{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:34:29Z","timestamp":1761676469506,"version":"3.37.3"},"reference-count":65,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2017,1,11]],"date-time":"2017-01-11T00:00:00Z","timestamp":1484092800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Evol. Intel."],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1007\/s12065-016-0150-5","type":"journal-article","created":{"date-parts":[[2017,1,11]],"date-time":"2017-01-11T05:45:52Z","timestamp":1484113552000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Feature selection for speaker verification using genetic programming"],"prefix":"10.1007","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0974-7106","authenticated-orcid":false,"given":"R\u00f3is\u00edn","family":"Loughran","sequence":"first","affiliation":[]},{"given":"Alexandros","family":"Agapitos","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Kattan","sequence":"additional","affiliation":[]},{"given":"Anthony","family":"Brabazon","sequence":"additional","affiliation":[]},{"given":"Michael","family":"O\u2019Neill","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,11]]},"reference":[{"key":"150_CR1","doi-asserted-by":"publisher","unstructured":"Agapitos A, Brabazon A, O\u2019Neill M (2012) Controlling overfitting in symbolic regression based on a bias\/variance error decomposition. In: PPSN XII (part 1), LNCS, Springer, Taormina, Italy, vol 7491, pp 438\u2013447. doi: 10.1007\/978-3-642-32937-1_44","DOI":"10.1007\/978-3-642-32937-1_44"},{"key":"150_CR2","doi-asserted-by":"crossref","unstructured":"Alegre F, Amehraye A, Evans N (2013) Spoofing countermeasures to protect automatic speaker verification from voice conversion. In: 2013 IEEE international conference on acoustics, speech and signal processing, IEEE, pp 3068\u20133072","DOI":"10.1109\/ICASSP.2013.6638222"},{"issue":"3","key":"150_CR3","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1016\/S0031-3203(02)00257-1","volume":"36","author":"R Barandela","year":"2003","unstructured":"Barandela R, S\u00e1nchez JS, Garc\u0131a V, Rangel E (2003) Strategies for learning in class imbalance problems. Pattern Recognit 36(3):849\u2013851","journal-title":"Pattern Recognit"},{"issue":"1","key":"150_CR4","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/1007730.1007735","volume":"6","author":"GE Batista","year":"2004","unstructured":"Batista GE, Prati RC, Monard MC (2004) A study of the behavior of several methods for balancing machine learning training data. ACM Sigkdd Explor Newsl 6(1):20\u201329","journal-title":"ACM Sigkdd Explor Newsl"},{"issue":"1","key":"150_CR5","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/1007730.1007735","volume":"6","author":"GEAPA Batista","year":"2004","unstructured":"Batista GEAPA, Prati RC, Monard MC (2004) A study of the behavior of several methods for balancing machine learning training data. SIGKDD Explor Newsl 6(1):20\u201329","journal-title":"SIGKDD Explor Newsl"},{"key":"150_CR6","doi-asserted-by":"crossref","unstructured":"Batista GEAPA, Prati RC, Monard MC (2005) Balancing strategies and class overlapping. In: Advances in intelligent data analysis VI, 6th international symposium on intelligent data analysis, IDA 2005, Madrid, Spain, September 8\u201310, 2005, Proceedings, LNCS, Springer, Berlin, vol 3646, pp 24\u201335","DOI":"10.1007\/11552253_3"},{"issue":"2","key":"150_CR7","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1109\/TSMCB.2011.2167144","volume":"42","author":"U Bhowan","year":"2012","unstructured":"Bhowan U, Johnston M, Zhang M (2012) Developing new fitness functions in genetic programming for classification with unbalanced data. Syst Man Cybern Part B Cybern IEEE Trans 42(2):406\u2013421","journal-title":"Syst Man Cybern Part B Cybern IEEE Trans"},{"issue":"3","key":"150_CR8","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1109\/TEVC.2012.2199119","volume":"17","author":"U Bhowan","year":"2013","unstructured":"Bhowan