{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T22:39:23Z","timestamp":1769035163438,"version":"3.49.0"},"reference-count":58,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T00:00:00Z","timestamp":1761091200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T00:00:00Z","timestamp":1761091200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,22]]},"DOI":"10.1109\/cbmi66578.2025.11339332","type":"proceedings-article","created":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T20:38:56Z","timestamp":1768941536000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["TrueEar: A Lightweight and Accurate Fake Voice Detector for Mobile Devices"],"prefix":"10.1109","author":[{"given":"Cameron","family":"Baird","sequence":"first","affiliation":[{"name":"Vanderbilt University,Department of Computer Science,Nashville,Tennessee,United States"}]},{"given":"Ke","family":"Li","sequence":"additional","affiliation":[{"name":"Vanderbilt University,Department of Computer Science,Nashville,Tennessee,United States"}]},{"given":"Dan","family":"Lin","sequence":"additional","affiliation":[{"name":"Vanderbilt University,Department of Computer Science,Nashville,Tennessee,United States"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484742"},{"key":"ref2","volume-title":"Finance worker pays out $25 million after video call with deepfake \u2018 chief financial officer\u2019.","author":"World.","year":"2024"},{"key":"ref3","article-title":"Asvspoof 5: Crowdsourced speech data, deepfakes, and adversarial attacks at scale","volume":"abs\/2408.08739","author":"Wang","year":"2024","journal-title":"CoRR"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"103122","DOI":"10.1016\/j.specom.2024.103122","article-title":"CFAD: A chinese dataset for fake audio detection","volume":"164","author":"Ma","year":"2024","journal-title":"Speech Commun."},{"key":"ref5","first-page":"112","article-title":"Automatic speaker verification spoofing and deepfake detection using wav2vec 2.0 and data augmentation","volume-title":"Odyssey 2022: The Speaker and Language Recognition Workshop","author":"Tak","year":"2022"},{"key":"ref6","first-page":"35","article-title":"Ghostvlad for set-based face recognition","volume-title":"Computer Vision - ACCV 2018 \u2013 14th Asian Conference on Computer Vision","volume":"Part I","author":"Zhong","year":"2018"},{"key":"ref7","article-title":"Graph attention networks","volume-title":"6th International Conference on Learning Representations, ICLR 2018","author":"Velickovic","year":"2018"},{"key":"ref8","article-title":"The deepfake detection challenge (DFDC) preview dataset","volume-title":"CoRR","volume":"abs\/l910.08854","author":"Dolhansky","year":"2019"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"730","DOI":"10.1109\/SP40001.2021.00014","article-title":"Sok: The faults in our asrs: An overview of attacks against automatic speech recognition and speaker identification systems","volume-title":"42nd IEEE Symposium on Security and Privacy, SP 2021","author":"Abdullah","year":"2021"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3067794"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPS-ISA56441.2022.00016"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1980.1163420"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712706"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/89.365379"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2015-468"},{"key":"ref16","article-title":"Audio deepfake detection: A survey","author":"Yi","year":"2023","journal-title":"arXiv preprint"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3714458"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICME52920.2022.9859621"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPAASC47483.2019.9023158"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT51525.2021.9580127"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3289446"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10447500"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9746722"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.126799"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.21437\/interspeech.2019-3174"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/rs14194770"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2008.2005605"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10096741"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2021-993"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9414234"},{"key":"ref31","article-title":"Audio anti-spoofing using a simple attention module and joint optimization based on additive angular margin loss and meta-learning","author":"Wang","year":"2022","journal-title":"arXiv preprint"},{"key":"ref32","first-page":"1021","article-title":"Speaker recognition from raw waveform with sincnet","volume-title":"2018 IEEE Spoken Language Technology Workshop, SLT 2018, Athens, Greece, December 18\u201321","author":"Ravanelli","year":"2018"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2023.3251895"},{"key":"ref34","first-page":"6367","article-title":"AASIST: audio anti-spoofing using integrated spectro-temporal graph attention networks","volume-title":"IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2022, Virtual and Singapore","author":"Jung"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9747605"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2021-847"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.21437\/odyssey.2022-14"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10447923"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.iotcps.2023.02.004"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2023.3294703"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3088875"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3176400"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22170-5_4"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.001.2200152"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-63775-9_3"},{"key":"ref46","article-title":"TensorFlow: Large-scale machine learning on heterogeneous systems","volume-title":"software available from tensorflow.org","author":"Abadi","year":"2015"},{"key":"ref47","volume-title":"Onnx runtime","author":"Developers","year":"2021"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3450494"},{"key":"ref49","first-page":"6369","article-title":"End-to-end anti-spoofing with rawnet2","volume-title":"IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP","author":"Tak"},{"key":"ref50","first-page":"6765","article-title":"Audio deepfake detection with self-supervised XLS-R and SLS classifier","volume-title":"Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024","author":"Zhang"},{"key":"ref51","article-title":"End-to-end spectro-temporal graph attention networks for speaker verification anti-spoofing and speech deepfake detection","volume":"abs\/2107.12710","author":"Tak","year":"2021","journal-title":"CoRR"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC54725.2025.10975995"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC65507.2025.00139"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2024-247"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"101114","DOI":"10.1016\/j.csl.2020.101114","article-title":"Asvspoof 2019: A large-scale public database of synthesized, converted and replayed speech","volume":"64","author":"Wang","year":"2020","journal-title":"Comput. Speech Lang"},{"key":"ref56","first-page":"1","article-title":"For: A dataset for synthetic speech detection","volume-title":"2019 International Conference on Speech Technology and Human-Computer Dialogue, SpeD 2019","author":"Reimao"},{"key":"ref57","first-page":"6382","article-title":"Rawboost: A raw data boosting and augmentation method applied to automatic speaker verification anti-spoofing","volume-title":"IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2022, Virtual and Singapore","author":"Tak","year":"2022"},{"key":"ref58","first-page":"2783","article-title":"Does audio deepfake detection generalize?","volume-title":"23rd Annual Conference of the International Speech Communication Association, Interspeech 2022","author":"Muller"}],"event":{"name":"2025 International Conference on Content-Based Multimedia Indexing (CBMI)","location":"Dublin, Ireland","start":{"date-parts":[[2025,10,22]]},"end":{"date-parts":[[2025,10,24]]}},"container-title":["2025 International Conference on Content-Based Multimedia Indexing (CBMI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11339229\/11339242\/11339332.pdf?arnumber=11339332","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T07:11:48Z","timestamp":1768979508000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11339332\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,22]]},"references-count":58,"URL":"https:\/\/doi.org\/10.1109\/cbmi66578.2025.11339332","relation":{},"subject":[],"published":{"date-parts":[[2025,10,22]]}}}