{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:40:20Z","timestamp":1756273220621,"version":"3.44.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130153","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"963-968","source":"Crossref","is-referenced-by-count":0,"title":["Efficient Classification of Partially Faked Audio Using Deep Learning"],"prefix":"10.1109","author":[{"given":"Abdulazeez","family":"AlAli","sequence":"first","affiliation":[{"name":"Cardiff University,School of Computer Science and Informatics,Cardiff,UK"}]},{"given":"George","family":"Theodorakopoulos","sequence":"additional","affiliation":[{"name":"Cardiff University,School of Computer Science and Informatics,Cardiff,UK"}]},{"given":"Abdullah","family":"Emad","sequence":"additional","affiliation":[{"name":"School of Science and Technology Zewail City 6th of October,Egypt"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SLT61566.2024.10832320"},{"key":"ref2","first-page":"2709","article-title":"Yourtts: Towards zeroshot multi-speaker tts and zero-shot voice conversion for everyone","volume-title":"International Conference on Machine Learning","author":"Casanova"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2024-2016"},{"key":"ref4","first-page":"74213","article-title":"Pflow: A fast and data-efficient zero-shot tts through speech prompting","volume":"36","author":"Kim","year":"2023","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2023.3308474"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9414975"},{"key":"ref7","first-page":"5210","article-title":"Autovc: Zero-shot voice style transfer with only autoencoder loss","volume-title":"International Conference on Machine Learning","author":"Qian"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/jcp5010006"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2022.3233236"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2025.100757"},{"key":"ref11","first-page":"37","article-title":"The Vicomtech partial deepfake detection and location system for the 2023 add challenge","author":"Manuel","year":"2023","journal-title":"DADA@ IJCAI"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2024-1164"},{"key":"ref13","article-title":"Add 2023: the second audio deepfake detection challenge","author":"Yi","year":"2023","journal-title":"arXiv preprint arXiv:2305.13774"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-3973-8_1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2020.101114"},{"key":"ref16","first-page":"12449","article-title":"wav2vec 2.0: A framework for self-supervised learning of speech representations","volume":"33","author":"Baevski","year":"2020","journal-title":"Advances in neural information processing systems"},{"key":"ref17","first-page":"92049215","article-title":"Pay attention to mlps","volume":"34","author":"Liu","year":"2021","journal-title":"Advances in neural information processing systems"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2023-2335"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2022-16"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9413501"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2021.3076358"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-1844"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICME51207.2021.9428313"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2021.3060810"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2021.3089437"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-1887"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2021-993"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2021-1187"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-2249"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130153.pdf?arnumber=11130153","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:10:43Z","timestamp":1756271443000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130153\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130153","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}