VoiceCloak: Adversarial Example Enabled Voice De-Identification with Balanced Privacy and Utility

M Chen, L Lu, J Wang, J Yu, Y Chen, Z Wang… - Proceedings of the …, 2023 - dl.acm.org
Faced with the threat of identity leakage during voice data publishing, users are engaged in
a privacy-utility dilemma when enjoying the utility of voice services. Existing machine-centric …

[PDF][PDF] Privacy-protecting techniques for behavioral data: A survey

S Hanisch, P Arias-Cabarcos… - arXiv preprint arXiv …, 2021 - scholar.archive.org
∗ Funded by the German Research Foundation (DFG, Deutsche Forschungsgemeinschaft)
as part of Germany's Excellence Strategy–EXC 2050/1–Project ID 390696704–Cluster of …

SpeechHide: A hybrid privacy-preserving mechanism for speech content and voiceprint in speech data sharing

Y Hu, R Li, S Wang, F Tao, Z Sun - 2022 7th IEEE International …, 2022 - ieeexplore.ieee.org
With the development of speech technology, huge amounts of speech data generated by
users is collected by speech service providers and may be used for data sharing. However …

Deep leakage from gradients

Y Mu - arXiv preprint arXiv:2301.02621, 2022 - arxiv.org
With the development of artificial intelligence technology, Federated Learning (FL) model
has been widely used in many industries for its high efficiency and confidentiality. Some …

Holistic risk assessment of inference attacks in machine learning

Y Yang - arXiv preprint arXiv:2212.10628, 2022 - arxiv.org
As machine learning expanding application, there are more and more unignorable privacy
and safety issues. Especially inference attacks against Machine Learning models allow …

Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples

M Chen, L Lu, J Yu, Y Chen, Z Ba, F Lin… - arXiv preprint arXiv …, 2022 - arxiv.org
Faced with the threat of identity leakage during voice data publishing, users are engaged in
a privacy-utility dilemma when enjoying convenient voice services. Existing studies employ …

White-box Inference Attacks against Centralized Machine Learning and Federated Learning

J Ge - arXiv preprint arXiv:2301.03595, 2022 - arxiv.org
With the development of information science and technology, various industries have
generated massive amounts of data, and machine learning is widely used in the analysis of …

Membership Inference Attacks Against Latent Factor Model

D Hu - arXiv preprint arXiv:2301.03596, 2022 - arxiv.org
The advent of the information age has led to the problems of information overload and
unclear demands. As an information filtering system, personalized recommendation systems …

[HTML][HTML] Research in methods for achieving secure voice anonymization: Evaluation and improvement of voice anonymization techniques for whistleblowing

E Hellman, M Nordstrand - 2022 - diva-portal.org
Safe whistleblowing within companies could give a more transparent and open society, and
keeping the whistleblower safe is key, this has led to a new EU Whistleblowing Directive …

Intelligent privacy safeguards for the digital society

A Guarino - 2021 - elea.unisa.it
The growth of the Internet and the pervasiveness of Information and Communication
Technology (ICT) have led to a radical change in our society, a deep economical …