{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T22:59:45Z","timestamp":1773356385186,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1109\/icassp40776.2020.9053086","type":"proceedings-article","created":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T20:21:13Z","timestamp":1586463673000},"page":"6589-6593","source":"Crossref","is-referenced-by-count":29,"title":["Assessing the Scope of Generalized Countermeasures for Anti-Spoofing"],"prefix":"10.1109","author":[{"given":"Rohan Kumar","family":"Das","sequence":"first","affiliation":[]},{"given":"Jichen","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Haizhou","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2018-44"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1121\/1.400476"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-1693"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"2","DOI":"10.21437\/Interspeech.2017-1111","article-title":"The ASVspoof 2017 challenge: Assessing the limits of replay spoofing attack detection","author":"kinnunen","year":"2017","journal-title":"Proc Interspeech 2017"},{"key":"ref11","first-page":"1","article-title":"Overview of BTAS 2016 speaker antispoofing competition","author":"korshunov","year":"2016","journal-title":"International Conference on Biometrics Theory Applications and Systems (BTAS) 2016"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2018-28"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2018-27"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2018-34"},{"key":"ref15","first-page":"296","article-title":"ASVspoof 2017 Version 2.0: meta-data analysis and baseline enhancements","author":"delgado","year":"2018","journal-title":"Odyssey 2018"},{"key":"ref16","year":"2019","journal-title":"ASVspoof 2019 Automatic Speaker Verification Spoofing and Countermeasures Challenge Evaluation Plan"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-2249"},{"key":"ref18","first-page":"2062","article-title":"Combining evidences from mel cepstral, cochlear filter cepstral and instantaneous frequency features for detection of natural vs. spoofed speech","author":"patel","year":"0"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"2052","DOI":"10.21437\/Interspeech.2015-465","article-title":"Spoofing speech detection using high dimensional magnitude and phase features: The NTU approach for ASVspoof 2015 challenge","author":"xiao","year":"2015","journal-title":"Proceedings of Interspeech 2015"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2017.01.001"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3080-9"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2016-41"},{"key":"ref3","first-page":"3317","article-title":"Joint application of speech and speaker recognition for automation and security in smart home","author":"lee","year":"0"},{"key":"ref6","first-page":"321","author":"sahidullah","year":"2019","journal-title":"Introduction to Voice Presentation Attack Detection and Recent Advances"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.23919\/APSIPA.2018.8659537"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2014.10.005"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2671435"},{"key":"ref7","first-page":"925","article-title":"Spoofing and countermeasures for automatic speaker verification","author":"evans","year":"2013"},{"key":"ref2","article-title":"Speaker verification makes its debut in smartphone","author":"lee","year":"2013","journal-title":"SLTC Newsletter"},{"key":"ref9","first-page":"2037","article-title":"ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge","author":"wu","year":"0","journal-title":"Proceedings of Interspeech 2015"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2009.08.009"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"7","DOI":"10.21437\/Interspeech.2017-450","article-title":"Experimental analysis of features for replay attack detection results on the ASVspoof 2017 challenge","author":"font","year":"2017","journal-title":"Proc Interspeech 2017"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2017-930"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2017-836"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7952516"},{"key":"ref23","first-page":"393","article-title":"Boosting the performance of spoofing detection systems on replay attacks using q-logarithm domain feature normalization","author":"alam","year":"2018","journal-title":"Odyssey 2018"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ASRU46091.2019.9003845"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-1887"}],"event":{"name":"ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","location":"Barcelona, Spain","start":{"date-parts":[[2020,5,4]]},"end":{"date-parts":[[2020,5,8]]}},"container-title":["ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9040208\/9052899\/09053086.pdf?arnumber=9053086","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T19:28:16Z","timestamp":1696015696000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9053086\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icassp40776.2020.9053086","relation":{},"subject":[],"published":{"date-parts":[[2020,5]]}}}