{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:32:17Z","timestamp":1759091537496},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642334689"},{"type":"electronic","value":"9783642334696"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33469-6_27","type":"book-chapter","created":{"date-parts":[[2012,10,6]],"date-time":"2012-10-06T11:35:50Z","timestamp":1349523350000},"page":"191-198","source":"Crossref","is-referenced-by-count":2,"title":["A Speaker Recognition Based Approach for Identifying Voice Spammer"],"prefix":"10.1007","author":[{"given":"Fei","family":"Wang","sequence":"first","affiliation":[]},{"given":"KeXing","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Min","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","unstructured":"Dantu, R., Kolan, P.: Detecting Spam in VoIP Networks. In: USENIX. SRUTI 2005 Workshop, Cambridge, MA, pp. 31\u201337 (July 2005)"},{"key":"27_CR2","unstructured":"Shin, D., Shim, C.: Voice Spam Control with Gray Leveling. In: Proc. of the 2nd VoIP Security Workshop, Washington, DC (June 2005)"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Quittek, J., Niccolini, S., Tartarelli, S., et al.: Detecting SPIT Calls by Checking Human Communication Patterns. In: Proc. of ICC, pp. 1979\u20131984. IEEE (2007)","DOI":"10.1109\/ICC.2007.329"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Zhang, R., Gurtov, A.: Collaborative Reputation-based Voice Spam Filtering. In: Proc. of the 20th International Workshop on Database and Expert Systems Application. IEEE (2009)","DOI":"10.1109\/DEXA.2009.95"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Kusumoto, T., Chen, E.Y., Itoh, M.: Using Call Patterns to Detect Unwanted Communication Callers. In: Proceedings of the 9th Annual International Symposium on Applications and the Internet. IEEE (2009)","DOI":"10.1109\/SAINT.2009.19"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Bai, Y., Su, X., Bhargava, B.: Adaptive Voice Spam Control with User Behavior Analysis. In: Proceedings of 11th International Conference on High Performance Computing and Communications. IEEE (2009)","DOI":"10.1109\/HPCC.2009.9"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Wang, F., Mo, Y.J., Huang, B.X.: P2P-AVS: P2P based cooperative VoIP spam filtering. In: Proceedings of WCNC, pp. 3547\u20133552. IEEE (2007)","DOI":"10.1109\/WCNC.2007.650"},{"issue":"2","key":"27_CR8","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1002\/j.1538-7305.1987.tb00198.x","volume":"66","author":"F.K. Soong","year":"1987","unstructured":"Soong, F.K., Rosenberg, A.E., Juang, B.-H., Rabiner, L.R.: A vector quantization approach to speaker recognition. AT&T Tech. J.\u00a066(2), 14\u201326 (1987)","journal-title":"AT&T Tech. J."},{"issue":"1","key":"27_CR9","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/89.365379","volume":"3","author":"D.A. Reynolds","year":"1995","unstructured":"Reynolds, D.A., Rose, R.C.: Robust text-independent speaker identification using Gaussian mixture speaker models. IEEE Trans. Speech Audio Process.\u00a03(1), 72\u201383 (1995)","journal-title":"IEEE Trans. Speech Audio Process."},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Aronowitz, H., Burshtein, D., Amir, A.: Text independent speaker recognition using speaker dependent word spotting. In: Proc. Inter-speech, pp. 1789\u20131792 (2004)","DOI":"10.21437\/Interspeech.2004-516"},{"issue":"2-3","key":"27_CR11","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.csl.2005.06.003","volume":"20","author":"W.M. Campbell","year":"2006","unstructured":"Campbell, W.M., Campbell, J.P., Reynolds, D.A., Singer, E., Torres-Carrasquillo, P.A.: Support vector machines for speaker and language recognition. Comput. Speech Lang.\u00a020(2-3), 210\u2013229 (2006)","journal-title":"Comput. Speech Lang."