenticated-orcid":false,"given":"Zhongjie","family":"Ba","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, Zhejiang, China"},{"name":"Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, Hangzhou, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1969-2591","authenticated-orcid":false,"given":"Kui","family":"Ren","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, Zhejiang, China"},{"name":"Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, Hangzhou, Zhejiang, China"}]}],"member":"320","published-online":{"date-parts":[[2025,9,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Voice communication equipment market: Opportunities and forecast 2023\u20132029. https:\/\/www.marketgrowthreports.com\/global-voice-communication-equipment-market-21331280","author":"Reports Market Growth","year":"2022","unstructured":"Market Growth Reports. Voice communication equipment market: Opportunities and forecast 2023\u20132029. https:\/\/www.marketgrowthreports.com\/global-voice-communication-equipment-market-21331280, 2022."},{"key":"e_1_3_2_1_2_1","volume-title":"Nsa monitored calls of 35 world leaders after us official handed over contacts. https:\/\/www.theguardian.com\/world\/2013\/oct\/24\/nsa-surveillance-world-leaders-calls","author":"News The Guardian","year":"2013","unstructured":"The Guardian News. Nsa monitored calls of 35 world leaders after us official handed over contacts. https:\/\/www.theguardian.com\/world\/2013\/oct\/24\/nsa-surveillance-world-leaders-calls, 2013."},{"key":"e_1_3_2_1_3_1","first-page":"88","volume-title":"29th USENIX Security Symposium, USENIX Security 2020","author":"Rupprecht David","year":"2020","unstructured":"David Rupprecht, Katharina Kohls, Thorsten Holz, and Christina P\u00f6pper. Call me maybe: Eavesdropping encrypted LTE calls with revolte. In Srdjan Capkun and Franziska Roesner, editors, 29th USENIX Security Symposium, USENIX Security 2020, August 12\u201314, 2020, pages 73\u201388. USENIX Association, 2020."},{"key":"e_1_3_2_1_4_1","volume-title":"Pegasus: French president macron identified as spyware target. https:\/\/www.bbc.com\/news\/world-europe-57907258","author":"News BBC","year":"2021","unstructured":"BBC News. Pegasus: French president macron identified as spyware target. https:\/\/www.bbc.com\/news\/world-europe-57907258, 2021."},{"key":"e_1_3_2_1_5_1","volume-title":"Android apps are harvesting your data even after you tell them not to, says study. https:\/\/edition.cnn.com\/2019\/07\/10\/tech\/android-apps-privacy-trnd\/index.html","author":"Business CNN","year":"2019","unstructured":"CNN Business. Android apps are harvesting your data even after you tell them not to, says study. https:\/\/edition.cnn.com\/2019\/07\/10\/tech\/android-apps-privacy-trnd\/index.html, 2019."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690309"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10351027"},{"key":"e_1_3_2_1_8_1","volume-title":"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-25218","year":"2020","unstructured":"CVE-2020-25218. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-25218, 2020."},{"key":"e_1_3_2_1_9_1","volume-title":"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-3568","year":"2019","unstructured":"CVE-2019-3568. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-3568, 2019."},{"key":"e_1_3_2_1_10_1","volume-title":"https:\/\/en.wikipedia.org\/wiki\/PRISM","year":"2024","unstructured":"Wikipedia. Prism. https:\/\/en.wikipedia.org\/wiki\/PRISM, 2024."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-14572-1"},{"issue":"11","key":"e_1_3_2_1_12_1","first-page":"456","article-title":"Fpga-based voice encryption equipment under the analog voice communication channel","volume":"12","author":"Ge Xinyu","year":"2021","unstructured":"Xinyu Ge, Guiling Sun, Bowen Zheng, and Ruili Nan. Fpga-based voice encryption equipment under the analog voice communication channel. Inf., 12(11):456, 2021.","journal-title":"Inf."