{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T05:13:59Z","timestamp":1768540439331,"version":"3.49.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1109\/icc.2019.8761244","type":"proceedings-article","created":{"date-parts":[[2019,7,16]],"date-time":"2019-07-16T00:16:31Z","timestamp":1563236191000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Spoofing Attacks on Speaker Verification Systems Based Generated Voice using Genetic Algorithm"],"prefix":"10.1109","author":[{"given":"Qi","family":"Li","sequence":"first","affiliation":[]},{"given":"Hui","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Ziling","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Rongxing","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Fengwei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2010.2064307"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6639150"},{"key":"ref12","first-page":"i","article-title":"Improved gmm-ubm\/svm for speaker verification","author":"liu","year":"2006","journal-title":"IEEE International Conference on Acoustics Speech and Signal Processing 2006 ICASSP 2006 Proceedings"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.01.036"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2017.2743340"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00009"},{"key":"ref16","article-title":"Transfer learning from speaker verification to multispeaker text-to-speech synthesis","author":"jia","year":"2018"},{"key":"ref17","article-title":"Wavenet: A generative model for raw audio","author":"oord","year":"2016"},{"key":"ref18","first-page":"2104","article-title":"Genetic algorithm is search optimization and machine learning","volume":"xiii","author":"goldberg","year":"1989"},{"key":"ref19","article-title":"Spoofing detection with reinforcement learning in wireless networks","author":"xiao","year":"2016","journal-title":"Global Communications Conference"},{"key":"ref4","first-page":"1695","article-title":"A novel scheme for speaker recognition using a phonetically-aware deep neural network","author":"lei","year":"2014","journal-title":"IEEE International Conference on Acoustics Speech and Signal Processing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2017.08.001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2014.10.005"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.08.022"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2012.2215602"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2018-3"},{"key":"ref2","article-title":"Neural networks for speaker verification","author":"heigold","year":"2018","journal-title":"US Patent"},{"key":"ref1","article-title":"Deep speaker: an end-to-end neural speaker embedding system","author":"li","year":"2017"},{"key":"ref9","first-page":"2070","article-title":"Privacy-preserving speaker verification using garbled gmms","author":"port?lo","year":"2014","journal-title":"Conference on Signal Processing"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7952535"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2407362"}],"event":{"name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","location":"Shanghai, China","start":{"date-parts":[[2019,5,20]]},"end":{"date-parts":[[2019,5,24]]}},"container-title":["ICC 2019 - 2019 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8753818\/8761046\/08761244.pdf?arnumber=8761244","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:17:56Z","timestamp":1657855076000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8761244\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icc.2019.8761244","relation":{},"subject":[],"published":{"date-parts":[[2019,5]]}}}