U, Johnston M, Zhang M, Yao X (2013) Evolving diverse ensembles using genetic programming for classification with unbalanced data. Evolut Comput IEEE Trans 17(3):368\u2013386","journal-title":"Evolut Comput IEEE Trans"},{"issue":"5","key":"150_CR9","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1109\/LSP.2006.870086","volume":"13","author":"WM Campbell","year":"2006","unstructured":"Campbell WM, Sturim DE, Reynolds DA (2006) Support vector machines using gmm supervectors for speaker verification. Signal Process Lett IEEE 13(5):308\u2013311","journal-title":"Signal Process Lett IEEE"},{"issue":"9","key":"150_CR10","doi-asserted-by":"crossref","first-page":"724","DOI":"10.1016\/j.specom.2009.01.005","volume":"51","author":"C Charbuillet","year":"2009","unstructured":"Charbuillet C, Gas B, Chetouani M, Zarader JL (2009) Optimizing feature complementarity by evolution strategy: application to automatic speaker verification. Speech Commun 51(9):724\u2013731","journal-title":"Speech Commun"},{"issue":"1","key":"150_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1007730.1007733","volume":"6","author":"NV Chawla","year":"2004","unstructured":"Chawla NV, Japkowicz N, Kotcz A (2004) Editorial: special issue on learning from imbalanced data sets. ACM Sigkdd Explor Newsl 6(1):1\u20136","journal-title":"ACM Sigkdd Explor Newsl"},{"issue":"2","key":"150_CR12","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/s11265-015-0997-1","volume":"82","author":"L Chen","year":"2016","unstructured":"Chen L, Lee KA, Ma B, Guo W, Li H, Dai LR (2016) Exploration of local variability in text-independent speaker verification. J Signal Process Syst 82(2):217\u2013228","journal-title":"J Signal Process Syst"},{"issue":"4","key":"150_CR13","doi-asserted-by":"crossref","first-page":"1065","DOI":"10.1109\/TSMCB.2007.896406","volume":"37","author":"R Curry","year":"2007","unstructured":"Curry R, Lichodzijewski P, Heywood MI (2007) Scaling genetic programming to large datasets using hierarchical dynamic subset selection. IEEE Trans Syst Man Cybern Part B Cybern 37(4):1065\u20131073","journal-title":"IEEE Trans Syst Man Cybern Part B Cybern"},{"key":"150_CR14","doi-asserted-by":"crossref","unstructured":"Dat TT, Kim JY, Kim HG, Lee KR (2015) Robust speaker verification using low-rank recovery under total variability space. In: IT convergence and security (ICITCS), 2015 5th international conference on, IEEE, pp 1\u20134","DOI":"10.1109\/ICITCS.2015.7293016"},{"issue":"1","key":"150_CR15","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1109\/TASL.2006.876765","volume":"15","author":"P Day","year":"2007","unstructured":"Day P, Nandi AK (2007) Robust text-independent speaker verification using genetic programming. Audio Speech Lang Process IEEE Trans 15(1):285\u2013295","journal-title":"Audio Speech Lang Process IEEE Trans"},{"issue":"2","key":"150_CR16","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1111\/j.1468-0394.2010.00547.x","volume":"28","author":"P Day","year":"2011","unstructured":"Day P, Nandi AK (2011) Evolution of superfeatures through genetic programming. Expert Syst 28(2):167\u2013184","journal-title":"Expert Syst"},{"issue":"7","key":"150_CR17","doi-asserted-by":"crossref","first-page":"2095","DOI":"10.1109\/TASL.2007.902758","volume":"15","author":"N Dehak","year":"2007","unstructured":"Dehak N, Dumouchel P, Kenny P (2007) Modeling prosodic features with joint factor analysis for speaker verification. Audio Speech Lang Process IEEE Trans 15(7):2095\u20132103","journal-title":"Audio Speech Lang Process IEEE Trans"},{"issue":"4","key":"150_CR18","doi-asserted-by":"crossref","first-page":"788","DOI":"10.1109\/TASL.2010.2064307","volume":"19","author":"N Dehak","year":"2011","unstructured":"Dehak N, Kenny PJ, Dehak R, Dumouchel P, Ouellet P (2011) Front-end factor analysis for speaker verification. Audio Speech Lang Process IEEE Trans 19(4):788\u2013798","journal-title":"Audio Speech Lang Process IEEE