{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T22:59:43Z","timestamp":1773356383116,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1109\/icassp.2017.7953080","type":"proceedings-article","created":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T17:35:36Z","timestamp":1497980136000},"page":"4860-4864","source":"Crossref","is-referenced-by-count":43,"title":["End-to-end spoofing detection with raw waveform CLDNNS"],"prefix":"10.1109","author":[{"given":"Heinrich","family":"Dinkel","sequence":"first","affiliation":[]},{"given":"Nanxin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yanmin","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Yu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2016.10.007"},{"key":"ref11","first-page":"1700","article-title":"Detecting converted speech and natural speech for anti-spoofing attack in speaker recognition","author":"wu","year":"2012","journal-title":"Proceedings of the 13th Annual Conference of the InternationalSpeech Communication Association Interspeech 2012"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2015.07.003"},{"key":"ref13","first-page":"1689","article-title":"Convolutional, long short-term memory, fully connected deep neural networks","volume":"53","author":"tobergte","year":"2013","journal-title":"Journal of Chemical Information and Modeling"},{"key":"ref14","first-page":"171","article-title":"Deep residual learning for image recognition","volume":"7","author":"he","year":"2015","journal-title":"ArXiv org"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178847"},{"key":"ref16","first-page":"1929","article-title":"Dropout: A simple way to prevent neural networks from overfitting","volume":"15","author":"srivastava","year":"2014","journal-title":"Journal of Machine Learning Resaerch"},{"key":"ref17","first-page":"6","article-title":"Adadelta: An adaptive learning rate method","author":"zeiler","year":"2012","journal-title":"ArXiv"},{"key":"ref18","first-page":"1","article-title":"Learning the speech frontend with raw waveform cldnns","volume":"2015","author":"sainath","year":"2015","journal-title":"Proc of Annual Conference of InternationalSpeech Communication Association (INTERSPEECH)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791200"},{"key":"ref4","first-page":"5475","article-title":"Stc anti-spoofing systems for the asyspoof 2015 challenge itmo university, st. petersburg, russia","author":"novoselov","year":"2016","journal-title":"ICASSP 2016"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPA.2015.7415492"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2016-41"},{"key":"ref5","first-page":"61","article-title":"Introducing ivectors for joint anti-spoofing and speaker verification","author":"khoury","year":"2014","journal-title":"Proc of Annual Conference of InternationalSpeech Communication Association (INTERSPEECH)"},{"key":"ref8","first-page":"185","article-title":"Multitask learning for text-dependent speaker verification","volume":"2015","author":"chen","year":"2015","journal-title":"Proceedings of the Annual Conference of the InternationalSpeech Communication Association INTER-SPEECH"},{"key":"ref7","first-page":"2087","article-title":"A comparison of features for synthetic speech detection","volume":"2015","author":"sahidullah","year":"2016","journal-title":"Proc of Annual Conference of InternationalSpeech Communication Association (INTERSPEECH)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-6524-8_7"},{"key":"ref1","article-title":"On the vulnerability of speaker verification to realistic voice spoofing","author":"kucur ergnay","year":"2015","journal-title":"IEEE International Conference on Biometrics Theory Applications and Systems"},{"key":"ref9","first-page":"2097","article-title":"Robust deep feature for spoofing detection-the sjtu system for asvspoof 2015 challenge","author":"chen","year":"2015","journal-title":"Proceedings of Annual Conference of International Speech Communication Association"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2349158"}],"event":{"name":"2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","location":"New Orleans, LA","start":{"date-parts":[[2017,3,5]]},"end":{"date-parts":[[2017,3,9]]}},"container-title":["2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7943262\/7951776\/07953080.pdf?arnumber=7953080","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,2]],"date-time":"2017-10-02T23:04:33Z","timestamp":1506985473000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7953080\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icassp.2017.7953080","relation":{},"subject":[],"published":{"date-parts":[[2017,3]]}}}