{"id":"https://openalex.org/W3044082017","doi":"https://doi.org/10.1145/3395351.3399357","title":"Fingerprinting encrypted voice traffic on smart speakers with deep learning","display_name":"Fingerprinting encrypted voice traffic on smart speakers with deep learning","publication_year":2020,"publication_date":"2020-07-08","ids":{"openalex":"https://openalex.org/W3044082017","doi":"https://doi.org/10.1145/3395351.3399357","mag":"3044082017"},"language":"en","primary_location":{"id":"doi:10.1145/3395351.3399357","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3395351.3399357","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100667781","display_name":"Chenggang Wang","orcid":"https://orcid.org/0000-0002-5514-6408"},"institutions":[{"id":"https://openalex.org/I63135867","display_name":"University of Cincinnati","ror":"https://ror.org/01e3m7079","country_code":"US","type":"education","lineage":["https://openalex.org/I63135867"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Chenggang Wang","raw_affiliation_strings":["University of Cincinnati"],"affiliations":[{"raw_affiliation_string":"University of Cincinnati","institution_ids":["https://openalex.org/I63135867"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112532593","display_name":"Se\u00e1n Kennedy","orcid":null},"institutions":[{"id":"https://openalex.org/I63135867","display_name":"University of Cincinnati","ror":"https://ror.org/01e3m7079","country_code":"US","type":"education","lineage":["https://openalex.org/I63135867"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sean Kennedy","raw_affiliation_strings":["University of Cincinnati"],"affiliations":[{"raw_affiliation_string":"University of Cincinnati","institution_ids":["https://openalex.org/I63135867"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100363264","display_name":"Haipeng Li","orcid":"https://orcid.org/0000-0001-6443-6098"},"institutions":[{"id":"https://openalex.org/I63135867","display_name":"University of Cincinnati","ror":"https://ror.org/01e3m7079","country_code":"US","type":"education","lineage":["https://openalex.org/I63135867"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Haipeng Li","raw_affiliation_strings":["University of Cincinnati"],"affiliations":[{"raw_affiliation_string":"University of Cincinnati","institution_ids":["https://openalex.org/I63135867"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050525253","display_name":"King Hudson","orcid":null},"institutions":[{"id":"https://openalex.org/I63135867","display_name":"University of Cincinnati","ror":"https://ror.org/01e3m7079","country_code":"US","type":"education","lineage":["https://openalex.org/I63135867"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"King Hudson","raw_affiliation_strings":["University of Cincinnati"],"affiliations":[{"raw_affiliation_string":"University of Cincinnati","institution_ids":["https://openalex.org/I63135867"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047757229","display_name":"Gowtham Atluri","orcid":"https://orcid.org/0000-0001-5619-6688"},"institutions":[{"id":"https://openalex.org/I63135867","display_name":"University of Cincinnati","ror":"https://ror.org/01e3m7079","country_code":"US","type":"education","lineage":["https://openalex.org/I63135867"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gowtham Atluri","raw_affiliation_strings":["University of Cincinnati"],"affiliations":[{"raw_affiliation_string":"University of Cincinnati","institution_ids":["https://openalex.org/I63135867"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003379167","display_name":"Xuetao Wei","orcid":"https://orcid.org/0000-0002-4450-2251"},"institutions":[{"id":"https://openalex.org/I3045169105","display_name":"Southern University of Science and Technology","ror":"https://ror.org/049tv2d57","country_code":"CN","type":"education","lineage":["https://openalex.org/I3045169105"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuetao Wei","raw_affiliation_strings":["Southern University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Southern University of Science and Technology, China","institution_ids":["https://openalex.org/I3045169105"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045191954","display_name":"Wenhai Sun","orcid":"https://orcid.org/0000-0003-0458-0092"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wenhai Sun","raw_affiliation_strings":["Purdue University"],"affiliations":[{"raw_affiliation_string":"Purdue University","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100725035","display_name":"Boyang Wang","orcid":"https://orcid.org/0000-0001-8973-2328"},"institutions":[{"id":"https://openalex.org/I63135867","display_name":"University of Cincinnati","ror":"https://ror.org/01e3m7079","country_code":"US","type":"education","lineage":["https://openalex.org/I63135867"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Boyang