{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:09:00Z","timestamp":1743073740764,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031483110"},{"type":"electronic","value":"9783031483127"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-48312-7_25","type":"book-chapter","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T20:03:21Z","timestamp":1700597001000},"page":"307-321","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Audio DeepFake Detection Employing Multiple Parametric Exponential Linear Units"],"prefix":"10.1007","author":[{"given":"Md Shahidul","family":"Alam","sequence":"first","affiliation":[]},{"given":"Abderrahim","family":"Fathan","sequence":"additional","affiliation":[]},{"given":"Jahangir","family":"Alam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,22]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Xiao, X., et al.: Spoofing speech detection using high dimensional magnitude and phase features: The NTU approach for asvspoof 2015 challenge. In: Proceedings of Interspeech (2015)","DOI":"10.21437\/Interspeech.2015-465"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Alam, J., Kenny, P.: Spoofing detection employing infinite impulse response-constant q transform-based feature representations. In: Proceedings of EUSIPCO, pp. 101\u2013105 (2017)","DOI":"10.23919\/EUSIPCO.2017.8081177"},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Alam, M.J., et al.: Spoofing detection on the asvspoof2015 challenge corpus employing deep neural networks. In: Proceedings of Odyssey, pp. 270\u2013276 (2016)","DOI":"10.21437\/Odyssey.2016-39"},{"key":"25_CR4","unstructured":"Chen, D., Xu, K.: AReLU: attention-based rectified linear unit. arXiv preprint arXiv:2006.13858 (2020)"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Chen, F., Deng, S., Zheng, T., He, Y., Han, J.: Graph-based spectro-temporal dependency modeling for anti-spoofing. In: IEEE ICASSP, pp. 1\u20135 (2023)","DOI":"10.1109\/ICASSP49357.2023.10096741"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Chen, T., et al.: Generalization of Audio Deepfake Detection. In: Proceedings of Odyssey, pp. 132\u2013137 (2020)","DOI":"10.21437\/Odyssey.2020-19"},{"key":"25_CR7","unstructured":"consortium, A.: ASVspoof 2019: automatic speaker verification spoofing and countermeasures challenge evaluation plan (2019). Accessed 13 May 2020. https:\/\/www.asvspoof.org\/asvspoof2019\/asvspoof2019_evaluation_plan.pdf"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Dubey, S.R., Singh, S.K., Chaudhuri, B.B.: Activation functions in deep learning: a comprehensive survey and benchmark. Neurocomput. 503, 92\u2013108 (2022). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0925231222008426","DOI":"10.1016\/j.neucom.2022.06.111"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"He, K., et al.: Delving deep into rectifiers: Surpassing human-level performance on ImageNet classification. arXiv preprint arxiv:1502.01852 (2015)","DOI":"10.1109\/ICCV.2015.123"},{"key":"25_CR10","unstructured":"Hendrycks, D., Gimpel, K.: Gaussian error linear units (GELUS) (2020)"},{"key":"25_CR11","doi-asserted-by":"publisher","unstructured":"Hu, J., Shen, L., Sun, G.: Squeeze-and-excitation networks. In: Proc. CVPR. pp. 7132\u20137141 (2018). https:\/\/doi.org\/10.1109\/Proc.CVPR.2018.00745","DOI":"10.1109\/Proc.CVPR.2018.00745"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Weon Jung, J., et al.: Aasist: audio anti-spoofing using integrated spectro-temporal graph attention networks. In: IEEE ICASSP, pp. 6367\u20136371 (2021)","DOI":"10.1109\/ICASSP43922.2022.9747766"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Kang, W.H., Alam, J., Fathan, A.: Investigation on activation functions for robust end-to-end spoofing attack detection system. In: Proceedings of 2021 Edition of the Automatic Speaker Verification and Spoofing Countermeasures Challenge, pp. 83\u201388 (2021)","DOI":"10.21437\/ASVSPOOF.2021-13"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Kinnunen, T., et al.: t-DCF: a detection cost function for the tandem assessment of spoofing countermeasures and automatic speaker verification. arXiv preprint arXiv:1804.09618 (2018)","DOI":"10.21437\/Odyssey.2018-44"},{"key":"25_CR15","unstructured":"Klambauer, G., Unterthiner, T., Mayr, A., Hochreiter, S.: Self-normalizing neural networks (2017)"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Lavrentyeva, G., et al.: STC Antispoofing Systems for the ASVspoof2019 Challenge. In: Proceedings of Interspeech, pp. 1033\u20131037 (2019)","DOI":"10.21437\/Interspeech.2019-1768"},{"key":"25_CR17","doi-asserted-by":"crossref","unstructured":"Li, Y., Fan, C., Li, Y., Wu, Q., Ming, Y.: Improving deep neural network with multiple parametric exponential linear units. Neurocomputing 301, 11\u201324 (2018). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0925231218301255","DOI":"10.1016\/j.neucom.2018.01.084"},{"key":"25_CR18","unstructured":"Maas, A., et al.: Rectifier nonlinearities improve neural network acoustic models. In: Proceedings of ICML (2013)"},{"issue":"12","key":"25_CR19","doi-asserted-by":"publisher","first-page":"513","DOI":"10.3390\/info12120513","volume":"12","author":"A Maniatopoulos","year":"2021","unstructured":"Maniatopoulos, A., Mitianoudis, N.: Learnable leaky relu (LeLeLU): an alternative accuracy-optimized activation function. Information 12(12), 513 (2021)","journal-title":"Information"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Monteiro, J., Alam, J.: Development of voice spoofing detection systems for 2019 edition of automatic speaker verification and countermeasures challenge. In: Proceedings of ASRU, pp. 1003\u20131010 (2019)","DOI":"10.1109\/ASRU46091.2019.9003792"},{"key":"25_CR21","doi-asserted-by":"publisher","first-page":"101096","DOI":"10.1016\/j.csl.2020.101096","volume":"63","author":"J Monteiro","year":"2020","unstructured":"Monteiro, J., et al.: Generalized end-to-end detection of spoofing attacks to automatic speaker recognizers. Comput. Speech Lang. 63, 101096 (2020)","journal-title":"Comput. Speech Lang."