{"id":"https://openalex.org/W4412624401","doi":"https://doi.org/10.1109/tifs.2025.3592558","title":"NUSGuard: Smart Device Anti-Eavesdropping Protection based on Near-Ultrasonic Interference","display_name":"NUSGuard: Smart Device Anti-Eavesdropping Protection based on Near-Ultrasonic Interference","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4412624401","doi":"https://doi.org/10.1109/tifs.2025.3592558"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3592558","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3592558","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5117427955","display_name":"Xiaoxiao Qiao","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoxiao Qiao","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062166339","display_name":"Man Zhou","orcid":"https://orcid.org/0000-0002-1602-7369"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Man Zhou","raw_affiliation_strings":["School of Cyber Science and Engineering, Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, Huazhong University of Science and Technology, Wuhan, China","Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"raw_orcid":"https://orcid.org/0000-0002-1602-7369","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100325337","display_name":"Hongwei Li","orcid":"https://orcid.org/0000-0002-5328-6407"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongwei Li","raw_affiliation_strings":["School of Cyber Science and Engineering, Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, Huazhong University of Science and Technology, Wuhan, China","Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101486025","display_name":"Xiaojing Zhu","orcid":"https://orcid.org/0009-0002-6478-9998"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaojing Zhu","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101760575","display_name":"Zhihao Yao","orcid":"https://orcid.org/0000-0001-9842-0713"},"institutions":[{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhihao Yao","raw_affiliation_strings":["Computer Science Department, New Jersey Institute of Technology, Newark, New Jersey, USA","Computer Science Department, New Jersey Institute of Technology, Newark, NJ, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer Science Department, New Jersey Institute of Technology, Newark, New Jersey, USA","institution_ids":["https://openalex.org/I118118575"]},{"raw_affiliation_string":"Computer Science Department, New Jersey Institute of Technology, Newark, NJ, USA","institution_ids":["https://openalex.org/I118118575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068117437","display_name":"Houzhen Wang","orcid":"https://orcid.org/0000-0003-2773-5050"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Houzhen Wang","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109792165","display_name":"Xiaojing Ma","orcid":"https://orcid.org/0000-0001-6363-3209"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaojing Ma","raw_affiliation_strings":["School of Cyber Science and Engineering, Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, Huazhong University of Science and Technology, Wuhan, China","Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5117427955"],"corresponding_institution_ids":["https://openalex.org/I37461747","https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.2581161,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.9299027919769287},{"id":"https://openalex.org/keywords/interference","display_name":"Interference (communication)","score":0.7275062799453735},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7042199373245239},{"id":"https://openalex.org/keywords/ultrasonic-sensor","display_name":"Ultrasonic sensor","score":0.6194885969161987},{"id":"https://openalex.org/keywords/electromagnetic-interference","display_name":"Electromagnetic interference","score":0.4979438781738281},{"id":"https://openalex.org/keywords/acoustics","display_name":"Acoustics","score":0.3422642648220062},{"id":"https://openalex.org/keywords/electronic-engineering","display_name":"Electronic engineering","score":0.3318740129470825},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2359645962715149},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17785656452178955},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10231807827949524}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.9299027919769287},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.7275062799453735},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7042199373245239},{"id":"https://openalex.org/C81288441","wikidata":"https://www.wikidata.org/wiki/Q20736125","display_name":"Ultrasonic sensor","level":2,"score":0.6194885969161987},{"id":"https://openalex.org/C184892835","wikidata":"https://www.wikidata.org/wiki/Q1474513","display_name":"Electromagnetic