{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:49:36Z","timestamp":1742914176711,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819610709"},{"type":"electronic","value":"9789819610716"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1071-6_10","type":"book-chapter","created":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T04:04:28Z","timestamp":1738901068000},"page":"103-111","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Speaker Recognition Based on Locality Sensitive Hashing"],"prefix":"10.1007","author":[{"given":"Yifan","family":"Wu","sequence":"first","affiliation":[]},{"given":"Erhua","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Chunxia","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Zhenmin","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,8]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.neunet.2021.03.004","volume":"140","author":"Z Bai","year":"2021","unstructured":"Bai, Z., Zhang, X.L.: Speaker recognition based on deep learning: an overview. Neural Netw. 140, 65\u201399 (2021)","journal-title":"Neural Netw."},{"issue":"1","key":"10_CR2","first-page":"186","volume":"15","author":"YA Ibrahim","year":"2017","unstructured":"Ibrahim, Y.A., Odiketa, J.C., Ibiyemi, T.S.: Preprocessing technique in automatic speech recognition for human computer interaction: an overview. Ann. Comput. Sci. Ser. 15(1), 186\u2013191 (2017)","journal-title":"Ann. Comput. Sci. Ser."},{"key":"10_CR3","unstructured":"Jafari, O., et al.: A survey on locality sensitive hashing algorithms and their applications. arXiv preprintarXiv:2102.08942 (2021)"},{"key":"10_CR4","unstructured":"Du, J., et al.: Aishell-2: Transforming mandarin asr research into industrial scale. arXiv preprintarXiv:1808.10583 (2018)"},{"key":"10_CR5","unstructured":"Lv, Q., Josephson, W., Wang, Z., Charikar, M., Li, K.: Multi-probe LSH: efficient indexing for high-dimensional similarity search. In: Proceedings of the 33rd International Conference on Very Large Data Bases, pp. 950\u2013961 (2007)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Dehghani, M., Moeini, A., Kamandi, A.: Experimental evaluation of local sensitive hashing functions for face recognition. In: 2019 5th International Conference on Web Research (ICWR), pp. 184\u2013195. IEEE (2019)","DOI":"10.1109\/ICWR.2019.8765276"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Zeng, Z., Fang, T., Shah, S., Kakadiaris, I.A.: Local feature hashing for face recognition. In: 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems, pp. 1\u20138. IEEE (2009)","DOI":"10.1109\/BTAS.2009.5339013"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Tomar, V.S., Rose, R.C.: Efficient manifold learning for speech recognition using locality sensitive hashing. In: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 6995\u20136999. IEEE (2013)","DOI":"10.1109\/ICASSP.2013.6639018"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Pathak, M.A., Raj, B.: Privacy-preserving speaker verification as password matching. In: 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1849\u20131852. IEEE (2012)","DOI":"10.1109\/ICASSP.2012.6288262"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Schmidt, L., Sharifi, M., Moreno, I.L.: Large-scale speaker identification. In: 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1650\u20131654. IEEE (2014)","DOI":"10.1109\/ICASSP.2014.6853878"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Awais, A., Kun, S., Yu, Y., Hayat, S., Ahmed, A., Tu, T.: Speaker recognition using MEL frequency cepstral coefficient and locality sensitive hashing. In: 2018 International Conference on Artificial Intelligence and Big Data (ICAIBD), pp. 271\u2013276. IEEE (2018)","DOI":"10.1109\/ICAIBD.2018.8396208"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Fan, L., Jiang, Q.-Y., Yu, Y.-Q., Li, W.-J.: Deep hashing for speaker identification and retrieval. In: INTERSPEECH, pp. 2908\u20132912 (2019)","DOI":"10.21437\/Interspeech.2019-2457"},{"issue":"1","key":"10_CR13","doi-asserted-by":"publisher","first-page":"1201","DOI":"10.1007\/s11042-020-09748-y","volume":"80","author":"Q Zhang","year":"2021","unstructured":"Zhang, Q., Li, Y.-Z., Yingie, H.: A retrieval algorithm for encrypted speech based on convolutional neural network and deep hashing. Multimedia Tools Appl. 80(1), 1201\u20131221 (2021)","journal-title":"Multimedia Tools Appl."},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Variani, E., Lei, X., McDermott, E., Moreno, I.L., Gonzalez-Dominguez, J.: Deep neural networks for small footprint text-dependent speaker verification. In: 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 4052\u20134056. IEEE (2014)","DOI":"10.1109\/ICASSP.2014.6854363"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Snyder, D., Ghahremani, P., Povey, D., Garcia-Romero, D., Carmiel, Y., Khudanpur, S.: Deep neural network-based speaker embeddings for end-to-end speaker verification. In: 2016 IEEE Spoken Language Technology Workshop (SLT), pp. 165\u2013170. IEEE (2016)","DOI":"10.1109\/SLT.2016.7846260"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Wang, Q., Downey, C., Wan, L., Mansfield, P.A., Moreno, I.L.: Speaker diarization with LSTM. In: 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 5239\u20135243. IEEE (2018)","DOI":"10.1109\/ICASSP.2018.8462628"},{"issue":"2","key":"10_CR17","doi-asserted-by":"publisher","first-page":"652","DOI":"10.1109\/TPAMI.2019.2938758","volume":"43","author":"S-H Gao","year":"2019","unstructured":"Gao, S.-H., Cheng, M.-M., Zhao, K., Zhang, X.-Y., Yang, M.-H., Torr, P.: Res2net: a new multi-scale backbone architecture. IEEE Trans. Pattern Anal. Mach. Intell. 43(2), 652\u2013662 (2019)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Desplanques, B., Thienpondt, J., Demuynck, K.: ECAPA-TDNN: emphasized channel attention, propagation and aggregation in TDNN based speaker verification. arXiv preprint arXiv:2005.07143 (2020)","DOI":"10.21437\/Interspeech.2020-2650"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Wang, H., Zheng, S., Chen, Y., Cheng, L., Chen, Q.: Cam++: a fast and efficient network for speaker verification using context-aware masking. arXiv preprintarXiv:2303.00332 (2023)","DOI":"10.21437\/Interspeech.2023-1513"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Gulati, A., et al.: Conformer: convolution-augmented transformer for speech recognition. arXiv preprintarXiv:2005.08100 (2020)","DOI":"10.21437\/Interspeech.2020-3015"},{"key":"10_CR21","unstructured":"Sadowski, C., Levin, G.: Simhash: hash-based similarity detection (2007)"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Deng, J., et al.: Arcface: additive angular margin loss for deep face recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (2019)","DOI":"10.1109\/CVPR.2019.00482"},{"key":"10_CR23","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprintarXiv:1412.6980 (2014)"},{"key":"10_CR24","unstructured":"Van der Maaten, L., Hinton, G.: Visualizing data using t-SNE. J. Mach. Learn. Res. 9(11) (2008)"}],"container-title":["Lecture Notes in Computer Science","Biometric Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1071-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T04:04:47Z","timestamp":1738901087000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1071-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819610709","9789819610716"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1071-6_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"8 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CCBR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Biometric Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccbr2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ccbr99.cn\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}