{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:05:49Z","timestamp":1730297149854,"version":"3.28.0"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T00:00:00Z","timestamp":1673222400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T00:00:00Z","timestamp":1673222400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,1,9]]},"DOI":"10.1109\/slt54892.2023.10022601","type":"proceedings-article","created":{"date-parts":[[2023,1,27]],"date-time":"2023-01-27T18:54:03Z","timestamp":1674845643000},"page":"912-919","source":"Crossref","is-referenced-by-count":9,"title":["Anonymizing Speech with Generative Adversarial Networks to Preserve Speaker Privacy"],"prefix":"10.1109","author":[{"given":"Sarina","family":"Meyer","sequence":"first","affiliation":[{"name":"Institute for Natural Language Processing (IMS), University of Stuttgart,Germany"}]},{"given":"Pascal","family":"Tilli","sequence":"additional","affiliation":[{"name":"Institute for Natural Language Processing (IMS), University of Stuttgart,Germany"}]},{"given":"Pavel","family":"Denisov","sequence":"additional","affiliation":[{"name":"Institute for Natural Language Processing (IMS), University of Stuttgart,Germany"}]},{"given":"Florian","family":"Lux","sequence":"additional","affiliation":[{"name":"Institute for Natural Language Processing (IMS), University of Stuttgart,Germany"}]},{"given":"Julia","family":"Koch","sequence":"additional","affiliation":[{"name":"Institute for Natural Language Processing (IMS), University of Stuttgart,Germany"}]},{"given":"Ngoc Thang","family":"Vu","sequence":"additional","affiliation":[{"name":"Institute for Natural Language Processing (IMS), University of Stuttgart,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-1333"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-2692"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2021-1070"},{"journal-title":"The VoicePri-vacy 2020 Challenge Evaluation Plan","year":"2020","author":"Tomashenko","key":"ref4"},{"journal-title":"Speaker Anonymization with Distribution-Preserving X-Vector Generation for the VoicePrivacy Challenge 2020","year":"2020","author":"Turner","key":"ref5"},{"key":"ref6","article-title":"Generative adversarial nets","volume":"27","author":"Goodfellow","year":"2014","journal-title":"NeurIPS"},{"key":"ref7","first-page":"7354","article-title":"Self-attention generative adversarial networks","volume-title":"ICML.","author":"Zhang","year":"2019"},{"key":"ref8","first-page":"214","article-title":"Wasser-stein generative adversarial networks","volume-title":"ICML.","author":"Arjovsky","year":"2017"},{"key":"ref9","article-title":"Improved training of wasserstein gans","volume":"30","author":"Gulrajani","year":"2017","journal-title":"NeurIPS"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00493"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3459992"},{"key":"ref12","article-title":"VoiceMask: Anonymize and Sanitize Voice Input on Mobile Devices","volume":"abs\/1711. 11460","author":"Qian","year":"2017","journal-title":"CoRR"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2960239"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SLT48900.2021.9383535"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2021.101315"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2022.03.010"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2021.101284"},{"journal-title":"Speaker De-identification Sys-tem using Autoencoders and Adversarial Training","year":"11 2020","author":"Espinoza-Cuadros","key":"ref18"},{"key":"ref19","article-title":"Speaker information modification in the VoicePrivacy 2020 toolchain","author":"Champion","year":"2020","journal-title":"Research report, INRIA Nancy, equipe Multispeech; LIUM-Laboratoire dInformatique de 1Universite du Mans"},{"article-title":"A Study of F0 Modification for X-Vector Based Speech Pseudo-Anonymization Across Gender","volume-title":"The Second AAAI Workshop on Privacy-Preserving Artificial Intelligence (PPAI)","author":"Champion","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2021.101326"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2022-39"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2022-10703"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3035416"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8461375"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.21437\/interspeech.2021-1712"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.21437\/interspeech.2020-2650"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2021-1573"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2020.3016498"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2763455"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-3015"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/DSLW51110.2021.9523402"},{"key":"ref33","article-title":"Speech-Brain: A General-Purpose Speech Toolkit","author":"Ravanelli","year":"2021","journal-title":"arXiv"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.21437\/blizzard.2023-4"},{"article-title":"FastSpeech 2: Fast and High-Quality End-to-End Text to Speech","volume-title":"International Conference on Learning Representations","author":"Ren","key":"ref35"},{"key":"ref36","article-title":"HiFi-GAN: Generative Adversarial Networks for Efficient and High Fidelity Speech Synthesis","volume":"33","author":"Kong","year":"2020","journal-title":"NeurIPS"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2019.101027"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.21437\/interspeech.2017-950"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.21437\/interspeech.2018-1929"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-2441"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178964"},{"journal-title":"CSTR VCTK Corpus: English Multi-speaker Corpus for CSTR Voice Cloning Toolkit (version 0. 92)","year":"2019","author":"Yamagishi","key":"ref43"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-2720"}],"event":{"name":"2022 IEEE Spoken Language Technology Workshop (SLT)","start":{"date-parts":[[2023,1,9]]},"location":"Doha, Qatar","end":{"date-parts":[[2023,1,12]]}},"container-title":["2022 IEEE Spoken Language Technology Workshop (SLT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10022052\/10022330\/10022601.pdf?arnumber=10022601","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T06:36:19Z","timestamp":1707806179000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10022601\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,9]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/slt54892.2023.10022601","relation":{},"subject":[],"published":{"date-parts":[[2023,1,9]]}}}