{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:37:52Z","timestamp":1742971072518,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819756773"},{"type":"electronic","value":"9789819756780"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5678-0_20","type":"book-chapter","created":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T16:04:18Z","timestamp":1722528258000},"page":"227-238","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Speech Partial Spoofing Detection Using Conformer Blocks and Multiple Pooling Integration"],"prefix":"10.1007","author":[{"given":"Haiyang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yanxiang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Shengyou","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,1]]},"reference":[{"issue":"1","key":"20_CR1","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.specom.2009.08.009","volume":"52","author":"T Kinnunen","year":"2010","unstructured":"Kinnunen, T., Li, H.: An overview of text-independent speaker recognition: from features to supervectors. Speech Commun. 52(1), 12\u201340 (2010)","journal-title":"Speech Commun."},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Wu, Z., Kinnunen, T., Evans, N., Yamagishi, J., Hanil\u00e7i, C., et al.: ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge. In: Proceedings of the Interspeech, pp. 2037\u20132041 (2015)","DOI":"10.21437\/Interspeech.2015-462"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Kinnunen, T., Sahidullah, M., Delgado, H., Todisco, M., Evans, N., et al.: The ASVspoof 2017 challenge: assessing the limits of replay spoofing attack detection. In: Proceedings of the Interspeech, pp. 2\u20136 (2017)","DOI":"10.21437\/Interspeech.2017-1111"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Todisco, M., Wang, X., Vestman, V., Sahidullah, M., Delgado, H., et al.: ASVspoof 2019: future horizons in spoofed and fake audio detection. In: Proceedings of the Interspeech, pp. 1008\u20131012 (2019)","DOI":"10.21437\/Interspeech.2019-2249"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Yamagishi, J., Wang, X., Todisco, M., Sahidullah, M., Patino, J., et al.: ASVspoof 2021: accelerating progress in spoofed and deepfake speech detection. arXiv preprint arXiv:2109.00537 (2021)","DOI":"10.21437\/ASVSPOOF.2021-8"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Kinnunen, T., Wu, Z., Lee, K.A., Sedlak, F., Chng, E.S., et al.: Vulnerability of speaker verification systems against voice conversion spoofing attacks: the case of telephone speech. In: 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.4401\u20134404 (2012)","DOI":"10.1109\/ICASSP.2012.6288895"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Shchemelinin, V., Simonchik, K.: Examining vulnerability of voice verification systems to spoofing attacks by means of a TTS system. In: Speech and Computer: 15th International Conference, pp.132\u2013137 (2013)","DOI":"10.1007\/978-3-319-01931-4_18"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Zhang, L., Wang, X., Cooper, E., Yamagishi, J., Patino, J., Evans, N.: An initial investigation for detecting partially spoofed audio. arXiv preprint arXiv:2104.02518 (2021)","DOI":"10.21437\/Interspeech.2021-738"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Lv, Z., Zhang, S., Tang, K., Hu, P.: Fake audio detection base on unsupervised pretraining models. In: ICASSP 2022\u20132022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 9231\u20139235. IEEE (2022)","DOI":"10.1109\/ICASSP43922.2022.9747605"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Wu, H., Kuo, H.C., Zheng, N., Hung, K.H., Lee, H., et al.: Partially fake audio detection by self-attention-based fake span discovery. In: ICASSP 2022\u20132022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) , pp. 9236\u20139240. IEEE (2022)","DOI":"10.1109\/ICASSP43922.2022.9746162"},{"issue":"1\u20132","key":"20_CR11","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/S0004-3702(96)00034-3","volume":"89","author":"TG Dietterich","year":"1997","unstructured":"Dietterich, T.G., Lathrop, R.H., Lozano-Perez, T.: Solving the multiple instance problem with axis-parallel rectangles. Artif. Intell. 89(1\u20132), 31\u201371 (1997)","journal-title":"Artif. Intell."},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Wan, F., Liu, C., Ke, W., Ji, X., Jiao, J., et al.: C-MIL: continuation multiple instance learning for weakly supervised object detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp.2119\u20132208 (2019)","DOI":"10.1109\/CVPR.2019.00230"},{"key":"20_CR13","doi-asserted-by":"publisher","first-page":"5794","DOI":"10.1109\/TIP.2020.2987161","volume":"29","author":"G Cheng","year":"2020","unstructured":"Cheng, G., Yang, J., Gao, D., Guo, L., Han, J.: High-quality proposals for weakly supervised object detection. IEEE Trans. Image Process. 29, 5794\u20135804 (2020)","journal-title":"IEEE Trans. Image Process."