, Alphabet Inc.: Alphabet Announces Fourth Quarter and Fiscal, 2018.

R. Amadeo, Google's iron grip on Android: Controlling open source by any means necessary, 2018.

S. A. Anand and N. Saxena, Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors, 2018 IEEE Symposium on Security and Privacy, pp.1000-1017, 2018.

L. Aneja and S. Babbar, Research Trends in Malware Detection on Android Devices, Data Science and Analytics, pp.629-642, 2018.

J. Angwin and J. Valentino-devries, Apple, Google Collect User Data, 2011.

, Anonymous: YouTube user demonstrating how Facebook listens to conversations to serve ads, 2017.

B. A. Arcas, Now Playing: Continuous low-power music recognition, ArXiv Comput. Res. Repos, 2017.

D. Arp, Privacy Threats through Ultrasonic Side Channels on Mobile Devices, 2017 IEEE European Symposium on Security and Privacy (EuroS&P), pp.35-47, 2017.

J. Ball, Angry Birds and "leaky" phone apps targeted by NSA and GCHQ for user data, 2014.

, BBC News Services: Is your phone listening in? Your stories, 2017.

D. Beres, How To Stop Your Smart TV From Eavesdropping On You, 2015.

V. Bocek and N. Chrysaidos, Android devices ship with pre-installed malware, 2018.

I. Bogost, FaceTime Is Eroding Trust in Tech, 2019.

A. J. Brown, United States v. Oliva (United States Court of Appeals, 2012.

W. Christl, Corporate Surveillance in Everyday Life, Cracked Labs, 2017.

W. Christl and S. Spiekermann, Networks of Control: A Report on Corporate Surveillance, Digital Tracking, Big Data & Privacy. Facultas, 2016.

A. Cimitile, Machine Learning Meets iOS Malware: Identifying Malicious Applications on Apple Environment: In: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, pp.487-492, 2017.

N. Cummins, Speech analysis for health: Current state-of-the-art and the increasing impact of deep learning, Methods, 2018.

S. V. Dusan, System and Method of Detecting a User's Voice Activity Using an Accelerometer, 2014.

K. K. Edara, Keyword Determinations from Voice Data (Patent No, 2014.

. Facebook, Facebook Reports Fourth Quarter and Full, 2018.

A. P. Felt, Android Permissions: User Attention, Comprehension, and Behavior, Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS '12)

, , 2012.

J. Fourniols, An Overview of Basics Speech Recognition and Autonomous Approach for Smart Home IOT Low Power Devices, J. Signal Inf. Process, vol.9, pp.239-257
URL : https://hal.archives-ouvertes.fr/hal-01916886

K. Freytas-tamura and . De, The Bright-Eyed Talking Doll That Just Might Be a Spy, 2018.

S. Fussell, Behind Every Robot Is a Human, 2019.

S. Ganjoo, Is Facebook secretly listening your conversations? New report says yes, security experts say no proof, 2018.

G. Gao and M. Chow, Android Applications, Can You Trust Google Play on These, 2016.

P. Gharani, An Artificial Neural Network for Gait Analysis to Estimate Blood Alcohol Content Level, Google: Android 9 Pie, 2017.

A. Greenberg, The Gyroscopes in Your Phone Could Let Apps Eavesdrop on Conversations, 2014.

P. Grosche, Multimodal Music Processing. Dagstuhl Follow-Ups, 2012.

J. L. Hale, Does Your Smartphone Listen To You? A New Study Debunked This Common Conspiracy, 2018.

J. Han, ACComplice: Location inference using accelerometers on smartphones, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS), pp.1-9, 2012.

J. Han, PitchIn: Eavesdropping via Intelligible Speech Reconstruction using Non-Acoustic Sensor Fusion, Proceedings of the 16th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), pp.181-192, 2017.

N. W. Hashim, Evaluation of Voice Acoustics as Predictors of Clinical Depression Scores, J. Voice, vol.31, p.6, 2017.

B. Hassan, 1 in 5 Aussies convinced their smartphone is spying on them, 2018.

Y. He, Dynamic Privacy Leakage Analysis of Android Third-Party Libraries, 1st International Conference on Data Intelligence and Security (ICDIS), pp.275-280, 2018.

F. Khatibloo, Is Facebook Listening (And So What If They Are, 2017.

Z. Kleinman, Is your smartphone listening to you, 2016.

J. Kröger, Unexpected Inferences from Sensor Data: A Hidden Privacy Threat in the Internet of Things, Internet of Things. Information Processing in an Increasingly Connected World, pp.147-159, 2019.