interference","level":2,"score":0.4979438781738281},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.3422642648220062},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.3318740129470825},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2359645962715149},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17785656452178955},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10231807827949524},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3592558","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3592558","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","score":0.550000011920929,"display_name":"Climate action"}],"awards":[{"id":"https://openalex.org/G5873790623","display_name":null,"funder_award_id":"62202180","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W1494198834","https://openalex.org/W2027282255","https://openalex.org/W2071442647","https://openalex.org/W2099464104","https://openalex.org/W2115042198","https://openalex.org/W2151370481","https://openalex.org/W2165158100","https://openalex.org/W2523919122","https://openalex.org/W2624801495","https://openalex.org/W2625581252","https://openalex.org/W2806247261","https://openalex.org/W2898050070","https://openalex.org/W2914439234","https://openalex.org/W2953236873","https://openalex.org/W2954828948","https://openalex.org/W2972436155","https://openalex.org/W2994661026","https://openalex.org/W3030359475","https://openalex.org/W3108244215","https://openalex.org/W3109639465","https://openalex.org/W3110286432","https://openalex.org/W3115481010","https://openalex.org/W3134499140","https://openalex.org/W3163652268","https://openalex.org/W3197478142","https://openalex.org/W4200115396","https://openalex.org/W4212831703","https://openalex.org/W4220911641","https://openalex.org/W4224917453","https://openalex.org/W4224940275","https://openalex.org/W4231807801","https://openalex.org/W4283218709","https://openalex.org/W4300824008","https://openalex.org/W4308643316","https://openalex.org/W4324007093","https://openalex.org/W4384027004","https://openalex.org/W4386243261","https://openalex.org/W4387212382","https://openalex.org/W4389363808","https://openalex.org/W4391725296","https://openalex.org/W4391725298","https://openalex.org/W4391974598"],"related_works":["https://openalex.org/W2368710903","https://openalex.org/W4386360526","https://openalex.org/W2772112465","https://openalex.org/W4387918499","https://openalex.org/W2392152900","https://openalex.org/W2380594826","https://openalex.org/W2031629218","https://openalex.org/W4238525810","https://openalex.org/W4247875078","https://openalex.org/W4238161731"],"abstract_inverted_index":{"Voice":[0],"assistants":[1],"(VAs)":[2],"have":[3,35,143],"become":[4],"ubiquitous":[5],"in":[6,40,148],"smart":[7,109],"devices,":[8],"and":[9,48,53,94,118,140,153],"are":[10],"highly":[11],"valued":[12],"for":[13,75,81],"their":[14],"ability":[15],"to":[16,65,91,100],"perform":[17],"a":[18,51,114,119],"variety":[19],"of":[20,33,70,98,107,150],"tasks":[21],"through":[22],"voice":[23,132],"interaction,":[24],"offering":[25],"users":[26],"hands-free":[27],"convenience.":[28],"However,":[29],"the":[30,62,67,79,95,105],"always-on":[31],"microphones":[32,106],"VAs":[34],"raised":[36],"significant":[37],"privacy":[38],"concerns":[39],"recent":[41],"years.":[42],"In":[43],"this":[44],"paper,":[45],"we":[46,112],"propose":[47,113],"implement":[49],"NUSGuard,":[50],"novel":[52],"practical":[54],"anti-eavesdropping":[55],"system.":[56],"To":[57],"our":[58],"knowledge,":[59],"it":[60,86],"is":[61],"first":[63],"system":[64],"utilize":[66],"built-in":[68],"speakers":[69],"commercial":[71],"off-the-shelf":[72],"(COTS)":[73],"devices":[74],"anti-eavesdropping,":[76],"thereby":[77],"eliminating":[78],"need":[80],"dedicated":[82],"ultrasonic":[83],"transmitters.":[84],"Specifically,":[85],"exploits":[87],"human":[88],"ears\u2019":[89],"insensitivity":[90],"near-ultrasonic":[92],"signals":[93],"inherent":[96],"non-linearity":[97],"mic":[99],"inject":[101],"jamming":[102,151],"noises":[103],"into":[104],"unauthorized":[108,127],"devices.":[110,137],"Furthermore,":[111],"robust":[115],"mixed-noise":[116],"scheme":[117],"lexical-level":[120],"automatic":[121],"jammer":[122],"control":[123],"strategy,":[124],"effectively":[125],"disrupting":[126],"recordings":[128],"while":[129],"maintaining":[130],"seamless":[131],"interaction":[133],"with":[134],"authorized":[135],"VA":[136],"Extensive":[138],"digital":[139],"real-world":[141],"experiments":[142],"demonstrated":[144],"NUSGuard\u2019s":[145],"superior":[146],"performance":[147],"terms":[149],"effectiveness":[152],"security.":[154]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
