Paralinguistic Privacy Protection at the Edge

نویسندگان

چکیده

Voice user interfaces and digital assistants are rapidly entering our lives becoming singular touch points spanning devices. These always-on services capture transmit audio data to powerful cloud for further processing subsequent actions. Our voices raw signals collected through these devices contain a host of sensitive paralinguistic information that is transmitted service providers regardless deliberate or false triggers. As emotional patterns attributes like identity, gender, well-being easily inferred using deep acoustic models, we encounter new generation privacy risks by services. One approach mitigate the risk paralinguistic-based breaches exploit combination cloud-based with privacy-preserving, on-device learning filtering before transmitting voice data. In this article introduce EDGY , configurable, lightweight, disentangled representation framework transforms filters high-dimensional identify at edge prior offloading cloud. We evaluate EDGY’s performance explore optimization techniques, including model quantization knowledge distillation, enable private, accurate, efficient on resource-constrained results show runs in tens milliseconds 0.2% relative improvement “zero-shot” ABX score minimal penalties approximately 5.95% word error rate (WER) linguistic representations from signals, CPU single-core ARM processor without specialized hardware.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Ethics of Privacy Protection

THECONCEPT OF PRIVACY is a widely accepted legal and moral notion but has uncertain legal and philosophical foundations. Prominent legal accounts, such as the nonintrusion theory and the freedom to act theory, are inadequate. The control of information theory and the undocumented personal knowledge theory are philosophically better accounts but are open to counterexamples. A restricted access t...

متن کامل

Privacy Risk Perceptions and Privacy Protection Strategies

Several opinion polls have reported that many people claim to be concerned about their privacy, yet that most people in fact do very little to protect their privacy. Are privacy concerns indeed insufficient motivators to adopt privacy protection strategies? What then characterizes the users of these strategies? On the basis of a large scale survey amongst Dutch students, this paper explores the...

متن کامل

580 Protection of Privacy

Balyard had stopped off at the local personnel office for the name of a representative American in the neighborhood. The personnel machines had considered the problem and ejected the card of E. R. B. Hagstrohm, who was statistically average in every respect save for the number of his initials: his age (36), his height (5'7"), his weight (148 lbs.), his years of marriage (11), his I.Q. (83), the...

متن کامل

Wireless Location Privacy Protection

A fter more than two decades of hype, computing and communication technologies are finally converging. Java-enabled cell phones run a host of powerful applications including mobile Internet access, while many notebook computers offer high-speed wireless connectivity as a standard feature. The big decision when purchasing a PDA this holiday season is whether to get integrated cellular service or...

متن کامل

Privacy - DRM : Data Protection by Copy Protection ?

Protecting media contents and enforcing privacy policies seem to be related problems: mechanisms are needed to restrict data processing outside the copyright holder’s, respectively data subject’s, domain of control. A systematic analysis of requirements, properties, and experiences with digital rights management (DRM) reveals substantial differences between Content-DRM to protect media contents...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM transactions on privacy and security

سال: 2023

ISSN: ['2471-2574', '2471-2566']

DOI: https://doi.org/10.1145/3570161