},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Gulati, A., Qin, J., Chiu, C.C., Parmar, N., Zhang, Y., et al.: Conformer: convolution-augmented transformer for speech recognition. arXiv preprint arXiv:2005.08100 (2020)","DOI":"10.21437\/Interspeech.2020-3015"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Todisco, M., Delgado, H., Lee, K.A., Sahidullah, M., Evans, N., et al.: Integrated presentation attack detection and automatic speaker verification: common features and Gaussian back-end fusion. In: Interspeech 2018\u201319th Annual Conference of the International Speech Communication Association. ISCA (2018)","DOI":"10.21437\/Interspeech.2018-2289"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Yang, J., Das, R.K.: Long-term high frequency features for synthetic speech detection. Digital Signal Processing 97, 102622 (2020)","DOI":"10.1016\/j.dsp.2019.102622"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Das, R.K., Yang, J., Li, H.: Assessing the scope of generalized countermeasures for anti-spoofing. In: ICASSP 2020\u20132020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE (2020)","DOI":"10.1109\/ICASSP40776.2020.9053086"},{"key":"20_CR18","doi-asserted-by":"publisher","first-page":"2160","DOI":"10.1109\/TIFS.2019.2956589","volume":"15","author":"J Yang","year":"2019","unstructured":"Yang, J., Das, R.K., Li, H.: Significance of subband features for synthetic speech detection. IEEE Trans. Inf. Forens. Secur. 15, 2160\u20132170 (2019)","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Lavrentyeva, G., Novoselov, S., Tseren, A., Volkova, M., Gorlanov, A., et al.: STC antispoofing systems for the ASVspoof2019 challenge. arXiv preprint arXiv:1904.05576 (2019)","DOI":"10.21437\/Interspeech.2019-1768"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Li, X., Li, N., Weng, C., Liu, X., Su, D., Meng, H.: Replay and synthetic speech detection with Res2Net architecture. In: ICASSP 2021\u20132021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 6354\u20136358. IEEE (2021)","DOI":"10.1109\/ICASSP39728.2021.9413828"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Li, X., Wu, X., Lu, H., Liu, X., Meng, H.: Channel-wise gated res2net: towards robust detection of synthetic speech attacks. arXiv preprint arXiv:2107.08803 (2021)","DOI":"10.21437\/Interspeech.2021-2125"},{"key":"20_CR22","doi-asserted-by":"publisher","first-page":"937","DOI":"10.1109\/LSP.2021.3076358","volume":"28","author":"Y Zhang","year":"2021","unstructured":"Zhang, Y., Jiang, F., Duan, Z.: One-class learning towards synthetic voice spoofing detection. IEEE Signal Process. Lett. 28, 937\u2013941 (2021)","journal-title":"IEEE Signal Process. Lett."},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Zhang, X., Zhao, R., Yan, J., Gao, M., Qiao, Y., et al.: P2sgrad: refined gradients for optimizing deep face models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (2019)","DOI":"10.1109\/CVPR.2019.01014"},{"key":"20_CR24","doi-asserted-by":"crossref","unstructured":"Zhang, L., Wang, X., Cooper, E., Yamagishi, J.: Multi-task learning in utterance-level and segmental-level spoof detection. arXiv preprint arXiv:2107.14132 (2021)","DOI":"10.21437\/ASVSPOOF.2021-2"},{"key":"20_CR25","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1109\/TASLP.2022.3233236","volume":"31","author":"L Zhang","year":"2022","unstructured":"Zhang, L., Wang, X., Cooper, E., Evans, N., Yamagishi, J.: The partial spoof database and countermeasures for the detection of short fake speech segments embedded in an utterance. IEEE\/ACM Trans. Audio Speech Lang. Process. 31, 813\u2013825 (2022)","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"key":"20_CR26","doi-asserted-by":"crossref","unstructured":"Wu, H., Kuo, H.C., Zheng, N., Hung, K.H., Lee, H., et al.: Partially fake audio detection by self-attention-based fake span discovery. In: ICASSP 2022\u20132022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE (2022)","DOI":"10.1109\/ICASSP43922.2022.9746162"},{"key":"20_CR27","unstructured":"Shah, A., Kumar, A., Hauptmann, A.G., Raj, B.: A closer look at weak label learning for audio events. arXiv preprint arXiv:1804.09288 (2018)"},{"key":"20_CR28","unstructured":"Salamon, J., McFee, B., Li, P., Bello, J.P.: DCASE 2017 submission: multiple instance learning for sound event detection. In: Detection and Classification of Acoustic Scenes and Events (2017)"},{"issue":"11","key":"20_CR29","doi-asserted-by":"publisher","first-page":"2180","DOI":"10.1109\/TASLP.2018.2858559","volume":"26","author":"B McFee","year":"2018","unstructured":"McFee, B., Salamon, J., Bello, J.P.: Adaptive pooling operators for weakly labeled sound event detection. IEEE\/ACM Trans. Audio Speech Lang. Process. 26(11), 2180\u20132193 (2018)","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"key":"20_CR30","doi-asserted-by":"crossref","unstructured":"Liu, Y., Chen, H., Wang, Y., Zhang, P.: Power pooling: an adaptive pooling function for weakly labelled sound event detection. In: 2021 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20137. IEEE (2021)","DOI":"10.1109\/IJCNN52387.2021.9533332"},{"key":"20_CR31","doi-asserted-by":"crossref","unstructured":"Dai, Z., Yang, Z., Yang, Y., Carbonell, J., Le, Q.V., et al.: Transformer-XL: attentive language models beyond a fixed-length context. arXiv preprint arXiv:1901.02860 (2019)","DOI":"10.18653\/v1\/P19-1285"},{"key":"20_CR32","doi-asserted-by":"crossref","unstructured":"Lai, C.I., Chen, N., Villalba, J., Dehak, N.: ASSERT: anti-spoofing with SqueezeExcitation and residual networks. arXiv preprint arXiv:1904.01120 (2019)","DOI":"10.21437\/Interspeech.2019-1794"}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5678-0_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T16:33:03Z","timestamp":1722529983000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5678-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819756773","9789819756780"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5678-0_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"1 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/2024\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}