Trans"},{"key":"150_CR19","doi-asserted-by":"crossref","unstructured":"Dick G, Rimoni AP, Whigham PA (2015) A re-examination of the use of genetic programming on the oral bioavailability problem. In: Proceedings of the 2015 on genetic and evolutionary computation conference, ACM, pp 1015\u20131022","DOI":"10.1145\/2739480.2754771"},{"key":"150_CR20","doi-asserted-by":"crossref","unstructured":"Doucette J, Heywood MI (2008) GP classification under imbalanced data sets: active sub-sampling and AUC approximation. In: Proceedings of EuroGP 2008, LNCS, Springer, Berlin, vol 4971, pp 266\u2013277","DOI":"10.1007\/978-3-540-78671-9_23"},{"key":"150_CR21","unstructured":"Drummond C, Holte RC et al (2003) C4. 5, class imbalance, and cost sensitivity: why under-sampling beats over-sampling. In: Workshop on learning from imbalanced datasets II, vol 11, Citeseer"},{"key":"150_CR22","doi-asserted-by":"crossref","unstructured":"Eggermont J, Eiben AE, van Hemert JI (1999) Adapting the fitness function in GP for data mining. In: GP, Second European workshop, G\u00f6teborg, Sweden, May 26\u201327, 1999, proceedings, LNCS, Springer, Berlin, vol 1598, pp 193\u2013202","DOI":"10.1007\/3-540-48885-5_16"},{"key":"150_CR23","doi-asserted-by":"crossref","unstructured":"Evans NW, Kinnunen T, Yamagishi J (2013) Spoofing and countermeasures for automatic speaker verification. In: INTERSPEECH, pp 925\u2013929","DOI":"10.21437\/Interspeech.2013-288"},{"key":"150_CR24","unstructured":"Garofolo JS, Lamel LF, Fisher WM, Fiscus JG, Pallett DS (1993) Darpa timit acoustic-phonetic continous speech corpus cd-rom. nist speech disc 1-1.1. NASA STI\/Recon Technical Report N 93, 27,403"},{"key":"150_CR25","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1007\/3-540-58484-6_275","volume-title":"Parallel problem solving from nature III","author":"C Gathercole","year":"1994","unstructured":"Gathercole C, Ross P (1994) Dynamic training subset selection for supervised learning in genetic programming. In: Davidor Y, Schwefel HP, M\u00e4nner R (eds) Parallel problem solving from nature III, LNCS, vol 866. Springer, Berlin, Heidelberg, pp 312\u2013321"},{"key":"150_CR26","doi-asserted-by":"crossref","unstructured":"George KK, Kumar CS, Ramachandran K, Panda A (2015) Cosine distance features for robust speaker verification. In: Proceedings of 16th annual conference of the international speech communication association (INTERSPEECH), Dresden, Germany, September 6\u201310, 2015. pp 234\u2013238","DOI":"10.21437\/Interspeech.2015-91"},{"key":"150_CR27","doi-asserted-by":"crossref","unstructured":"Goncalves I, Silva S, Melo JB, Carreiras JMB (2012) Random sampling technique for overfitting control in genetic programming. In: Proceedings of EuroGP 2012, vol 7244. LNCS Springer Verlag, Malaga, Spain, pp 218\u2013229","DOI":"10.1007\/978-3-642-29139-5_19"},{"issue":"2","key":"150_CR28","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/TASLP.2013.2292356","volume":"22","author":"T Hasan","year":"2014","unstructured":"Hasan T, Hansen JH (2014) Maximum likelihood acoustic factor analysis models for robust speaker verification in noise. IEEE\/ACM Trans Audio Speech Lang Process 22(2):381\u2013391","journal-title":"IEEE\/ACM Trans Audio Speech Lang Process"},{"key":"150_CR29","doi-asserted-by":"crossref","first-page":"1738","DOI":"10.1121\/1.399423","volume":"87","author":"H Hermansky","year":"1990","unstructured":"Hermansky H (1990) Perceptual linear predictive (plp) analysis of speech. J Acoust Soc Am 87:1738","journal-title":"J Acoust Soc Am"},{"key":"150_CR30","doi-asserted-by":"crossref","unstructured":"Hermansky H, Morgan N, Bayya A, Kohn P (1992) Rasta-plp speech analysis technique. In: Acoustics, speech, and signal processing, 1992. ICASSP-92, 1992 IEEE international conference on, vol 1, pp 121\u2013124","DOI":"10.1109\/ICASSP.1992.225957"},{"issue":"2","key":"150_CR31","doi-asserted-by":"crossref","first-page":"482","DOI":"10.1214\/aoms\/1177704575","volume":"33","author":"J Hodges","year":"1962","unstructured":"Hodges