{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T05:41:16Z","timestamp":1732686076042,"version":"3.28.2"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1109\/icccnt61001.2024.10725501","type":"proceedings-article","created":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T23:06:46Z","timestamp":1730761606000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Safeguarding Audio Integrity: Ensemble Architectures for Real-World Fake Audio Identification"],"prefix":"10.1109","author":[{"given":"Soundarya Lahari","family":"Kasturi","sequence":"first","affiliation":[{"name":"Vellore Institute of Technology,School of Computer Science Engineering and Information Systems,Vellore,India"}]},{"given":"S","family":"Nivetha","sequence":"additional","affiliation":[{"name":"Vellore Institute of Technology,School of Computer Science Engineering and Information Systems,Vellore,India"}]},{"given":"B","family":"Selva Rani","sequence":"additional","affiliation":[{"name":"Vellore Institute of Technology,School of Computer Science Engineering and Information Systems,Vellore,India"}]},{"given":"S","family":"Vairamuthu","sequence":"additional","affiliation":[{"name":"Vellore Institute of Technology,School of Computer Science Engineering and Information Systems,Vellore,India"}]},{"given":"Sourabh","family":"Tiwari","sequence":"additional","affiliation":[{"name":"Voice Intelligence Group Samsung R&#x0026;D Institute,Bengaluru,India"}]},{"given":"Devendra","family":"Yadav","sequence":"additional","affiliation":[{"name":"Voice Intelligence Group Samsung R&#x0026;D Institute,Bengaluru,India"}]},{"given":"Rashmi T","family":"Shankarappa","sequence":"additional","affiliation":[{"name":"Voice Intelligence Group Samsung R&#x0026;D Institute,Bengaluru,India"}]}],"member":"263","reference":[{"article-title":"Re-assessing the threat of replay spoofing attacks against automatic speaker verification","volume-title":"2014 International Conference of the Biometrics Special Interest Group (BIOSIG)","author":"Alegre","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1976.10156"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2008.2006647"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.21437\/Eurospeech.1999-283"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27733-7_9111-2"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2009.04.004"},{"volume-title":"ASVspoof 2021 Challenge-Logical Access Database (1.1). Zenodo","year":"2021","author":"Delgado","key":"ref7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/jstsp.2017.2671435"},{"article-title":"Fad: a chinese dataset for fake audio detection","year":"2022","author":"Ma","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/cisp-bmei56279.2022.9980329"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2022.02.024"},{"key":"ref13","article-title":"The Vicomtech Audio Deep-fake Detection System based on Wav2Vec2 for the 2022 ADD Challenge","author":"Mart\u03afn-Do\u00f1as","year":"2022","journal-title":"arXiv [Eess.AS]"},{"key":"ref14","article-title":"SpecRNet: Towards Faster and MoreAudio Deep-Fake Detection","author":"Kawa","year":"2022","journal-title":"arXiv [Cs.SD]"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-022-09640-y"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-021-06297-w"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/icme52920.2022.9859621"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/s22218122"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583222"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3552466.3556526"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9746820"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/icccnt51525.2021.9580127"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.21437\/asvspoof.2021-8"},{"key":"ref24","article-title":"Real-time Detection of AI-Generated Speech for Deep-Fake Voice Conversion","author":"Bird","year":"2023","journal-title":"arXiv [Cs.SD]"},{"key":"ref25","article-title":"Speech recognition using MFCC","volume-title":"International conference on computer graphics, simulation and modeling","volume":"9","author":"Ittichaichareon"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSIGSYS.2019.8811070"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TAU.1971.1162189"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.2478\/v10048-011-0009-y"},{"key":"ref30","first-page":"7","article-title":"Investigation of spectral centroid magnitude and frequency for speaker recognition","author":"Kua","year":"2010","journal-title":"Odyssey"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2012.10.008"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01303-4"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1037\/a0016973"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3031685"},{"key":"ref35","first-page":"70","article-title":"Deep-fake Audio Detection via Feature Engineering and Machine Learning. In Woodstock\u201922: Symposium on the irreproducible science","volume-title":"IEEE","author":"Iqbal"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3230992"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11223743"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1108\/jsit-01-2014-0009"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5566347"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2018-44"}],"event":{"name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","start":{"date-parts":[[2024,6,24]]},"location":"Kamand, India","end":{"date-parts":[[2024,6,28]]}},"container-title":["2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10723818\/10723316\/10725501.pdf?arnumber=10725501","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T03:58:51Z","timestamp":1732679931000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10725501\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/icccnt61001.2024.10725501","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]}}}