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT49239.2020.9225399"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7630-4"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-021-06431-8"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2022.06.007"},{"key":"e_1_3_2_1_17_1","volume-title":"Opus codec. https:\/\/opus-codec.org\/docs\/opus_api-1.5.pdf","author":"IETF Codec Working Group","year":"2024","unstructured":"IETF Codec Working Group. Opus codec. https:\/\/opus-codec.org\/docs\/opus_api-1.5.pdf, 2024."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-57pt1r5"},{"key":"e_1_3_2_1_19_1","article-title":"Phoneme-based proactive anti-eavesdropping with controlled recording privilege","author":"Huang Peng","year":"2024","unstructured":"Peng Huang, Yao Wei, Peng Cheng, Zhongjie Ba, Li Lu, Feng Lin, Yang Wang, and Kui Ren. Phoneme-based proactive anti-eavesdropping with controlled recording privilege. IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2024.","journal-title":"IEEE Transactions on Dependable and Secure Computing (IEEE TDSC)"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9413901"},{"key":"e_1_3_2_1_21_1","volume-title":"April","author":"Pollack Irwin","year":"1975","unstructured":"Irwin Pollack. Auditory informational masking. The Journal of the Acoustical Society of America, 57(S1):S5\u2013S5, April 1975."},{"key":"e_1_3_2_1_22_1","volume-title":"https:\/\/telegram.org","year":"2024","unstructured":"Telegram. https:\/\/telegram.org, 2024."},{"key":"e_1_3_2_1_23_1","volume-title":"https:\/\/www.viber.com\/en\/","year":"2024","unstructured":"Viber. https:\/\/www.viber.com\/en\/, 2024."},{"key":"e_1_3_2_1_24_1","volume-title":"https:\/\/www.messenger.com","year":"2024","unstructured":"Messenger. https:\/\/www.messenger.com, 2024."},{"key":"e_1_3_2_1_25_1","volume-title":"https:\/\/www.skype.com","year":"2024","unstructured":"Skype. https:\/\/www.skype.com, 2024."},{"key":"e_1_3_2_1_26_1","volume-title":"https:\/\/line.me","year":"2024","unstructured":"Line. https:\/\/line.me, 2024."},{"key":"e_1_3_2_1_27_1","volume-title":"https:\/\/www.dingtalk.com\/en","year":"2024","unstructured":"Dingtalk. https:\/\/www.dingtalk.com\/en, 2024."},{"key":"e_1_3_2_1_28_1","volume-title":"https:\/\/whatsapp.com","year":"2024","unstructured":"Whatsapp. https:\/\/whatsapp.com, 2024."},{"key":"e_1_3_2_1_29_1","volume-title":"https:\/\/www.wechat.com","year":"2024","unstructured":"Wechat. https:\/\/www.wechat.com, 2024."},{"key":"e_1_3_2_1_30_1","volume-title":"Timit acoustic-phonetic continuous speech corpus","author":"John","year":"1993","unstructured":"Garofolo, John S., Lamel, Lori F., Fisher, William M., Pallett, David S., Dahlgren, Nancy L., Zue, Victor, and Fiscus, Jonathan G. Timit acoustic-phonetic continuous speech corpus, 1993."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781315154718"},{"key":"e_1_3_2_1_32_1","volume-title":"Additional tools for xcode. https:\/\/download.developer.apple.com\/Developer_Tools\/Additional_Tools_for_Xcode_15\/Additional_Tools_for_Xcode_15.dmg","author":"Apple Inc.","year":"2024","unstructured":"Apple Inc. Additional tools for xcode. https:\/\/download.developer.apple.com\/Developer_Tools\/Additional_Tools_for_Xcode_15\/Additional_Tools_for_Xcode_15.dmg, 2024."},{"key":"e_1_3_2_1_33_1","first-page":"752","volume-title":"IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2001, 7\u201311 May, 2001, Salt Palace Convention Center, Salt Lake City, Utah, USA","author":"Rix Antony W.","unstructured":"Antony W. Rix, John G. Beerends, Michael P. Hollier, and Andries P. Hekstra. Perceptual evaluation of speech quality (pesq)-a new method for speech quality assessment of telephone networks and codecs. In IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2001, 7\u201311 May, 2001, Salt Palace Convention Center, Salt Lake City, Utah, USA, Proceedings, pages 749\u2013752. IEEE, 2001."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/QoMEX48832.2020.9123150"},{"key":"e_1_3_2_1_35_1","volume-title":"Synchronous frame structures used at primary and secondary hierarchical levels","author":"Union International Telecommunication","year":"1998","unstructured":"International Telecommunication Union. Synchronous frame structures used at primary and secondary hierarchical levels. International Telecommunication Union, 1998. Retrieved from https:\/\/www.itu.int\/rec\/T-REC-G.704\/en."