{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:10:18Z","timestamp":1756271418550,"version":"3.44.0"},"reference-count":70,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130020","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"50-56","source":"Crossref","is-referenced-by-count":0,"title":["Audio-deepfake: Generation Methods, Legitimate Applications and the Potential for Misuse"],"prefix":"10.1109","author":[{"given":"Gueltoum","family":"Bendiab","sequence":"first","affiliation":[{"name":"University of Fr&#x2018;eres Mentouri,Department of Electronics,Constantine,Algeria,25000"}]},{"given":"Kamel","family":"Zeltni","sequence":"additional","affiliation":[{"name":"University of Fr&#x2018;eres Mentouri, Lsiacio Laboratory,Department of Electronics,Constantine,Algeria,25000"}]},{"given":"Mohamed","family":"Bader-El-Den","sequence":"additional","affiliation":[{"name":"University of Portsmouth,Portsmouth,UK,PO1 2UP"}]},{"given":"Stavros","family":"Shiaeles","sequence":"additional","affiliation":[{"name":"University of Portsmouth,Portsmouth,UK,PO1 2UP"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.22215\/timreview\/1282"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/app9194050"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/a15050155"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2023.01.283"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3333866"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2024.103935"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13322"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.21437\/SSW.2016"},{"key":"ref9","article-title":"Melgan: Generative adversarial networks for conditional waveform synthesis","volume":"32","author":"Kumar","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref10","first-page":"3918","article-title":"Parallel wavenet: Fast high-fidelity speech synthesis","volume-title":"International conference on machine learning","author":"Oord"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09321-7"},{"key":"ref12","first-page":"195","article-title":"Deep voice: Real-time neural text-to-speech","volume-title":"International conference on machine learning","author":"Ar\u0131k"},{"key":"ref13","article-title":"Deep voice 2: Multi-speaker neural text-tospeech","volume":"30","author":"Gibiansky","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref14","article-title":"Deep voice 3: Scaling text-to-speech with convolutional sequence learning","author":"Ping","year":"2017","journal-title":"arXiv:1710.07654"},{"key":"ref15","article-title":"Fastspeech: Fast, robust and controllable text to speech","volume":"32","author":"Ren","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref16","article-title":"Fastspeech 2: Fast and high-quality end-to-end text to speech","author":"Ren","year":"2020","journal-title":"arXiv preprint arXiv:2006.04558"},{"article-title":"Char2wav: End-to-end speech synthesis","year":"2017","author":"Sotelo","key":"ref17"},{"article-title":"Tacotron 2: Generating human-like speech from text","year":"2017","author":"Shen","key":"ref18"},{"key":"ref19","first-page":"8067","article-title":"Glow-tts: A generative flow for text-to-speech via monotonic alignment search","volume":"33","author":"Kim","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref20","article-title":"Flowtron: an autoregressive flow-based generative network for text-to-speech synthesis","author":"Valle","year":"2020","journal-title":"arXiv preprint arXiv:2005.05957"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2017-1452"},{"key":"ref22","article-title":"Fast wavenet generation algorithm","author":"Paine","year":"2016","journal-title":"arXiv preprint arXiv:1611.09482"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33016706"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2022-952"},{"key":"ref25","article-title":"Hierarchical generative modeling for controllable speech synthesis","author":"Hsu","year":"2018","journal-title":"arXiv preprint arXiv:1810.07217"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-09342-5_13"},{"key":"ref27","article-title":"Adversarial audio synthesis","author":"Donahue","year":"2018","journal-title":"arXiv preprint arXiv:1802.04208"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053795"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3283772"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9413605"},{"key":"ref31","first-page":"2","article-title":"A survey on audio diffusion models: Text to speech synthesis and enhancement in generative ai","volume":"2","author":"Zhang","year":"2023","journal-title":"arXiv preprint arXiv:2303.13336"},{"key":"ref32","article-title":"Diffwave: A versatile diffusion model for audio synthesis","author":"Kong","year":"2020","journal-title":"arXiv preprint arXiv:2009.09761"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1378\/chest.08-2084"},{"key":"ref34","article-title":"Styletts 2: Towards human-level text-to-speech through style diffusion and adversarial training with large speech language models","volume":"36","author":"Li","year":"2024","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2024.3356232"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ASRU57964.2023.10389766"},{"key":"ref37","first-page":"68406851","article-title":"Denoising diffusion probabilistic models","volume":"33","author":"Ho","year":"2020","journal-title":"Advances in neural information processing systems"},{"key":"ref38","article-title":"Wavegrad: Estimating gradients for waveform generation","author":"Chen","year":"2020","journal-title":"arXiv preprint arXiv:2009.00713"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2021-1897"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-02438-3_168"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2020.3038524"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2022.3156757"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3390\/app132111988"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymeth.2018.07.007"},{"key":"ref45","article-title":"Dasee a synthetic database of domestic acoustic scenes and events in dementia patients environment","author":"Copiaco","year":"2021","journal-title":"arXiv preprint arXiv:2104.13423"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2018.2866873"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2021.3078364"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/EMBC.2019.8856972"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2021.101298"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-49803-9_11"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2021.10.012"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR-Adjunct.2019.000-2"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10101163"},{"key":"ref54","article-title":"Multimodal deep learning for mental disorders prediction from audio speech samples","author":"Naderi","year":"2019","journal-title":"arXiv preprint arXiv:1909.01067"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/8622022"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/s42600-022-00222-2"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-022-11194-2"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcce.2022.01.003"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW53098.2021.00384"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/3685614"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3110912"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-18444-4_2"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3459992"},{"author":"Chen","key":"ref64","article-title":"Finance worker pays out $ 25 million after video call with deepfake\u2018chief financial officer"},{"author":"Poireault","key":"ref65","article-title":"Deepfake digital identity fraud surges tenfold, sumsub report finds"},{"author":"Lynn","key":"ref66","article-title":"deepfake\u2019 of biden\u2019s voice called early example of us election disinformation"},{"author":"Bolen","key":"ref67","article-title":"The voice on the other end: Deepfake voice phishing and the blurring lines of trust"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123941"},{"key":"ref69","article-title":"Former school athletic director gets 4 months in jail in racist ai deepfake case","author":"Press","year":"2024","journal-title":"AP News"},{"key":"ref70","first-page":"2025","article-title":"AI Deepfake Used to Damage Business Owner Reputation","author":"Banyan","year":"2024"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130020.pdf?arnumber=11130020","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T04:53:48Z","timestamp":1756270428000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130020\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":70,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130020","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}