{"id":"https://openalex.org/W3189494148","doi":"https://doi.org/10.1109/icc42927.2021.9500679","title":"A Non-Intrusive Method for Smart Speaker Forensics","display_name":"A Non-Intrusive Method for Smart Speaker Forensics","publication_year":2021,"publication_date":"2021-06-01","ids":{"openalex":"https://openalex.org/W3189494148","doi":"https://doi.org/10.1109/icc42927.2021.9500679","mag":"3189494148"},"language":"en","primary_location":{"id":"doi:10.1109/icc42927.2021.9500679","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc42927.2021.9500679","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2021 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103050255","display_name":"Lin Li","orcid":"https://orcid.org/0000-0003-4410-7064"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Li Lin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078523903","display_name":"Xuanyu Liu","orcid":"https://orcid.org/0000-0001-8916-9942"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xuanyu Liu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103805225","display_name":"Xiao Fu","orcid":"https://orcid.org/0009-0006-6601-5290"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiao Fu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073104000","display_name":"Bin Luo","orcid":"https://orcid.org/0000-0002-9036-0063"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Luo","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060514022","display_name":"Xiaojiang Du","orcid":"https://orcid.org/0000-0003-4235-9671"},"institutions":[{"id":"https://openalex.org/I84392919","display_name":"Temple University","ror":"https://ror.org/00kx1jb78","country_code":"US","type":"education","lineage":["https://openalex.org/I84392919"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaojiang Du","raw_affiliation_strings":["Dept. of Computer and Information Sciences, Temple University, Philadelphia, PA, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer and Information Sciences, Temple University, Philadelphia, PA, USA","institution_ids":["https://openalex.org/I84392919"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057916222","display_name":"Mohsen Guizani","orcid":"https://orcid.org/0000-0002-8972-8094"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Mohsen Guizani","raw_affiliation_strings":["Dept. of Computer Science and Engineering, Qatar University, Qatar"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Engineering, Qatar University, Qatar","institution_ids":["https://openalex.org/I60342839"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5103050255"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.2237,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.83297855,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.784532368183136},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.6205084323883057},{"id":"https://openalex.org/keywords/network-forensics","display_name":"Network forensics","score":0.5985507965087891},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.589514434337616},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.541762113571167},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.44273507595062256},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1937127411365509}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.784532368183136},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.6205084323883057},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.5985507965087891},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.589514434337616},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.541762113571167},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.44273507595062256},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1937127411365509}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc42927.2021.9500679","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc42927.2021.9500679","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2021 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6899999976158142}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W27869909","https://openalex.org/W405461467","https://openalex.org/W1489138569","https://openalex.org/W2125492197","https://openalex.org/W2223881431","https://openalex.org/W2566781703","https://openalex.org/W2571081683","https://openalex.org/W2753883666","https://openalex.org/W2793588429","https://openalex.org/W2916871439","https://openalex.org/W2920901262","https://openalex.org/W2934826843","https://openalex.org/W2963176735","https://openalex.org/W2963320092","https://openalex.org/W2963606273","https://openalex.org/W2964157970","https://openalex.org/W2964344666","https://openalex.org/W2968685153","https://openalex.org/W3040894111","https://openalex.org/W3044082017","https://openalex.org/W3047405961","https://openalex.org/W3100457262","https://openalex.org/W3100966310","https://openalex.org/W4285719527","https://openalex.org/W6601151004","https://openalex.org/W6780396514","https://openalex.org/W6781773695"],"related_works":["https://openalex.org/W2121070677","https://openalex.org/W2972427363","https://openalex.org/W2161391695","https://openalex.org/W4238452393","https://openalex.org/W1500698787","https://openalex.org/W188028618","https://openalex.org/W2489557937","https://openalex.org/W2111038567","https://openalex.org/W1970399788","https://openalex.org/W4385257722"],"abstract_inverted_index":{"With":[0],"the":[1,5,67,79,92],"rapid":[2],"development":[3],"of":[4,7,66,73,81,94],"Internet":[6],"Things":[8],"technology,":[9],"smart":[10,17,26,61,99],"speakers":[11,27,100],"have":[12],"become":[13],"increasingly":[14],"popular.":[15],"However,":[16],"speaker":[18],"security":[19,123],"is":[20,69],"an":[21,70,102,105],"ensuing":[22],"threat.":[23],"At":[24],"present,":[25],"are":[28],"activated":[29],"by":[30],"voice,":[31],"and":[32,84],"they":[33],"monitor":[34],"users\u2019":[35],"voices":[36],"24":[37],"hours":[38],"per":[39],"day.":[40],"Consequently,":[41],"there":[42],"may":[43],"be":[44],"problems":[45],"with":[46,78],"user":[47,82],"privacy":[48],"leakage.":[49],"In":[50],"this":[51],"paper,":[52],"we":[53],"propose":[54],"a":[55],"non-intrusive":[56],"digital":[57],"forensic":[58,110],"method":[59,72,118],"for":[60,121],"speakers.":[62],"The":[63,112],"main":[64],"contribution":[65],"paper":[68],"effective":[71],"combining":[74],"network":[75,88],"traffic":[76,89],"analysis":[77],"extraction":[80],"intent":[83],"alarms":[85],"about":[86],"abnormal":[87],"to":[90,107],"support":[91],"investigation":[93],"security.":[95],"We":[96],"use":[97],"Xiaomi":[98],"as":[101],"example":[103],"in":[104],"experiment":[106],"verify":[108],"our":[109,117],"method.":[111],"evaluation":[113],"results":[114],"show":[115],"that":[116],"works":[119],"well":[120],"detecting":[122],"risks.":[124]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