Wang","raw_affiliation_strings":["University of Cincinnati"],"affiliations":[{"raw_affiliation_string":"University of Cincinnati","institution_ids":["https://openalex.org/I63135867"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5100667781"],"corresponding_institution_ids":["https://openalex.org/I63135867"],"apc_list":null,"apc_paid":null,"fwci":5.28694375,"has_fulltext":false,"cited_by_count":51,"citation_normalized_percentile":{"value":0.95823706,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"254","last_page":"265"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8395119309425354},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7830967903137207},{"id":"https://openalex.org/keywords/echo","display_name":"Echo (communications protocol)","score":0.7393248081207275},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6452546119689941},{"id":"https://openalex.org/keywords/voice-command-device","display_name":"Voice command device","score":0.4615706205368042},{"id":"https://openalex.org/keywords/traffic-analysis","display_name":"Traffic analysis","score":0.42786404490470886},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40494585037231445},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.3552035093307495},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3429355025291443}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8395119309425354},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7830967903137207},{"id":"https://openalex.org/C2779426996","wikidata":"https://www.wikidata.org/wiki/Q18389128","display_name":"Echo (communications protocol)","level":2,"score":0.7393248081207275},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6452546119689941},{"id":"https://openalex.org/C178718744","wikidata":"https://www.wikidata.org/wiki/Q2350070","display_name":"Voice command device","level":2,"score":0.4615706205368042},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.42786404490470886},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40494585037231445},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.3552035093307495},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3429355025291443}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3395351.3399357","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3395351.3399357","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6299999952316284,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G8598417444","display_name":null,"funder_award_id":"1947913","funder_id":"https://openalex.org/F4320315254","funder_display_name":"Innovative Research Group Project of the National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320315254","display_name":"Innovative Research Group Project of the National Natural Science Foundation of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2100805904","https://openalex.org/W2888096149","https://openalex.org/W2919115771","https://openalex.org/W3027485588","https://openalex.org/W3103349363","https://openalex.org/W3107803931"],"related_works":["https://openalex.org/W1473737476","https://openalex.org/W4388150944","https://openalex.org/W2949162897","https://openalex.org/W2061432289","https://openalex.org/W2276571074","https://openalex.org/W4242235492","https://openalex.org/W3166874438","https://openalex.org/W4289314221","https://openalex.org/W4206366499","https://openalex.org/W2343460230"],"abstract_inverted_index":{"This":[0],"paper":[1],"investigates":[2],"the":[3,86],"privacy":[4,91],"leakage":[5],"of":[6,35],"smart":[7,37,66],"speakers":[8],"under":[9],"an":[10,24,53],"encrypted":[11,32,48,109],"traffic":[12,34,56,110],"analysis":[13],"attack,":[14,23],"referred":[15],"to":[16,95],"as":[17],"voice":[18,33,42,55,106],"command":[19,43],"fingerprinting.":[20],"In":[21],"this":[22],"adversary":[25],"can":[26,103],"eavesdrop":[27],"both":[28],"outgoing":[29],"and":[30,39,59,70],"incoming":[31],"a":[36,44],"speaker,":[38],"infers":[40],"which":[41],"user":[45],"says":[46],"over":[47,85,108],"traffic.":[49],"We":[50],"first":[51],"built":[52],"automatic":[54],"collection":[57],"tool":[58],"collected":[60],"two":[61,65,87],"large-scale":[62],"datasets":[63,88],"on":[64,114],"speakers,":[67],"Amazon":[68,115],"Echo":[69],"Google":[71],"Home.":[72],"Then,":[73],"we":[74],"implemented":[75],"proof-of-concept":[76],"attacks":[77,102],"by":[78],"leveraging":[79],"deep":[80],"learning.":[81],"Our":[82],"experimental":[83],"results":[84],"indicate":[89],"disturbing":[90],"concerns.":[92],"Specifically,":[93],"compared":[94],"1%":[96],"accuracy":[97,113],"with":[98,111],"random":[99],"guess,":[100],"our":[101],"correctly":[104],"infer":[105],"commands":[107],"92.89%":[112],"Echo.":[116]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":15},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":1}],"updated_date":"2026-02-15T07:36:51.736424","created_date":"2025-10-10T00:00:00"}
