{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T22:55:59Z","timestamp":1777503359395,"version":"3.51.4"},"reference-count":74,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002555","name":"Seoul Women`s University","doi-asserted-by":"publisher","award":["2024-0182"],"award-info":[{"award-number":["2024-0182"]}],"id":[{"id":"10.13039\/501100002555","id-type":"DOI","asserted-by":"publisher"}]},{"name":"The Ministry of Education republic of Korea government","award":["2024 personal information protection-002"],"award-info":[{"award-number":["2024 personal information protection-002"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3506973","type":"journal-article","created":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T19:41:56Z","timestamp":1732736516000},"page":"184311-184326","source":"Crossref","is-referenced-by-count":15,"title":["Anomaly Detection of Deepfake Audio Based on Real Audio Using Generative Adversarial Network Model"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-1464-1364","authenticated-orcid":false,"given":"Daeun","family":"Song","sequence":"first","affiliation":[{"name":"Department of Information Security, Seoul Women&#x2019;s University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-9240-9375","authenticated-orcid":false,"given":"Nayoung","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Information Security, Seoul Women&#x2019;s University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-6788-0748","authenticated-orcid":false,"given":"Jiwon","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Information Security, Seoul Women&#x2019;s University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8018-1041","authenticated-orcid":false,"given":"Eunjung","family":"Choi","sequence":"additional","affiliation":[{"name":"Department of Information Security, Seoul Women&#x2019;s University, Seoul, South Korea"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Combatting deepfakes: Policies to address national security threats and rights violations","author":"Miotti","year":"2024","journal-title":"arXiv:2402.09581"},{"issue":"5","key":"ref2","first-page":"70","article-title":"Ai and deep fake-video and audio manipulation techniques capable of altering the political process","volume":"81","author":"Oancea","year":"2024","journal-title":"Revista de Stlinte Politice. Revue des Sci. Politiques"},{"key":"ref3","volume-title":"Fake Joe Biden Robocall Urges New Hampshire Voters Not To Vote in Tuesday\u2019s Democratic Primary","author":"Steck","year":"2024"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0291668"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3231480"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT58056.2023.10226172"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/icac51239.2020.9357161"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3658664.3659647"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/com-it-con54601.2022.9850771"},{"key":"ref10","first-page":"50","article-title":"Learning intrusion de tection: Supervised or unsupervised","volume-title":"Proc. 13th Int. Conf.","author":"Laskov"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3342107"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10096813"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ECCE50734.2022.9947652"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2019.01.010"},{"key":"ref16","first-page":"104","article-title":"Detecting AI-synthesized speech using bispectral analysis","volume-title":"Proc. CVPR Workshops","author":"AlBadawy"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-022-02436-4"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.13052\/jwe1540-9589.21216"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/BF02943243"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS55849.2022.9975428"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2022-129"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3652583.3658086"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10447923"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2022-10078"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3605098.3635911"},{"key":"ref26","article-title":"WaveFake: A data set to facilitate audio deepfake detection","author":"Frank","year":"2021","journal-title":"arXiv:2111.02813"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2024-31"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2023.101597"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-2249"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2020.101114"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.21437\/ASVSPOOF.2021-8"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2023.3285283"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SPED.2019.8906599"},{"key":"ref34","volume-title":"The M-AILABS Speech Dataset","author":"Solak","year":"2019"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9746939"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9746820"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MIPR51284.2021.00076"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICME52920.2022.9859621"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2023.01.283"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2019.02.001"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2004.1328785"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1987.13824"},{"key":"ref43","volume-title":"AI-Synthesized Speech: Generation and Detection","author":"Abdrabuh","year":"2022"},{"key":"ref44","volume-title":"Audio Recognition Using Mel Spectrograms and Convolution Neural Networks","author":"Zhang","year":"2019"},{"key":"ref45","first-page":"1","article-title":"Speech recognition using MFCC","volume-title":"Proc. Int. Conf. Comput. Graph., Simul. Model.","volume":"9","author":"Ittichaichareon"},{"key":"ref46","first-page":"622","article-title":"GANomaly: Semi-supervised anomaly detection via adversarial training","volume-title":"Proc. Asian Conf. Comput. Vis.","author":"Akcay"},{"key":"ref47","volume-title":"Unsupervised anomalous sound detection via semi-supervised GANomaly adversarial training","author":"Zhu","year":"2021"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/BDAI56143.2022.9862656"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSCA56264.2022.9988129"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.3390\/app12157549"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1117\/12.3000063"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1117\/12.3004875"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/taslp.2018.2877258"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2877523"},{"key":"ref55","article-title":"Unsupervised learning of audio perception for robotics applications: Learning to project data to T-SNE\/UMAP space","author":"Verma","year":"2020","journal-title":"arXiv:2002.04076"},{"key":"ref56","article-title":"A survey on GANs for anomaly detection","author":"Di Mattia","year":"2019","journal-title":"arXiv:1906.11632"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/icassp48485.2024.10448196"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.21437\/ASVSPOOF.2021-1"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2024.3352429"},{"key":"ref60","article-title":"Self-attention and hybrid features for replay and deep-fake audio detection","author":"Huang","year":"2024","journal-title":"arXiv:2401.05614"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.3390\/app13148488"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/wifs58808.2023.10374968"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2024.102257"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/cvprw59228.2023.00097"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1049\/ep.1965.0268"},{"key":"ref66","article-title":"Towards the development of a real-time deepfake audio detection system in communication platforms","author":"Mathew","year":"2024","journal-title":"arXiv:2403.11778"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICICCSP53532.2022.9862519"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.9728\/dcs.2022.23.5.913"},{"key":"ref69","volume-title":"librosa\/librosa: 0.10.2","author":"McFee","year":"2024"},{"issue":"3","key":"ref70","first-page":"186","article-title":"A study on the development of deep learning-based deep voice detection system using mel-spectrogram and MFCC","volume":"72","author":"Han","year":"2023","journal-title":"Trans. Korean Inst. Electr. Eng."},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/SYSMART.2018.8746939"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3223444"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3422622"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2997001"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10769438.pdf?arnumber=10769438","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T07:09:18Z","timestamp":1734073758000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10769438\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":74,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3506973","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}