{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T12:26:01Z","timestamp":1725020761340},"reference-count":65,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62001100"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Audio Speech Lang. Process."],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/taslp.2023.3267610","type":"journal-article","created":{"date-parts":[[2023,4,17]],"date-time":"2023-04-17T18:12:02Z","timestamp":1681755122000},"page":"1574-1586","source":"Crossref","is-referenced-by-count":2,"title":["Device Features Based on Linear Transformation With Parallel Training Data for Replay Speech Detection"],"prefix":"10.1109","volume":"31","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-2329-895X","authenticated-orcid":false,"given":"Longting","family":"Xu","sequence":"first","affiliation":[{"name":"College of Information Science and Technology, Donghua University, Shanghai, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4954-8398","authenticated-orcid":false,"given":"Jichen","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Cyber Security, Guangdong Polytechnic Normal University, Guangzhou, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7884-8800","authenticated-orcid":false,"given":"Chang Huai","family":"You","sequence":"additional","affiliation":[{"name":"Institute for Infocomm Research, A*STAR, Singapore"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9511-6713","authenticated-orcid":false,"given":"Xinyuan","family":"Qian","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4957-8677","authenticated-orcid":false,"given":"Daiyu","family":"Huang","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Donghua University, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2019.02.018"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1506","DOI":"10.1109\/TASLP.2014.2333242","article-title":"Exemplar-based sparse representation with residual compensation for voice conversion","volume":"22","author":"wu","year":"2014","journal-title":"IEEE\/ACM Trans Audio Speech Lang Process"},{"key":"ref56","first-page":"29","article-title":"Known-unknown data augmentation strategies for detection of logical acces, physical access and speech deepfake attacks: ASVspoof 2021","author":"das","year":"0","journal-title":"Proc ISCA 2021 Ed ASVspoof"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2012.2227735"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2015.05.002"},{"key":"ref58","first-page":"2135","article-title":"CNTK:Microsoft's open-source deep learning toolkit","author":"seide","year":"0","journal-title":"Proc ACM SIGKDD Int Conf Knowledge Discovery and Data Mining"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2017.2723721"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2019.2946897"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1049\/el.2018.0739"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-2170"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2009.2038663"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-2279"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2012.2227740"},{"key":"ref17","first-page":"12","article-title":"Novel variable length teager engery separation based on instantaneous frequency features for replay detection","author":"patil","year":"0","journal-title":"Proc 18th Annu Conf Int Speech Commun Assoc"},{"key":"ref16","first-page":"22","article-title":"Spoof detection using source, instantaneous frequecny and cepstral features","author":"jelil","year":"0","journal-title":"Proc 18th Annu Conf Int Speech Commun Assoc"},{"key":"ref19","first-page":"107","article-title":"SEF anti-spoofer: IIIT-H submission for automatic speaker verificatio spoofing and countermeasures channlenge 2017","author":"alluri","year":"0","journal-title":"Proc 18th Annu Conf Int Speech Commun Assoc"},{"key":"ref18","first-page":"97","article-title":"Replay attack detection using DNN for channel discrimination","author":"nagarshenth","year":"0","journal-title":"Proc 18th Annu Conf Int Speech Commun Assoc"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3082303"},{"key":"ref50","first-page":"1068","article-title":"A light convolutional GRU-RNN deep feature extractor for ASV spoofing detection","author":"alanis","year":"0","journal-title":"Proc 20th Annu Conf Int Speech Commun Assoc"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1980.1163420"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1121\/1.400476"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.21437\/ASVSPOOF.2021-3"},{"key":"ref47","first-page":"1043","article-title":"IIIT-H spoofing countermeasures for automatic speaker verification spoofing and countermesures challenge 2019","author":"alluri","year":"0","journal-title":"Proc 20th Annu Conf Int Speech Commun Assoc"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2017.01.001"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.21437\/ASVSPOOF.2021-8"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1978.1170547"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2020.3011320"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2017-360"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2009.2016394"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2012.2201472"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2011.2165280"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2017-1111"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7953187"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-2137"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1049\/el.2019.1025"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-2249"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-2001"},{"key":"ref34","first-page":"87","article-title":"Ensemble learning for countermeasure of audio repaly spoofing attack in ASVspoof2017","author":"ji","year":"0","journal-title":"Proc 18th Annu Conf Int Speech Commun Assoc"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-1693"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.apacoust.2019.107017"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2017-1085"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2017.01.001"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2018-42"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2017-304"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1049\/el.2019.1264"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2009.08.009"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2964048"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2956589"},{"key":"ref24","first-page":"27","article-title":"Audio replay attack detection using high-frequency features","author":"withowski","year":"0","journal-title":"Proc 17th Annu Conf Int Speech Commun Assoc"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-1297"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-1574"},{"key":"ref25","first-page":"686","article-title":"Decision-level feature switching as a paradigm for replay attack detection","author":"s","year":"0","journal-title":"Proc 19th Annu Conf Int Speech Commun Assoc"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9414234"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-1687"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2018-55"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-1651"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2015.7358783"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-1675"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-1473"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-1846"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2016-41"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3098058"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2010.2064307"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2684705"}],"container-title":["IEEE\/ACM Transactions on Audio, Speech, and Language Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570655\/9970249\/10103148.pdf?arnumber=10103148","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,15]],"date-time":"2023-05-15T18:47:58Z","timestamp":1684176478000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10103148\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":65,"URL":"https:\/\/doi.org\/10.1109\/taslp.2023.3267610","relation":{},"ISSN":["2329-9290","2329-9304"],"issn-type":[{"value":"2329-9290","type":"print"},{"value":"2329-9304","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}
  NODES