{"id":"https://openalex.org/W4414760819","doi":"https://doi.org/10.1145/3711875.3729142","title":"SecHeadset: A Practical Privacy Protection System for Real-time Voice Communication","display_name":"SecHeadset: A Practical Privacy Protection System for Real-time Voice Communication","publication_year":2025,"publication_date":"2025-06-23","ids":{"openalex":"https://openalex.org/W4414760819","doi":"https://doi.org/10.1145/3711875.3729142"},"language":"en","primary_location":{"id":"doi:10.1145/3711875.3729142","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3711875.3729142","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3711875.3729142","source":null,"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 23rd Annual International Conference on Mobile Systems, Applications and Services","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3711875.3729142","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100644447","display_name":"Peng Huang","orcid":"https://orcid.org/0000-0002-4379-8871"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Peng Huang","raw_affiliation_strings":["The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, Zhejiang, China"],"raw_orcid":"https://orcid.org/0000-0002-4379-8871","affiliations":[{"raw_affiliation_string":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, Zhejiang, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012194957","display_name":"Kun Pan","orcid":"https://orcid.org/0009-0006-8931-2546"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kun Pan","raw_affiliation_strings":["The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, Zhejiang, China"],"raw_orcid":"https://orcid.org/0009-0006-8931-2546","affiliations":[{"raw_affiliation_string":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, Zhejiang, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100603533","display_name":"Qinglong Wang","orcid":"https://orcid.org/0000-0002-7265-0497"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qinglong Wang","raw_affiliation_strings":["Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, Hangzhou, Zhejiang, China","The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, Zhejiang, China"],"raw_orcid":"https://orcid.org/0000-0002-7265-0497","affiliations":[{"raw_affiliation_string":"Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, Hangzhou, Zhejiang, China","institution_ids":[]},{"raw_affiliation_string":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, Zhejiang, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111090174","display_name":"Peng Cheng","orcid":"https://orcid.org/0000-0002-4453-2274"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peng Cheng","raw_affiliation_strings":["Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, Hangzhou, Zhejiang, China","The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, Zhejiang, China"],"raw_orcid":"https://orcid.org/0000-0002-4453-2274","affiliations":[{"raw_affiliation_string":"Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, Hangzhou, Zhejiang, China","institution_ids":[]},{"raw_affiliation_string":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, Zhejiang, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100658678","display_name":"Li L\u00fc","orcid":"https://orcid.org/0000-0001-5230-3749"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Lu","raw_affiliation_strings":["Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, Hangzhou, Zhejiang, China","The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, Zhejiang, China"],"raw_orcid":"https://orcid.org/0000-0001-5230-3749","affiliations":[{"raw_affiliation_string":"Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, Hangzhou, Zhejiang, China","institution_ids":[]},{"raw_affiliation_string":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, Zhejiang, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072485378","display_name":"Zhongjie Ba","orcid":"https://orcid.org/0000-0003-0921-8869"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhongjie Ba","raw_affiliation_strings":["Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, Hangzhou, Zhejiang, China","The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, Zhejiang, China"],"raw_orcid":"https://orcid.org/0000-0003-0921-8869","affiliations":[{"raw_affiliation_string":"Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, Hangzhou, Zhejiang, China","institution_ids":[]},{"raw_affiliation_string":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, Zhejiang, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5105297718","display_name":"Kui Ren","orcid":"https://orcid.org/0000-0002-1969-2591"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kui Ren","raw_affiliation_strings":["Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, Hangzhou, Zhejiang, China","The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, Zhejiang, China"],"raw_orcid":"https://orcid.org/0000-0002-1969-2591","affiliations":[{"raw_affiliation_string":"Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, Hangzhou, Zhejiang, China","institution_ids":[]},{"raw_affiliation_string":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, Zhejiang, China","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100644447"],"corresponding_institution_ids":["https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1367738,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"515","last_page":"527"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10860","display_name":"Speech and Audio Processing","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11309","display_name":"Music and Audio Processing","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.9275000095367432},{"id":"https://openalex.org/keywords/voice-communication","display_name":"Voice communication","score":0.5504999756813049},{"id":"https://openalex.org/keywords/masking","display_name":"Masking (illustration)","score":0.5030999779701233},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.42559999227523804},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.42340001463890076},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.40529999136924744},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.40299999713897705},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.375900000333786},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.3671000003814697}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.9275000095367432},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7613999843597412},{"id":"https://openalex.org/C2983306500","wikidata":"https://www.wikidata.org/wiki/Q52946","display_name":"Voice