{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T05:02:55Z","timestamp":1770526975449,"version":"3.49.0"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032159922","type":"print"},{"value":"9783032159939","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-15993-9_10","type":"book-chapter","created":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T05:52:15Z","timestamp":1770443535000},"page":"135-150","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["ASV-CM Score Fusion for\u00a0Robust Speaker Verification in\u00a0Spoofed Scenarios"],"prefix":"10.1007","author":[{"given":"Lucas A. R.","family":"Carvalho","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Laiza P.","family":"Lima","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Guilherme","family":"Rinaldo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Cinthya O.","family":"Silva","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Victor C.","family":"Beraldo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2026,2,8]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","unstructured":"Alenin, A., Torgashov, N., Okhotnikov, A., Makarov, R., Yakovlev, I.: A subnetwork approach for spoofing aware speaker verification. In: Interspeech 2022, pp. 2888\u20132892 (2022). https:\/\/doi.org\/10.21437\/Interspeech.2022-10921","DOI":"10.21437\/Interspeech.2022-10921"},{"key":"10_CR2","unstructured":"Amazon Web Services: Amazon sagemaker developer guide (2025). https:\/\/docs.aws.amazon.com\/sagemaker\/. Accessed 5 May 2025"},{"key":"10_CR3","unstructured":"Baevski, A., Zhou, Y., Mohamed, A., Auli, M.: wav2vec 2.0: a framework for self-supervised learning of speech representations. In: Advances in Neural Information Processing Systems (NeurIPS) (2020). https:\/\/arxiv.org\/abs\/2006.11477"},{"key":"10_CR4","doi-asserted-by":"publisher","unstructured":"Desplanques, B., Thienpondt, J., Demuynck, K.: Ecapa-tdnn: emphasized channel attention, propagation and aggregation in tdnn based speaker verification. In: Proceedings of Interspeech, pp. 3830\u20133834. ISCA (2020). https:\/\/doi.org\/10.21437\/Interspeech.2020-2650. https:\/\/arxiv.org\/abs\/2005.07143","DOI":"10.21437\/Interspeech.2020-2650"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Hsu, W.N., Bolte, B., Tsai, Y.H.H., Lakhotia, K., Salakhutdinov, R., Mohamed, A.: HuBERT: self-supervised speech representation learning by masked prediction of hidden units. In: Proceedings of the Conference of the North American Chapter of the Association for Computational Linguistics (NAACL) (2021). https:\/\/arxiv.org\/abs\/2106.07447","DOI":"10.1109\/TASLP.2021.3122291"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Jung, J., et al.: Sasv 2022: the first spoofing-aware speaker verification challenge. arXiv preprint arXiv:2203.14732 (2022)","DOI":"10.21437\/Interspeech.2022-11270"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Jung, J.W., et al.: To what extent can asv systems naturally defend against spoofing attacks? arXiv preprint arXiv:2406.05339 (2024)","DOI":"10.21437\/Interspeech.2024-1354"},{"key":"10_CR8","doi-asserted-by":"publisher","unstructured":"Khan, A., Malik, K.M., Nawaz, S.: Frame-to-utterance convergence: a spectra-temporal approach for unified spoofing detection. arXiv preprint arXiv:2309.09837 (2023). https:\/\/doi.org\/10.48550\/arXiv.2309.09837","DOI":"10.48550\/arXiv.2309.09837"},{"key":"10_CR9","unstructured":"Koluguri, N.R., Li, J., Lavrukhin, V., Ginsburg, B.: Speakernet: 1d depth-wise separable convolutional network for text-independent speaker recognition and verification. arXiv preprint arXiv:2010.12653 (2020)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Koluguri, N.R., Park, T., Ginsburg, B.: Titanet: neural model for speaker representation with 1d depth-wise separable convolutions and global context. arXiv preprint arXiv:2110.04410 (2021)","DOI":"10.1109\/ICASSP43922.2022.9746806"},{"key":"10_CR11","doi-asserted-by":"publisher","unstructured":"Lee, J.W., Kim, E., Koo, J., Lee, K.: Representation selective self-distillation and wav2vec 2.0 feature exploration for