Live
Black Hat USAAI BusinessBlack Hat AsiaAI BusinessLess than a month: StrictlyVC San Francisco brings leaders from TDK Ventures, Replit, and more togetherTechCrunch AIA YouTuber channeled his distaste for the PS5’s design into slick console coversThe Verge AIThe end of 'shadow AI' at enterprises? Kilo launches KiloClaw for Organizations to enable secure AI agents at scaleVentureBeat AI"You Have Not Been a Good User" (LessWrong's second album)LessWrong AIWhy Cyber-Insurance and SOC 2 Audits Struggle with Small Tech Teams — And What a Structured Evidence Layer ChangesDEV CommunityA Code Authorship Analysis on the Claude Code Leak. What Was Found Doesn't Match Human or AI Code.DEV CommunityVanityH – Elegant Hyperscript DSL for Frontend Render FunctionsDEV Community“Prismo: Building an AI-Powered Parametric Insurance for Gig Workers | Hackathon Journey”DEV CommunityFrom Coin Toss to LLM — Understanding Random VariablesDEV Community7 Patterns That Stop Your AI Agent From Going Rogue in ProductionDEV CommunityI Let an AI Agent Run My Freelance Life. It Almost Burned It Down.DEV CommunityHow to Build an AI Agent That Tweets for You (Step by Step)DEV CommunityBlack Hat USAAI BusinessBlack Hat AsiaAI BusinessLess than a month: StrictlyVC San Francisco brings leaders from TDK Ventures, Replit, and more togetherTechCrunch AIA YouTuber channeled his distaste for the PS5’s design into slick console coversThe Verge AIThe end of 'shadow AI' at enterprises? Kilo launches KiloClaw for Organizations to enable secure AI agents at scaleVentureBeat AI"You Have Not Been a Good User" (LessWrong's second album)LessWrong AIWhy Cyber-Insurance and SOC 2 Audits Struggle with Small Tech Teams — And What a Structured Evidence Layer ChangesDEV CommunityA Code Authorship Analysis on the Claude Code Leak. What Was Found Doesn't Match Human or AI Code.DEV CommunityVanityH – Elegant Hyperscript DSL for Frontend Render FunctionsDEV Community“Prismo: Building an AI-Powered Parametric Insurance for Gig Workers | Hackathon Journey”DEV CommunityFrom Coin Toss to LLM — Understanding Random VariablesDEV Community7 Patterns That Stop Your AI Agent From Going Rogue in ProductionDEV CommunityI Let an AI Agent Run My Freelance Life. It Almost Burned It Down.DEV CommunityHow to Build an AI Agent That Tweets for You (Step by Step)DEV Community

TAAC: A gate into Trustable Audio Affective Computing

arXivMarch 26, 202610 min read0 views
Source Quiz

With the emergence of AI techniques for depression diagnosis, the conflict between high demand and limited supply for depression screening has been significantly alleviated. Among various modal data, audio-based depression diagnosis has received increasing attention from both academia and industry since audio is the most common carrier of emotion transmission. Unfortunately, audio data also contains User-sensitive Identity Information (ID), which is extremely vulnerable and may be maliciously used during the smart diagnosis process. Among previous methods, the clarification between depression — Xintao Hu, Feng-Qi Cui

View PDF HTML (experimental)

Abstract:With the emergence of AI techniques for depression diagnosis, the conflict between high demand and limited supply for depression screening has been significantly alleviated. Among various modal data, audio-based depression diagnosis has received increasing attention from both academia and industry since audio is the most common carrier of emotion transmission. Unfortunately, audio data also contains User-sensitive Identity Information (ID), which is extremely vulnerable and may be maliciously used during the smart diagnosis process. Among previous methods, the clarification between depression features and sensitive features has always serve as a barrier. It is also critical to the problem for introducing a safe encryption methodology that only encrypts the sensitive features and a powerful classifier that can correctly diagnose the depression. To track these challenges, by leveraging adversarial loss-based Subspace Decomposition, we propose a first practical framework \name presented for Trustable Audio Affective Computing, to perform automated depression detection through audio within a trustable environment. The key enablers of TAAC are Differentiating Features Subspace Decompositor (DFSD), Flexible Noise Encryptor (FNE) and Staged Training Paradigm, used for decomposition, ID encryption and performance enhancement, respectively. Extensive experiments with existing encryption methods demonstrate our framework's preeminent performance in depression detection, ID reservation and audio reconstruction. Meanwhile, the experiments across various setting demonstrates our model's stability under different encryption strengths. Thus proving our framework's excellence in Confidentiality, Accuracy, Traceability, and Adjustability.

Subjects:

Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)

Cite as: arXiv:2603.25570 [cs.CR]

(or arXiv:2603.25570v1 [cs.CR] for this version)

https://doi.org/10.48550/arXiv.2603.25570

arXiv-issued DOI via DataCite (pending registration)

Submission history

From: Axel Hu Mr [view email] [v1] Thu, 26 Mar 2026 15:43:19 UTC (1,399 KB)

Was this article helpful?

Sign in to highlight and annotate this article

AI
Ask AI about this article
Powered by AI News Hub · full article context loaded
Ready

Conversation starters

Ask anything about this article…

Daily AI Digest

Get the top 5 AI stories delivered to your inbox every morning.

More about

researchpaperarxiv

Knowledge Map

Knowledge Map
TopicsEntitiesSource
TAAC: A gat…researchpaperarxivaiartificial-…arXiv

Connected Articles — Knowledge Graph

This article is connected to other articles through shared AI topics and tags.

Knowledge Graph100 articles · 188 connections
Scroll to zoom · drag to pan · click to open

Discussion

Sign in to join the discussion

No comments yet — be the first to share your thoughts!

More in Research Papers