{"id":"https://openalex.org/W7118761874","doi":"https://doi.org/10.48550/arxiv.2601.01239","title":"IO-RAE: Information-Obfuscation Reversible Adversarial Example for Audio Privacy Protection","display_name":"IO-RAE: Information-Obfuscation Reversible Adversarial Example for Audio Privacy Protection","publication_year":2026,"publication_date":"2026-01-03","ids":{"openalex":"https://openalex.org/W7118761874","doi":"https://doi.org/10.48550/arxiv.2601.01239"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2601.01239","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.01239","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2601.01239","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5122132898","display_name":"Jiajie Zhu","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Zhu, Jiajie","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122251523","display_name":"Xia Du","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Du, Xia","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122073294","display_name":"Xiaoyuan Liu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liu, Xiaoyuan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122077834","display_name":"Jizhe Zhou","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhou, Jizhe","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054177489","display_name":"Qizhen Xu","orcid":"https://orcid.org/0000-0001-9048-8887"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xu, Qizhen","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122022864","display_name":"Zheng Lin","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lin, Zheng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5122173398","display_name":"Chi-Man Pun","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Pun, Chi-Man","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5122132898"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.7250999808311462,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.7250999808311462,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.043699998408555984,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.03269999846816063,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.7311000227928162},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6721000075340271},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.4715999960899353},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.43369999527931213},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.4154999852180481},{"id":"https://openalex.org/keywords/lossless-compression","display_name":"Lossless compression","score":0.35679998993873596},{"id":"https://openalex.org/keywords/sound-quality","display_name":"Sound quality","score":0.3513999879360199},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.3434999883174896}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7799000144004822},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.7311000227928162},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6721000075340271},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5184000134468079},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.4715999960899353},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.4496000111103058},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.43369999527931213},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.4154999852180481},{"id":"https://openalex.org/C81081738","wikidata":"https://www.wikidata.org/wiki/Q55542","display_name":"Lossless compression","level":3,"score":0.35679998993873596},{"id":"https://openalex.org/C167310288","wikidata":"https://www.wikidata.org/wiki/Q7564808","display_name":"Sound quality","level":2,"score":0.3513999879360199},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.3434999883174896},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.29649999737739563},{"id":"https://openalex.org/C180591934","wikidata":"https://www.wikidata.org/wiki/Q1253369","display_name":"Downtime","level":2,"score":0.28850001096725464},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.28450000286102295},{"id":"https://openalex.org/C40969351","wikidata":"https://www.wikidata.org/wiki/Q3516228","display_name":"Word error rate","level":2,"score":0.2818000018596649},{"id":"https://openalex.org/C64922751","wikidata":"https://www.wikidata.org/wiki/Q4650799","display_name":"Audio signal","level":3,"score":0.2816999852657318},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2734000086784363},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27239999175071716},{"id":"https://openalex.org/C2779843651","wikidata":"https://www.wikidata.org/wiki/Q7390335","display_name":"SIGNAL (programming language)","level":2,"score":0.2630999982357025},{"id":"https://openalex.org/C2780771206","wikidata":"https://www.wikidata.org/wiki/Q3271761","display_name":"Safeguard","level":2,"score":0.25459998846054077},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.25450000166893005},{"id":"https://openalex.org/C177291462","wikidata":"https://www.wikidata.org/wiki/Q423038","display_name":"Active listening","level":2,"score":0.250900000333786},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.25049999356269836}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2601.01239","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.01239","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2601.01239","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.01239","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"score":0.8187533020973206,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"rapid":[1],"advancements":[2],"in":[3,26,154,222],"artificial":[4],"intelligence":[5],"have":[6],"significantly":[7],"accelerated":[8],"the":[9,61,100,120,135,170,173,178,193,213],"adoption":[10],"of":[11,122,137,145,172,181,204,218],"speech":[12],"recognition":[13],"technology,":[14],"leading":[15],"to":[16,38,65,78,188],"its":[17,127],"widespread":[18],"integration":[19],"across":[20,158],"various":[21],"applications.":[22],"However,":[23],"this":[24],"surge":[25],"usage":[27],"also":[28],"highlights":[29],"a":[30,141,148,163],"critical":[31],"issue:":[32],"audio":[33,67,123,195,225],"data":[34,124],"is":[35],"highly":[36],"vulnerable":[37],"unauthorized":[39,87],"exposure":[40],"and":[41,49,91,109,147,216],"analysis,":[42],"posing":[43],"significant":[44],"privacy":[45,68],"risks":[46],"for":[47],"businesses":[48],"individuals.":[50],"This":[51],"paper":[52],"introduces":[53],"an":[54,201],"Information-Obfuscation":[55],"Reversible":[56],"Adversarial":[57],"Example":[58],"(IO-RAE)":[59],"framework,":[60],"pioneering":[62],"method":[63],"designed":[64],"safeguard":[66],"using":[69],"reversible":[70],"adversarial":[71],"examples.":[72],"IO-RAE":[73,220],"leverages":[74],"large":[75],"language":[76],"models":[77],"generate":[79],"misleading":[80],"yet":[81],"contextually":[82],"coherent":[83],"content,":[84],"effectively":[85],"preventing":[86],"eavesdropping":[88],"by":[89,113,177,197],"humans":[90],"Automatic":[92],"Speech":[93,182],"Recognition":[94],"(ASR)":[95],"systems.":[96],"Additionally,":[97],"we":[98],"propose":[99],"Cumulative":[101],"Signal":[102],"Attack":[103],"technique,":[104],"which":[105],"mitigates":[106],"high-frequency":[107],"noise":[108],"enhances":[110],"attack":[111],"efficacy":[112],"targeting":[114],"low-frequency":[115],"signals.":[116],"Our":[117],"approach":[118],"ensures":[119],"protection":[121],"without":[125],"degrading":[126],"quality":[128,171],"or":[129],"our":[130,138,219],"ability.":[131],"Experimental":[132],"evaluations":[133],"demonstrate":[134],"superiority":[136],"method,":[139],"achieving":[140],"targeted":[142],"misguidance":[143,152],"rate":[144,153,203],"96.5%":[146],"remarkable":[149],"100%":[150],"untargeted":[151],"obfuscating":[155],"target":[156],"keywords":[157],"multiple":[159],"ASR":[160,198],"models,":[161],"including":[162],"commercial":[164],"black-box":[165],"system":[166],"from":[167],"Google.":[168],"Furthermore,":[169],"recovered":[174,194],"audio,":[175],"measured":[176],"Perceptual":[179],"Evaluation":[180],"Quality":[183],"score,":[184],"reached":[185],"4.45,":[186],"comparable":[187],"high-quality":[189],"original":[190],"recordings.":[191],"Notably,":[192],"processed":[196],"systems":[199],"exhibited":[200],"error":[202],"0%,":[205],"indicating":[206],"nearly":[207],"lossless":[208],"recovery.":[209],"These":[210],"results":[211],"highlight":[212],"practical":[214],"applicability":[215],"effectiveness":[217],"framework":[221],"protecting":[223],"sensitive":[224],"privacy.":[226]},"counts_by_year":[],"updated_date":"2026-01-08T20:10:11.968330","created_date":"2026-01-08T00:00:00"}