spoof-aware speaker verification. In: Proceedings of Interspeech 2022 (2022). https:\/\/doi.org\/10.21437\/Interspeech.2022-11460. https:\/\/arxiv.org\/abs\/2204.02639","DOI":"10.21437\/Interspeech.2022-11460"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Lei, Z., Yan, H., Liu, C., Zhou, Y., Ma, M.: Gmm-resnet2: ensemble of group resnet networks for synthetic speech detection. arXiv preprint arXiv:2407.02170 (2024)","DOI":"10.1109\/ICASSP48485.2024.10447628"},{"key":"10_CR13","unstructured":"Li, M., Ahmadiadli, Y., Zhang, X.P.: Audio anti-spoofing detection: a survey. arXiv preprint arXiv:2404.13914 (2024)"},{"key":"10_CR14","unstructured":"Liu, J., et al.: Transsionadd: a multi-frame reinforcement based sequence tagging model for audio deepfake detection (2023). https:\/\/arxiv.org\/abs\/2306.15212"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Liu, X., et\u00a0al.: Asvspoof 2021: towards spoofed and deepfake speech detection in the wild. ASVspoof2021 (2022)","DOI":"10.1109\/TASLP.2023.3285283"},{"key":"10_CR16","doi-asserted-by":"publisher","unstructured":"Mart\u00edn-Donas, J.M., \u00c1lvarez, A.: The vicomtech audio deepfake detection system based on wav2vec2 for the 2022 add challenge. arXiv preprint arXiv:2203.01573 (2022). https:\/\/doi.org\/10.48550\/arXiv.2203.01573","DOI":"10.48550\/arXiv.2203.01573"},{"key":"10_CR17","unstructured":"Radford, A., Gao, J.W., Xu, T., Brockman, G., McLeavey, J., Sutskever, I.: Robust speech recognition via large-scale weak supervision. arXiv preprint arXiv:2212.04356 (2022)"},{"key":"10_CR18","doi-asserted-by":"publisher","unstructured":"Rosello, E., Gomez, A.M., L\u00f3pez-Espejo, I., Peinado, A.M., Mart\u00edn-Do\u00f1as, J.M.: Anti-spoofing ensembling model: dynamic weight allocation in ensemble models for improved voice biometrics security. In: Interspeech 2024 (2024). https:\/\/doi.org\/10.21437\/Interspeech.2024-403","DOI":"10.21437\/Interspeech.2024-403"},{"key":"10_CR19","doi-asserted-by":"publisher","unstructured":"Sharafudeen, M., S, V.C.S., Jeyabose, A., Sei, Y.: A blended framework for audio spoof detection with sequential models and bags of auditory bites. Sci. Rep. 14(20192) (2024). https:\/\/doi.org\/10.1038\/s41598-024-71026-w","DOI":"10.1038\/s41598-024-71026-w"},{"key":"10_CR20","doi-asserted-by":"publisher","unstructured":"Snyder, D., Garcia-Romero, D., Sell, G., Povey, D., Khudanpur, S.: X-vectors: robust dnn embeddings for speaker recognition. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 5329\u20135333. IEEE (2018). https:\/\/doi.org\/10.1109\/ICASSP.2018.8461375. https:\/\/ieeexplore.ieee.org\/document\/8461375","DOI":"10.1109\/ICASSP.2018.8461375"},{"key":"10_CR21","doi-asserted-by":"publisher","unstructured":"Tak, H., Todisco, M., Wang, X., Jung, J.W., Yamagishi, J., Evans, N.: Automatic speaker verification spoofing and deepfake detection using wav2vec 2.0 and data augmentation. arXiv preprint arXiv:2202.12233 (2022). https:\/\/doi.org\/10.48550\/arXiv.2202.12233","DOI":"10.48550\/arXiv.2202.12233"},{"key":"10_CR22","doi-asserted-by":"publisher","unstructured":"Teng, Z., Fu, Q., White, J., Powell, M.E., Schmidt, D.C.: Sa-sasv: an end-to-end spoof-aggregated spoofing-aware speaker verification system. In: Interspeech 2022 (2022). https:\/\/doi.org\/10.21437\/Interspeech.2022-1234","DOI":"10.21437\/Interspeech.2022-1234"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Todisco, M., Delgado, H., Nautsch, A., Evans, N., Yamagishi, J., Kinnunen, T.: Asvspoof 2019: future horizons in spoofed and fake audio detection. In: Proceedings of Interspeech, pp. 1008\u20131012. ISCA (2019)","DOI":"10.21437\/Interspeech.2019-2249"},{"key":"10_CR24","doi-asserted-by":"publisher","unstructured":"Tran, H.M., Guennec, D., Martin, P., Sini, A., Lolive, D., Delhay, A., Marteau, P.F.: Spoofed speech detection with a focus on speaker embedding. In: Interspeech 2024 (2024). https:\/\/doi.org\/10.21437\/Interspeech.2024-481","DOI":"10.21437\/Interspeech.2024-481"},{"key":"10_CR25","doi-asserted-by":"publisher","unstructured":"Wang, H., et al.: Wespeaker: a research and production oriented speaker embedding learning toolkit. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.\u00a01\u20135. IEEE (2023). https:\/\/doi.org\/10.1109\/ICASSP49357.2023.10094988. https:\/\/arxiv.org\/abs\/2210.17016","DOI":"10.1109\/ICASSP49357.2023.10094988"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Wang, H., Zheng, S., Chen, Y., Cheng, L., Chen, Q.: Cam++: a fast and efficient network for speaker verification using context-aware masking. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE (2023)","DOI":"10.21437\/Interspeech.2023-1513"},{"key":"10_CR27","doi-asserted-by":"publisher","unstructured":"Wang, X., Yamagishi, J.: Can large-scale vocoded spoofed data improve speech spoofing countermeasure with a self-supervised front end? In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.\u00a01\u20135 (2024). https:\/\/doi.org\/10.1109\/ICASSP48485.2024.10446331. https:\/\/arxiv.org\/abs\/2309.06014","DOI":"10.1109\/ICASSP48485.2024.10446331"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Wang, X., et al.: Asvspoof 2019: a large-scale public database of synthesized, converted and replayed speech (2020). https:\/\/arxiv.org\/abs\/1911.01601","DOI":"10.1016\/j.csl.2020.101114"},{"key":"10_CR29","unstructured":"Wang, Y., Boumadane, A., Heba, A.: A fine-tuned wav2vec 2.0\/hubert benchmark for speech emotion recognition, speaker verification and spoken language understanding. arXiv preprint arXiv:2111.02735 (2022)"},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Wu, H., et al.: Tackling spoofing-aware speaker verification with multi-model fusion. In: Proceedings of the ASVspoof 2022 Challenge (2022)","DOI":"10.21437\/Odyssey.2022-13"},{"key":"10_CR31","doi-asserted-by":"publisher","unstructured":"Wu, H., et al.: Spoofing-aware speaker verification by multi-level fusion. arXiv preprint arXiv:2203.15377 (2022). https:\/\/doi.org\/10.48550\/arXiv.2203.15377","DOI":"10.48550\/arXiv.2203.15377"},{"key":"10_CR32","doi-asserted-by":"crossref","unstructured":"Yamagishi, J., et al.: Asvspoof 2021: accelerating progress in spoofed and deepfake speech detection (2021). https:\/\/arxiv.org\/abs\/2109.00537","DOI":"10.21437\/ASVSPOOF.2021-8"},{"issue":"7","key":"10_CR33","doi-asserted-by":"publisher","first-page":"317","DOI":"10.3390\/a16070317","volume":"16","author":"J Zhang","year":"2023","unstructured":"Zhang, J., Tu, G., Liu, S., Cai, Z.: Audio anti-spoofing based on audio feature fusion. Algorithms 16(7), 317 (2023). https:\/\/doi.org\/10.3390\/a16070317","journal-title":"Algorithms"},{"key":"10_CR34","doi-asserted-by":"publisher","unstructured":"Zhang, Y., Zhu, G., Duan, Z.: A probabilistic fusion framework for spoofing aware speaker verification. arXiv preprint arXiv:2202.05253 (2022). https:\/\/doi.org\/10.48550\/arXiv.2202.05253","DOI":"10.48550\/arXiv.2202.05253"}],"container-title":["Lecture Notes in Computer Science","Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-15993-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T05:52:19Z","timestamp":1770443539000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-15993-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032159922","9783032159939"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-15993-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"8 February 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"All the conclusions expressed by the authors do not reflect the opinions of Ita\u00fa Unibanco and Instituto de Ci\u00eancia e Tecnologia Ita\u00fa. Also, it must not result in any commercial process. Finally, all data used in this study comply with the Brazilian General Data Protection Law.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"BRACIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Brazilian Conference on Intelligent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Fortaleza-CE","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Brazil","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bracis2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/bracis.sbc.org.br\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}