},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"McLaughlin, J., Reynolds, D.A., Gleason, T.: A study of computation speed-ups of the GMM-UBM speaker recognition system. In: Proc. 6th European Conf. Speech Communication and Technology, Budapest, Hungary, pp. 1215\u20131218 (1999)","DOI":"10.21437\/Eurospeech.1999-284"},{"issue":"11","key":"27_CR13","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1109\/97.728467","volume":"5","author":"B.L. Pellom","year":"1998","unstructured":"Pellom, B.L., Hansen, J.H.L.: An efficient scoring algorithm for gaussian mixture model based speaker identification. IEEE Signal Process. Letter\u00a05(11), 281\u2013284 (1998)","journal-title":"IEEE Signal Process. Letter"},{"key":"27_CR14","unstructured":"Auckenthaler, R., Mason, J.S.: Gaussian selection applied to text-in-dependent speaker verification. In: Proc. Speaker Odyssey: The Speaker Recognition Workshop, Crete, Greece, pp. 83\u201388 (2001)"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Beigi, H.S.M., Maes, S.H., Sorensen, J.S., Chaudhari, U.V.: A hierarchical approach to large-scale speaker recognition. In: Proc. 6th Eur. Conf. Speech Communication and Technology, Budapest, Hungary, pp. 2203\u20132206 (1999)","DOI":"10.21437\/Eurospeech.1999-488"},{"key":"27_CR16","unstructured":"Sun, B., Liu, W., Zhong, Q.: Hierarchical speaker identification using speaker clustering. In: Proc. Int. Conf. Natural Language Processing and Knowledge Engineering, Beijing, China, pp. 299\u2013304 (2003)"},{"key":"27_CR17","unstructured":"Pan, Z., Kotani, K., Ohmi, T.: An on-line hierarchical method of speaker identification for large population. In: Proc. NORSIG 2000, Kolm\u00e5rden, Sweden (2000)"},{"issue":"1","key":"27_CR18","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1109\/TSA.2005.853206","volume":"14","author":"T. Kinnunen","year":"2006","unstructured":"Kinnunen, T., Karpov, E., Fr\u00e4nti, P.: Real-Time Speaker Identification and Verification. IEEE Trans. Speech Audio Process.\u00a014(1), 277\u2013288 (2006)","journal-title":"IEEE Trans. Speech Audio Process."},{"issue":"7","key":"27_CR19","doi-asserted-by":"publisher","first-page":"2033","DOI":"10.1109\/TASL.2007.902059","volume":"15","author":"H. Aronowitz","year":"2007","unstructured":"Aronowitz, H., Burshtein, D.: Efficient Speaker Recognition Using Approximated Cross Entropy (ACE). IEEE Trans. Speech Audio Process.\u00a015(7), 2033\u20132043 (2007)","journal-title":"IEEE Trans. Speech Audio Process."},{"key":"27_CR20","volume-title":"Discrete-Time Processing of Speech Signals","author":"J.R. Deller Jr.","year":"2000","unstructured":"Deller Jr., J.R., Hansen, J.H.L., Proakis, J.G.: Discrete-Time Processing of Speech Signals, 2nd edn. IEEE Press, New York (2000)","edition":"2"},{"key":"27_CR21","volume-title":"Spoken Language Processing: A Guide to Theory, Algorithm, and System Development","author":"X. Huang","year":"2001","unstructured":"Huang, X., Acero, A., Hon, H.-W.: Spoken Language Processing: A Guide to Theory, Algorithm, and System Development. Prentice-Hall, Englewood Cliffs (2001)"},{"issue":"1","key":"27_CR22","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/TCOM.1980.1094577","volume":"28","author":"Y. Linde","year":"1980","unstructured":"Linde, Y., Buzo, A., Gray, R.M.: An algorithm for vector quantizer design. IEEE Trans. Commun.\u00a028(1), 84\u201395 (1980)","journal-title":"IEEE Trans. Commun."},{"key":"27_CR23","unstructured":"http:\/\/www.ee.ic.ac.uk\/hp\/staff\/dmb\/voicebox\/doc\/voicebox\/index.html"},{"key":"27_CR24","unstructured":"Wang, F., Wang, F.R., Huang, B.X., Yang, L.T.: ADVS: a reputation-based model on filtering SPIT over P2P-VoIP networks. Journal of Supercomputing, http:\/\/www.springerlink.com\/content\/19726tkkk76305t6\/"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems and Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33469-6_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,30]],"date-time":"2024-04-30T02:22:56Z","timestamp":1714443776000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33469-6_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642334689","9783642334696"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33469-6_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}