J. L. Kröger, Privacy Implications of Accelerometer Data: A Review of Possible Inferences, Proceedings of the 3rd International Conference on Cryptography, Security and Privacy (ICCSP), 2019.

,

D. Lee, Google admits error over hidden microphone, 2019.

X. Liu, Discovering and Understanding Android Sensor Usage Behaviors with Data Flow Analysis, World Wide Web, vol.21, pp.105-126, 2018.

N. Lomas, Uber to end controversial post-trip tracking as part of privacy drive, 2017.

S. Maheshwari, That Game on Your Phone May Be Tracking What You're Watching on TV, 2017.

A. Mannini, Activity recognition using a single accelerometer placed at the wrist or ankle, Med Sci Sport Exer, vol.45, pp.2193-2203, 2013.

,

B. Marczak, Hacking Team and the Targeting of Ethiopian Journalists, 2014.

C. J. Marra, Ranking of News Feed in a Mobile Device Based on Local Signals (Pub. No.: US20170351675A1), 2017.

A. G. Martínez, Facebook's Not Listening Through Your Phone, 2017.

. Mcafee, Net Losses: Estimating the Global Cost of Cybercrime. Center for Strategic and International Studies (CSIS), 2014.

M. Mclaren, The 2016 Speakers in the Wild Speaker Recognition Evaluation, Proceedings of the 16th Annual Conference of the International Speech Communication Association (INTERSPEECH), pp.823-827, 2016.

Y. Michalevsky, Gyrophone: Recognizing Speech from Gyroscope Signals, pp.1053-1067, 2014.

P. Mohapatra, Energy-efficient, Accelerometer-based Hotword Detection to Launch a Voice-control System, Patent No.: US20170316779A1), 2017.

I. Morris, Android Is Still Failing Where Apple's iOS Is Winning, 2018.

I. Naor, Breaking The Weakest Link Of The Strongest Chain, 2017.

S. Nichols and J. Morgans, Your Phone Is Listening and it's Not Paranoia, 2018.

E. Pan, Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications, Proc. Priv. Enhancing Technol, vol.4, pp.33-50, 2018.

,

N. Perlroth, Governments Turn to Commercial Spyware to Intimidate Dissidents, 2017.

T. Polzehl, Personality in Speech, 2015.

A. Quattrone, Inferring Sensitive Information from Seemingly Innocuous Smartphone Data, 2016.

M. Rahman, Search Rank Fraud and Malware Detection in Google Play, IEEE Trans. Knowl. Data Eng, vol.29, pp.1329-1342, 2017.

,

E. Ramirez, Data Brokers. A Call for Transparency and Accountability. Federal Trade Commission, 2014.

R. Ramirez, Cross-Device Tracking: An FTC Staff Report. Federal Trade Commission, 2017.

M. Rosenbach, iSpy: How the NSA Accesses Smartphone Data, 2013.

R. Schlegel, Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones, Proceedings of the Network and Distributed System Security Symposium (NDSS), 2011.

D. C. Schmidt, Google Data Collection. Digital Content Next, 2018.

S. Sidor, Exploring limits of covert data collection on Android: apps can take photos with your phone without you knowing, 2014.

. Statista, Global mobile OS market share in sales to end users from 1st quarter, vol.2, 2009.

J. Stern, Facebook Really Is Spying on You, Just Not Through Your Phone's Mic, 2018.

Q. Tang, Automated Detection of Puffing and Smoking with Wrist Accelerometers, Proceedings of the 8th International Conference on Pervasive Computing Technologies for Healthcare, pp.80-87, 2014.

P. Taylor, Smartphones can be taken over, 2015.

E. Thomaz, A practical approach for recognizing eating moments with wristmounted inertial sensing, Proceedings of the ACM International Conference on Ubiquitous Computing, pp.1029-1040, 2015.

,

C. Timberg, WikiLeaks: The CIA is using popular TVs, smartphones and cars to spy on their owners, 2017.

R. Triggs, No, your smartphone is not always listening to you, 2018.

H. Tsukayama and T. Romm, Lawmakers press Apple and Google to explain how they track and listen to users, 2018.

A. Yerukhimovich, Can Smartphones and Privacy Coexist? Assessing Technologies and Regulations Protecting Personal Data on Android and iOS Devices. MIT Lincoln Laboratory, 2016.

L. Zhang, AccelWord: Energy Efficient Hotword Detection through Accelerometer, Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys), pp.301-315, 2015.

,

, Phones Aren't Listening to Your Conversations, but May Be Recording In-App Videos: Study, 2018.