communication","level":2,"score":0.5504999756813049},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.5030999779701233},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4724000096321106},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.42559999227523804},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.42340001463890076},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41510000824928284},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.40529999136924744},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.40299999713897705},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.375900000333786},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.3671000003814697},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.36570000648498535},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.3418000042438507},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.3237000107765198},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3230000138282776},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.32190001010894775},{"id":"https://openalex.org/C133892786","wikidata":"https://www.wikidata.org/wiki/Q1145189","display_name":"Speaker recognition","level":2,"score":0.321399986743927},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.31949999928474426},{"id":"https://openalex.org/C101765175","wikidata":"https://www.wikidata.org/wiki/Q577764","display_name":"Communications system","level":2,"score":0.3156000077724457},{"id":"https://openalex.org/C204201278","wikidata":"https://www.wikidata.org/wiki/Q1332614","display_name":"Voice activity detection","level":3,"score":0.3125},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.2888000011444092},{"id":"https://openalex.org/C171246234","wikidata":"https://www.wikidata.org/wiki/Q81945","display_name":"Voice over IP","level":3,"score":0.2863999903202057},{"id":"https://openalex.org/C189693848","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information exchange","level":2,"score":0.2705000042915344},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.26669999957084656},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.2596000134944916},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.257999986410141},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.25780001282691956},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.25429999828338623}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3711875.3729142","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3711875.3729142","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3711875.3729142","source":null,"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 23rd Annual International Conference on Mobile Systems, Applications and Services","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3711875.3729142","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3711875.3729142","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3711875.3729142","source":null,"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 23rd Annual International Conference on Mobile Systems, Applications and Services","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2051114290","display_name":null,"funder_award_id":"62172359","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4528407810","display_name":null,"funder_award_id":"62472372","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5479196649","display_name":null,"funder_award_id":"2023YFB3107402","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G5554349683","display_name":null,"funder_award_id":"2023YFB3107402","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5691961865","display_name":null,"funder_award_id":"2023YFB2904001","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8569679628","display_name":null,"funder_award_id":"2023YFB2904000","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320338464","display_name":"Natural Science Foundation of Zhejiang Province","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4414760819.pdf","grobid_xml":"https://content.openalex.org/works/W4414760819.grobid-xml"},"referenced_works_count":19,"referenced_works":["https://openalex.org/W1494198834","https://openalex.org/W2067295501","https://openalex.org/W2696967604","https://openalex.org/W2942933909","https://openalex.org/W2963091184","https://openalex.org/W3037038648","https://openalex.org/W3094407996","https://openalex.org/W3127686677","https://openalex.org/W3163652268","https://openalex.org/W3210258439","https://openalex.org/W4210645695","https://openalex.org/W4232992964","https://openalex.org/W4249844008","https://openalex.org/W4284962505","https://openalex.org/W4292528167","https://openalex.org/W4324092325","https://openalex.org/W4389546188","https://openalex.org/W4403094337","https://openalex.org/W4405182249"],"related_works":[],"abstract_inverted_index":{"Voice":[0],"communication":[1,30,66,129,177],"is":[2,72],"convenient":[3],"while":[4,105,175],"also":[5,180],"poses":[6],"risks":[7],"of":[8,22,51,149,169],"privacy":[9,24],"leakage,":[10],"due":[11],"to":[12,39,43,172],"potential":[13],"interception":[14],"or":[15],"eavesdropping":[16],"during":[17,143],"voice":[18,23,65,69,93,98,141,166],"transmission.":[19],"Current":[20],"protections":[21],"are":[25],"almost":[26],"entirely":[27],"controlled":[28],"by":[29],"service":[31],"providers":[32],"(CSPs),":[33],"which":[34,71],"operate":[35],"as":[36],"a":[37,87,115,137,147],"black-box":[38],"users":[40],"thus":[41],"hard":[42],"fully":[44],"trust.":[45],"To":[46],"take":[47],"back":[48],"the":[49,165],"control":[50],"user":[52],"privacy,":[53],"in":[54],"this":[55,133],"paper,":[56],"we":[57,85,113,135],"introduce":[58],"SecHeadset,":[59],"an":[60],"end-to-end":[61],"solution":[62,80],"for":[63,92,140],"secure":[64,124],"based":[67],"on":[68,132],"obfuscation,":[70],"plug-and-play":[73],"and":[74,123,151,161,187],"compatible":[75],"with":[76,155,183],"various":[77,170],"CSPs.":[78],"Our":[79],"involves":[81],"two":[82,128],"parts.":[83],"First,":[84],"design":[86],"voice-like":[88],"noise":[89,109],"masking":[90],"scheme":[91],"obfuscation.":[94],"The":[95],"noise,":[96],"mimicking":[97],"characteristics,":[99],"could":[100],"effectively":[101],"obscure":[102],"users'":[103],"voices":[104],"demonstrating":[106],"resilience":[107],"against":[108],"reduction":[110],"methods.":[111],"Second,":[112],"develop":[114,146],"protocol":[116],"that":[117],"enables":[118],"efficient":[119],"channel":[120],"state":[121],"estimation":[122],"information":[125],"exchange":[126],"between":[127],"entities.":[130],"Based":[131],"information,":[134],"propose":[136],"lightweight":[138],"algorithm":[139],"retrieval":[142],"communication.":[144],"We":[145,179],"prototype":[148],"SecHeadset":[150,182],"evaluate":[152],"its":[153,189],"performance":[154],"8":[156],"widely-used":[157],"applications,":[158],"including":[159],"Telegram":[160],"Skype.":[162],"It":[163],"reduces":[164],"recognition":[167],"accuracy":[168],"adversaries":[171],"below":[173],"15%":[174],"maintaining":[176],"quality.":[178],"integrate":[181],"off-the-shelf":[184],"portable":[185],"devices":[186],"verify":[188],"real-world":[190],"effectiveness.":[191]},"counts_by_year":[],"updated_date":"2026-03-10T14:07:55.174380","created_date":"2025-10-10T00:00:00"}