},{"key":"25_CR22","doi-asserted-by":"crossref","unstructured":"Monteiro, J., et al.: A multi-condition training strategy for countermeasures against spoofing attacks to speaker recognizers. In: Proceedings of Odyssey, pp. 296\u2013303 (2020)","DOI":"10.21437\/Odyssey.2020-42"},{"key":"25_CR23","unstructured":"Nair, V., Hinton, G.E.: Rectified linear units improve restricted boltzmann machines. In: Proceedings of the ICML, ICML 2010, pp. 807\u2013814. Omnipress, Madison, WI, USA (2010)"},{"key":"25_CR24","doi-asserted-by":"crossref","unstructured":"Patel, T.B., Patil, H.A.: Combining evidences from MEL cepstral, cochlear filter cepstral and instantaneous frequency features for detection of natural vs. spoofed speech. In: Proceedings of Interspeech (2015)","DOI":"10.21437\/Interspeech.2015-467"},{"key":"25_CR25","doi-asserted-by":"crossref","unstructured":"Patel, T.B., Patil, H.A.: Effectiveness of fundamental frequency (f 0) and strength of excitation (SOE) for spoofed speech detection. In: Proceedings of ICASSP, pp. 5105\u20135109 (2016)","DOI":"10.1109\/ICASSP.2016.7472650"},{"key":"25_CR26","unstructured":"RahulT, P., et al.: Audio spoofing verification using deep convolutional neural networks by transfer learning. ArXiv abs\/2008.03464 (2020)"},{"key":"25_CR27","doi-asserted-by":"crossref","unstructured":"Sahidullah, M., et al.: A comparison of features for synthetic speech detection. In: Proceedings of Interspeech, pp. 2087\u20132091 (2015)","DOI":"10.21437\/Interspeech.2015-472"},{"key":"25_CR28","doi-asserted-by":"crossref","unstructured":"Snyder, D., Garcia-Romero, D., Sell, G., Povey, D., Khudanpur, S.: X-vectors: robust DNN embeddings for speaker recognition. In: Proceedings of ICASSP, IEEE (2018)","DOI":"10.1109\/ICASSP.2018.8461375"},{"issue":"56","key":"25_CR29","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15(56), 1929\u20131958 (2014)","journal-title":"J. Mach. Learn. Res."},{"key":"25_CR30","doi-asserted-by":"crossref","unstructured":"Tak, H., weon Jung, J., Patino, J., Todisco, M., Evans, N.W.D.: Graph attention networks for anti-spoofing. In: Interspeech (2021)","DOI":"10.21437\/Interspeech.2021-993"},{"key":"25_CR31","doi-asserted-by":"crossref","unstructured":"Tak, H., et al.: Spoofing attack detection using the non-linear fusion of sub-band classifiers. In: Proceedings of Interspeech, pp. 1106\u20131110 (2020)","DOI":"10.21437\/Interspeech.2020-1844"},{"key":"25_CR32","doi-asserted-by":"crossref","unstructured":"Tak, H., et al.: End-to-end anti-spoofing with rawnet2. In: IEEE (ed.) Proceedings of ICASSP. Ontario (2021)","DOI":"10.1109\/ICASSP39728.2021.9414234"},{"key":"25_CR33","doi-asserted-by":"crossref","unstructured":"Tian, X., et al.: Spoofing detection from a feature representation perspective. In: Proceedings of ICASSP, pp. 2119\u20132123 (2016)","DOI":"10.1109\/ICASSP.2016.7472051"},{"key":"25_CR34","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1016\/j.csl.2017.01.001","volume":"45","author":"M Todisco","year":"2017","unstructured":"Todisco, M., et al.: Constant q cepstral coefficients: a spoofing countermeasure for automatic speaker verification. Comput. Speech Lang. 45, 516\u2013535 (2017)","journal-title":"Comput. Speech Lang."},{"key":"25_CR35","doi-asserted-by":"crossref","unstructured":"Trottier, L., Gigu\u00e8re, P., Chaib-draa, B.: Parametric exponential linear unit for deep convolutional neural networks (2018)","DOI":"10.1109\/ICMLA.2017.00038"},{"key":"25_CR36","doi-asserted-by":"crossref","unstructured":"Wu, Z., et al.: Light convolutional neural network with feature genuinization for detection of synthetic speech attacks. In: Proceedings of Interspeech, pp. 1101\u20131105 (2020)","DOI":"10.21437\/Interspeech.2020-1810"},{"key":"25_CR37","doi-asserted-by":"publisher","first-page":"937","DOI":"10.1109\/LSP.2021.3076358","volume":"28","author":"Y Zhang","year":"2021","unstructured":"Zhang, Y., et al.: One-class learning towards synthetic voice spoofing detection. IEEE Signal Process. Lett. 28, 937\u2013941 (2021)","journal-title":"IEEE Signal Process. Lett."}],"container-title":["Lecture Notes in Computer Science","Speech and Computer"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-48312-7_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T20:06:46Z","timestamp":1700597206000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-48312-7_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031483110","9783031483127"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-48312-7_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"22 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPECOM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Speech and Computer","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dharwad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"specom2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iitdh.ac.in\/specom-2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"174","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"94","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"54% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}