J, Lehmann EL et al (1962) Rank methods for combination of independent experiments in analysis of variance. Ann Math Stat 33(2):482\u2013497","journal-title":"Ann Math Stat"},{"issue":"2","key":"150_CR32","first-page":"65","volume":"6","author":"S Holm","year":"1979","unstructured":"Holm S (1979) A simple sequentially rejective multiple test procedure. Scand J Stat 6(2):65\u201370","journal-title":"Scand J Stat"},{"key":"150_CR33","unstructured":"Holmes JH (1998) Differential negative reinforcement improves classifier system learning rate in two-class problems with unequal base rates. In: 3rd annual conf. on genetic programming, ICSC Academic Press, pp 635\u2013642"},{"key":"150_CR34","volume-title":"Spoken Language Processing","author":"X Huang","year":"2001","unstructured":"Huang X, Acero A, Hon HW et al (2001) Spoken Language Processing, vol 15. Prentice Hall PTR, New Jersey"},{"issue":"5","key":"150_CR35","doi-asserted-by":"crossref","first-page":"429","DOI":"10.3233\/IDA-2002-6504","volume":"6","author":"N Japkowicz","year":"2002","unstructured":"Japkowicz N, Stephen S (2002) The class imbalance problem: a systematic study. Intell Data Anal 6(5):429\u2013449","journal-title":"Intell Data Anal"},{"key":"150_CR36","unstructured":"Joder C, Schuller B (2012) Exploring nonnegative matrix factorization for audio classification: application to speaker recognition. In: Speech communication, 10. ITG Symposium; Proceedings of, VDE, pp 1\u20134"},{"key":"150_CR37","doi-asserted-by":"crossref","unstructured":"Kenny P, Boulianne G, Ouellet P, Dumouchel P (2005) Factor analysis simplified. In: Proc. ICASSP, Citeseer, vol 1, pp 637\u2013640","DOI":"10.1109\/ICASSP.2005.1415194"},{"issue":"4","key":"150_CR38","doi-asserted-by":"crossref","first-page":"1435","DOI":"10.1109\/TASL.2006.881693","volume":"15","author":"P Kenny","year":"2007","unstructured":"Kenny P, Boulianne G, Ouellet P, Dumouchel P (2007) Joint factor analysis versus eigenchannels in speaker recognition. Audio Speech Lang Process IEEE Trans 15(4):1435\u20131447","journal-title":"Audio Speech Lang Process IEEE Trans"},{"key":"150_CR39","doi-asserted-by":"crossref","unstructured":"Kenny P, Stafylakis T, Ouellet P, Alam MJ, Dumouchel P (2013) Plda for speaker verification with utterances of arbitrary duration. In: 2013 IEEE international conference on acoustics, speech and signal processing, IEEE, pp 7649\u20137653","DOI":"10.1109\/ICASSP.2013.6639151"},{"key":"150_CR40","unstructured":"Kinnunen T, Hautam\u00e4ki V, Fr\u00e4nti P (2004) Fusion of spectral feature sets for accurate speaker identification. In: 9th conference speech and computer"},{"issue":"1","key":"150_CR41","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.specom.2009.08.009","volume":"52","author":"T Kinnunen","year":"2010","unstructured":"Kinnunen T, Li H (2010) An overview of text-independent speaker recognition: from features to supervectors. Speech Commun 52(1):12\u201340","journal-title":"Speech Commun"},{"issue":"7","key":"150_CR42","doi-asserted-by":"crossref","first-page":"1990","DOI":"10.1109\/TASL.2012.2191960","volume":"20","author":"T Kinnunen","year":"2012","unstructured":"Kinnunen T, Saeidi R, Sedl\u00e1k F, Lee KA, Sandberg J, Hansson-Sandsten M, Li H (2012) Low-variance multitaper mfcc features: a case study in robust speaker verification. IEEE Trans Audio Speech Lang Process 20(7):1990\u20132001","journal-title":"IEEE Trans Audio Speech Lang Process"},{"key":"150_CR43","doi-asserted-by":"crossref","unstructured":"Kinnunen T, Wu ZZ, Lee KA, Sedlak F, Chng ES, Li H (2012) Vulnerability of speaker verification systems against voice conversion spoofing attacks: the case of telephone speech. In: 2012 IEEE international conference on acoustics, speech and signal processing (ICASSP), IEEE, pp 4401\u20134404","DOI":"10.1109\/ICASSP.2012.6288895"},{"key":"150_CR44","unstructured":"Kubat M, Matwin S (1997) Addressing the curse of imbalanced training sets: One-sided selection. In: Fisher DH (ed) Proceedings of the fourteenth international conference on machine learning (ICML 1997), Nashville, Tennessee, USA, July 8\u201312, 1997, Morgan Kaufmann, pp 179\u2013186"},{"key":"150_CR45","unstructured":"Lartillot O, Toiviainen P: (2007) A matlab toolbox for musical feature extraction from audio. In: International conference on digital audio effects, pp 237\u2013244"},{"key":"150_CR46","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/j.csl.2015.05.003","volume":"36","author":"M Li","year":"2016","unstructured":"Li M, Kim J, Lammert A, Ghosh PK, Ramanarayanan V, Narayanan S (2016) Speaker verification based on the fusion of speech acoustics and inverted articulatory signals. Comput Speech Lang 36:196\u2013211","journal-title":"Comput Speech Lang"},{"issue":"2","key":"150_CR47","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1016\/S0031-3203(02)00035-3","volume":"36","author":"LR Liares","year":"2003","unstructured":"Liares LR, Garcfa-Mateo C, Alba-Castro JL (2003) On combining classifiers for speaker authentication. Pattern Recognit 36(2):347\u2013359","journal-title":"Pattern Recognit"},{"issue":"2","key":"150_CR48","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1109\/TSMCB.2008.2007853","volume":"39","author":"XY Liu","year":"2009","unstructured":"Liu XY, Wu J, Zhou ZH (2009) Exploratory undersampling for class-imbalance learning. Syst Man Cybern Part B Cybern IEEE Trans 39(2):539\u2013550","journal-title":"Syst Man Cybern Part B Cybern IEEE Trans"},{"key":"150_CR49","unstructured":"Logan B et al (2000) Mel frequency cepstral coefficient for music modelling. In: Proceedings of 1st international symposium on music information retrieval (ISMIR), Plymouth, Massachusetts, October 23\u201325, 2000"},{"key":"150_CR50","doi-asserted-by":"crossref","first-page":"737","DOI":"10.1007\/978-3-319-31204-0_47","volume-title":"Applications of evolutionary computation","author":"R Loughran","year":"2016","unstructured":"Loughran R, Agapitos A, Kattan A, Brabazon A, O\u2019Neill M (2016) Speaker verification on unbalanced data with genetic programming. In: Squillero G, Burelli P (eds) Applications of evolutionary computation. Springer, Cham, pp 737\u2013753"},{"key":"150_CR51","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1007\/978-3-642-29142-5_16","volume-title":"Evolutionary and biologically inspired music, sound, art and design","author":"R Loughran","year":"2012","unstructured":"Loughran R, Walker J, O\u2019Neill M, McDermott J (2012) Genetic programming for musical sound analysis. In: Machado P, Romero JJ, Carballal A (eds) Evolutionary and biologically inspired music, sound, art and design. Springer, Berlin, Heidelberg, pp 176\u2013186"},{"key":"150_CR52","unstructured":"Loughran RB (2009) Musical instrument identification with feature selection using evolutionary methods. Ph.D. thesis, University of Limerick"},{"issue":"4","key":"150_CR53","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1109\/PROC.1975.9792","volume":"63","author":"J Makhoul","year":"1975","unstructured":"Makhoul J (1975) Linear prediction: a tutorial review. Proc IEEE 63(4):561\u2013580","journal-title":"Proc IEEE"},{"issue":"3","key":"150_CR54","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1007\/s10489-012-0374-8","volume":"38","author":"C M\u00e1rquez-Vera","year":"2013","unstructured":"M\u00e1rquez-Vera C, Cano A, Romero C, Ventura S (2013) Predicting student failure at school using genetic programming and different data mining approaches with high dimensional and imbalanced data. Appl Intell 38(3):315\u2013330","journal-title":"Appl Intell"},{"key":"150_CR55","doi-asserted-by":"crossref","unstructured":"Meriem F, Farid H, Messaoud B, Abderrahmene A (2014) Robust speaker verification using a new front end based on multitaper and gammatone filters. In: Signal-image technology and internet-based systems (SITIS), 2014 tenth international conference on, IEEE, pp 99\u2013103","DOI":"10.1109\/SITIS.2014.111"},{"key":"150_CR56","unstructured":"O\u2019Shaughnessy