Privacy-preserving speaker verification using secure binary embeddings

被引:0
|
作者
20143718152428
机构
来源
(1) INESC-ID, Lisboa, Portugal; (2) Instituto Superior Técnico, Lisboa, Portugal; (3) Language Technologies Institute, Carnegie Mellon University, Pittsburgh, PA, United States | 1600年 / Ericsson Nikola Tesla Zagreb; et al.; HEP - Croatian Electricity Company Zagreb; InfoDom Zagreb; Koncar-Electrical Industries Zagreb; T-Croatian Telecom Zagreb卷 / IEEE Computer Society期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
107269
引用
收藏
相关论文
共 50 条
  • [21] Privacy-Preserving IP Verification
    Mouris, Dimitris
    Gouert, Charles
    Tsoutsos, Nektarios Georgios
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (07) : 2010 - 2023
  • [22] PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks
    Li, Teng
    Ma, Jian-Feng
    Sun, Cong
    Xi, Ning
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2018, 34 (04) : 943 - 960
  • [23] SAEV: Secure Aggregation and Efficient Verification for Privacy-Preserving Federated Learning
    Wang, Junkai
    Wang, Rong
    Xiong, Ling
    Xiong, Neal
    Liu, Zhicai
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (24): : 39681 - 39696
  • [24] Threshold-based Secure and Privacy-Preserving Message Verification in VANETs
    Gao, Wei
    Wang, Mingzhong
    Zhu, Liehuang
    Zhang, Xiaoping
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 795 - 802
  • [25] Privacy-preserving Trust Verification
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    Shafiq, Basit
    Adam, Nabil
    SACMAT 2010: PROCEEDINGS OF THE 15TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2010, : 139 - 148
  • [26] PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks
    Li, Teng
    Ma, Jianfeng
    Sun, Cong
    Wei, Dawei
    Xi, Ning
    2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2017, : 5 - 10
  • [27] A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing
    Qin, Zhen
    Sun, Jianfei
    Wahaballa, Abubaker
    Zheng, Wentao
    Xiong, Hu
    Qin, Zhiguang
    COMPUTER STANDARDS & INTERFACES, 2017, 54 : 55 - 60
  • [28] Privacy-Preserving Data Integrity Verification for Secure Mobile Edge Storage
    Tong, Wei
    Chen, Wenjie
    Jiang, Bingbing
    Xu, Fengyuan
    Li, Qun
    Zhong, Sheng
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (09) : 5463 - 5478
  • [29] Privacy-preserving microbiome analysis using secure computation
    Wagner, Justin
    Paulson, Joseph N.
    Wang, Xiao
    Bhattacharjee, Bobby
    Bravo, Hector Corrada
    BIOINFORMATICS, 2016, 32 (12) : 1873 - 1879
  • [30] A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing
    Xia, Zhihua
    Wang, Lan
    Tang, Jian
    Xiong, Neal N.
    Weng, Jian
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (01): : 318 - 330