{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:07:57Z","timestamp":1742929677315,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030866075"},{"type":"electronic","value":"9783030866082"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-86608-2_50","type":"book-chapter","created":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T05:02:56Z","timestamp":1631163776000},"page":"458-465","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Attention Network with GMM Based Feature for ASV Spoofing Detection"],"prefix":"10.1007","author":[{"given":"Zhenchun","family":"Lei","sequence":"first","affiliation":[]},{"given":"Hui","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Yingen","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Minglei","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,8]]},"reference":[{"key":"50_CR1","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.specom.2014.10.005","volume":"66","author":"Z Wu","year":"2015","unstructured":"Wu, Z., Evans, N., Kinnunen, T., Yamagishi, J., Alegre, F., Li, H.: Spoofing and countermeasures for speaker verification: a survey. Speech Commun. 66, 130\u2013153 (2015)","journal-title":"Speech Commun."},{"key":"50_CR2","doi-asserted-by":"crossref","unstructured":"Kinnunen, T., Wu, Z.Z., Lee, K.A., Sedlak, F., Chng, E.S., Li, H.: Vulnerability of speaker verification systems against voice conversion spoofing attacks: The Case of telephone speech. In: IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP), pp. 4401\u20134404 (2012)","DOI":"10.1109\/ICASSP.2012.6288895"},{"key":"50_CR3","doi-asserted-by":"crossref","unstructured":"Lindberg, J., Blomberg, M.: Vulnerability in speaker verification\u2013a study of technical impostor techniques. In: European Conference on Speech Communication and Technology (1999)","DOI":"10.21437\/Eurospeech.1999-283"},{"key":"50_CR4","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.specom.2015.05.002","volume":"72","author":"RS Hautam\u00e4ki","year":"2015","unstructured":"Hautam\u00e4ki, R.S., et al.: Automatic versus human speaker verification: the case of voice mimicry. Speech Commun. 72, 13\u201331 (2015)","journal-title":"Speech Commun."},{"issue":"8","key":"50_CR5","doi-asserted-by":"publisher","first-page":"2222","DOI":"10.1109\/TASL.2007.907344","volume":"15","author":"T Toda","year":"2007","unstructured":"Toda, T., Black, A.W., Tokuda, K.: Voice conversion based on maximum-likelihood estimation of spectral parameter trajectory. IEEE Trans. Audio, Speech, Lang. Process. 15(8), 2222\u20132235 (2007)","journal-title":"IEEE Trans. Audio, Speech, Lang. Process."},{"key":"50_CR6","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.specom.2014.12.003","volume":"67","author":"J Galka","year":"2015","unstructured":"Galka, J., Grzywacz, M., Samborski, R.: Playback attack detection for text-dependent speaker verification over telephone channels. Speech Commun. 67, 143\u2013153 (2015)","journal-title":"Speech Commun."},{"key":"50_CR7","doi-asserted-by":"crossref","unstructured":"Sahidullah, M., Kinnunen, T., Hanilci, C.: A comparison of features for synthetic speech detection. In: Proceedings of the INTERSPEECH, pp. 2087\u20132091 (2015)","DOI":"10.21437\/Interspeech.2015-472"},{"key":"50_CR8","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1016\/j.csl.2017.01.001","volume":"45","author":"M Todisco","year":"2017","unstructured":"Todisco, M., Delgado, H., Evans, N.: Constant Q cepstral coefficients: a spoofing countermeasure for automatic speaker verification. Comput. Speech Lang. 45, 516\u2013535 (2017)","journal-title":"Comput. Speech Lang."},{"issue":"4","key":"50_CR9","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1109\/TASSP.1980.1163420","volume":"28","author":"SB Davis","year":"1980","unstructured":"Davis, S.B., Mermelstein, P.: Comparison of parametric representation for monosyllabic word recognition in continuously spoken sentences. IEEE Trans. Acoust. Speech Signal Process. 28(4), 357\u2013366 (1980)","journal-title":"IEEE Trans. Acoust. Speech Signal Process."},{"key":"50_CR10","doi-asserted-by":"crossref","unstructured":"Alegre, F., Amehraye, A., Evans, N.: A one-class classification approach to generalised speaker verification spoofing countermeasures using local binary patterns. In: IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS). pp. 1\u20138 (2013)","DOI":"10.1109\/BTAS.2013.6712706"},{"key":"50_CR11","doi-asserted-by":"crossref","unstructured":"Lavrentyeva, G., Novoselov, S., Malykh, E., Kozlov, A., Kudashev, O., Shchemelinin, V.: Audio replay attack detection with deep learning frameworks. In: INTERSPEECH, pp. 82\u201386 (2017)","DOI":"10.21437\/Interspeech.2017-360"},{"key":"50_CR12","doi-asserted-by":"crossref","unstructured":"Gomez-Alanis, A., Peinado, A.M., Gonzalez, J.A., Gomez, A.M.: A light convolutional GRU-RNN deep feature extractor for ASV spoofing detection. In: INTERSPEECH, pp. 1068\u20131072 (2019)","DOI":"10.21437\/Interspeech.2019-2212"},{"key":"50_CR13","doi-asserted-by":"crossref","unstructured":"Alzantot, M., Wang, Z., Srivastava, M.B.: Deep residual neural networks for audio spoofing detection. In: INTERSPEECH, pp. 1078\u20131082 (2019)","DOI":"10.21437\/Interspeech.2019-3174"},{"key":"50_CR14","doi-asserted-by":"crossref","unstructured":"Lai, C-I., Abad, A., Richmond, K., Yamagishi, J., Dehak, N., King, S.: Attentive filtering networks for audio replay attack detection. In: ICASSP, pp. 6316\u20136320 (2019)","DOI":"10.1109\/ICASSP.2019.8682640"},{"key":"50_CR15","unstructured":"Vaswani, A., et al.: Attention is all you need. arXiv preprint arXiv:1706.03762 (2017)"},{"key":"50_CR16","doi-asserted-by":"crossref","unstructured":"Tom, F., Jain, M., Dey, P.: End-to-end audio replay attack detection using deep convolutional networks with attention. In: INTERSPEECH, pp. 681\u2013685 (2018)","DOI":"10.21437\/Interspeech.2018-2279"},{"key":"50_CR17","doi-asserted-by":"crossref","unstructured":"Lai, C., Chen, N., Villalba, J., Dehak, N.: ASSERT: anti-spoofing with squeeze-excitation and residual networks. In: INTERSPEECH (2019)","DOI":"10.21437\/Interspeech.2019-1794"},{"key":"50_CR18","doi-asserted-by":"crossref","unstructured":"Todisco, M., et al.: ASVspoof 2019: future horizons in spoofed and fake audio detection. In: INTERSPEECH (2019)","DOI":"10.21437\/Interspeech.2019-2249"},{"key":"50_CR19","unstructured":"Sadjadi, S.O., et al.: MSR Identity Toolbox v1.0: A MATLAB toolbox for speaker recognition research. Speech and Lang. Process. Tech. Committee Newsl. (2013)"}],"container-title":["Lecture Notes in Computer Science","Biometric Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-86608-2_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T21:44:11Z","timestamp":1673214251000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-86608-2_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030866075","9783030866082"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-86608-2_50","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"8 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CCBR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Biometric Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccbr2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ccbr99.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"74% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.1","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Full papers are up to 11 pages long.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}