D (1987) Speech communication: human and machine. Universities Press (India) Pvt. Limited"},{"issue":"1","key":"150_CR57","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1006\/dspr.1999.0361","volume":"10","author":"DA Reynolds","year":"2000","unstructured":"Reynolds DA, Quatieri TF, Dunn RB (2000) Speaker verification using adapted gaussian mixture models. Digit Signal Process 10(1):19\u201341","journal-title":"Digit Signal Process"},{"key":"150_CR58","unstructured":"Saeidi R, Lee KA, Kinnunen T, Hasan T, Fauve B, Bousquet PM, Khoury E, Sordo Martinez P, Kua JMK, You C et al (2013) I4u submission to nist sre 2012: a large-scale collaborative effort for noise-robust speaker verification"},{"key":"150_CR59","doi-asserted-by":"crossref","unstructured":"Sivaram GS, Thomas S, Hermansky H (2011) Mixture of auto-associative neural networks for speaker verification. In: Cosi P, De Mori R, Di Fabbrizio G, Pieraccini R (eds) INTERSPEECH, pp 2381\u20132384","DOI":"10.21437\/Interspeech.2011-68"},{"issue":"3","key":"150_CR60","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1109\/TEVC.2004.841683","volume":"9","author":"D Song","year":"2005","unstructured":"Song D, Heywood MI, Zincir-Heywood AN (2005) Training genetic programming on half a million patterns: an example from anomaly detection. Evolut Comput IEEE Trans 9(3):225\u2013239","journal-title":"Evolut Comput IEEE Trans"},{"key":"150_CR61","doi-asserted-by":"crossref","unstructured":"Variani E, Lei X, McDermott E, Moreno IL, Gonzalez-Dominguez J (2014) Deep neural networks for small footprint text-dependent speaker verification. In: 2014 IEEE international conference on acoustics, speech and signal processing (ICASSP), IEEE, pp 4052\u20134056","DOI":"10.1109\/ICASSP.2014.6854363"},{"issue":"3","key":"150_CR62","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1007\/s10852-007-9065-6","volume":"6","author":"SM Winkler","year":"2007","unstructured":"Winkler SM, Affenzeller M, Wagner S (2007) Advanced genetic programming based machine learning. J Math Model Algorithms 6(3):455\u2013480","journal-title":"J Math Model Algorithms"},{"key":"150_CR63","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.specom.2014.10.005","volume":"66","author":"Z Wu","year":"2015","unstructured":"Wu Z, Evans N, Kinnunen T, Yamagishi J, Alegre F, Li H (2015) Spoofing and countermeasures for speaker verification: a survey. Speech Commun 66:130\u2013153","journal-title":"Speech Commun"},{"issue":"15","key":"150_CR64","first-page":"3750","volume":"10","author":"Z Wu","year":"2015","unstructured":"Wu Z, Kinnunen T, Evans N, Yamagishi J, Hanil\u00e7i C, Sahidullah M, Sizov A (2015) Asvspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge. Training 10(15):3750","journal-title":"Training"},{"issue":"40","key":"150_CR65","doi-asserted-by":"crossref","first-page":"606","DOI":"10.1109\/TEVC.2015.2504420","volume":"20","author":"B Xue","year":"2016","unstructured":"Xue B, Zhang M, Browne W, Yao X (2016) A survey on evolutionary computation approaches to feature selection. IEEE Trans Evol Comput 20(40):606\u2013626","journal-title":"IEEE Trans Evol Comput"}],"container-title":["Evolutionary Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12065-016-0150-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-016-0150-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-016-0150-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,21]],"date-time":"2022-07-21T06:45:30Z","timestamp":1658385930000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12065-016-0150-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,11]]},"references-count":65,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2017,7]]}},"alternative-id":["150"],"URL":"https:\/\/doi.org\/10.1007\/s12065-016-0150-5","relation":{},"ISSN":["1864-5909","1864-5917"],"issn-type":[{"type":"print","value":"1864-5909"},{"type":"electronic","value":"1864-5917"}],"subject":[],"published":{"date-parts":[[2017,1,11]]}}}