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178964"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7953152"},{"key":"e_1_3_2_1_38_1","volume-title":"https:\/\/aws.amazon.com\/transcribe\/","author":"Amazon","year":"2024","unstructured":"Amazon transcribe. https:\/\/aws.amazon.com\/transcribe\/, 2024."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2010.5495701"},{"key":"e_1_3_2_1_40_1","volume-title":"https:\/\/www.amazon.com\/dp\/B08C55N34G\/","author":"Vention","year":"2024","unstructured":"Vention usb external stereo sound card. https:\/\/www.amazon.com\/dp\/B08C55N34G\/, 2024."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682804"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"JAMA 310(20):2191 November 2013.","DOI":"10.1001\/jama.2013.281053"},{"key":"e_1_3_2_1_43_1","volume-title":"November","author":"International Council for Harmonisation of Technical Requirements for Pharmaceuticals for Human Use (ICH).","year":"2016","unstructured":"International Council for Harmonisation of Technical Requirements for Pharmaceuticals for Human Use (ICH). ICH Guideline for Good Clinical Practice E6(R2), November 2016. Retrieved from https:\/\/www.ich.org\/page\/efficacy-guidelines."},{"key":"e_1_3_2_1_44_1","volume-title":"Methods for Subjective Determination of Transmission Quality (ITU-T Recommendation P.800)","author":"Union International Telecommunication","year":"1996","unstructured":"International Telecommunication Union. Methods for Subjective Determination of Transmission Quality (ITU-T Recommendation P.800). International Telecommunication Union, 1996. Retrieved from https:\/\/www.itu.int\/rec\/T-REC-P.800."},{"key":"e_1_3_2_1_45_1","first-page":"2481","volume-title":"21st Annual Conference of the International Speech Communication Association, Interspeech 2020","author":"Nils","year":"2020","unstructured":"Nils L. Westhausen and Bernd T. Meyer. Dual-signal transformation LSTM network for real-time noise suppression. In Helen Meng, Bo Xu, and Thomas Fang Zheng, editors, 21st Annual Conference of the International Speech Communication Association, Interspeech 2020, Virtual Event, Shanghai, China, October 25\u201329, 2020, pages 2477\u20132481. ISCA, 2020."},{"key":"e_1_3_2_1_46_1","volume-title":"https:\/\/developer.apple.com\/documentation\/avfaudio\/avaudiorecorder","author":"Developer Apple","year":"2025","unstructured":"Apple Developer. AVAudioRecorder. https:\/\/developer.apple.com\/documentation\/avfaudio\/avaudiorecorder, 2025."},{"key":"e_1_3_2_1_47_1","unstructured":"Apple Developer. Apple Session Programming Guide. https:\/\/developer.apple.com\/library\/archive\/documentation\/Audio\/Conceptual\/AudioSessionProgrammingGuide\/OptimizingForDeviceHardware\/OptimizingForDeviceHardware.html#\/\/apple_ref\/doc\/uid\/TP40007875-CH6-SW4 2017."},{"key":"e_1_3_2_1_48_1","volume-title":"https:\/\/developer.android.com\/reference\/android\/media\/AudioManager","author":"Developers Android","year":"2025","unstructured":"Android Developers. AudioManager. https:\/\/developer.android.com\/reference\/android\/media\/AudioManager, 2025."}],"event":{"name":"MobiSys '25: 23rd Annual International Conference on Mobile Systems, Applications and Services","location":"Hilton Anaheim Anaheim CA USA","acronym":"MobiSys '25","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 23rd Annual International Conference on Mobile Systems, Applications and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711875.3729142","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T19:32:22Z","timestamp":1759433542000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711875.3729142"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,23]]},"references-count":48,"alternative-id":["10.1145\/3711875.3729142","10.1145\/3711875"],"URL":"https:\/\/doi.org\/10.1145\/3711875.3729142","relation":{},"subject":[],"published":{"date-parts":[[2025,6,23]]},"assertion":[{"value":"2025-09-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}