{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T15:05:04Z","timestamp":1776783904127,"version":"3.51.2"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T00:00:00Z","timestamp":1691539200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T00:00:00Z","timestamp":1691539200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,9]]},"DOI":"10.1109\/icit58056.2023.10226172","type":"proceedings-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T17:26:12Z","timestamp":1693329972000},"page":"511-518","source":"Crossref","is-referenced-by-count":24,"title":["Unmasking the Truth: A Deep Learning Approach to Detecting Deepfake Audio Through MFCC Features"],"prefix":"10.1109","author":[{"given":"Islam","family":"Altalahin","sequence":"first","affiliation":[{"name":"Alzaytoonah University of Jordan,Department of Computer Science,Amman,Jordan"}]},{"given":"Shadi","family":"AlZu'bi","sequence":"additional","affiliation":[{"name":"Alzaytoonah University of Jordan,Department of Computer Science,Amman,Jordan"}]},{"given":"Assal","family":"Alqudah","sequence":"additional","affiliation":[{"name":"Alzaytoonah University of Jordan,Department of Computer Science,Amman,Jordan"}]},{"given":"Ala","family":"Mughaid","sequence":"additional","affiliation":[{"name":"The Hashemite University,Faculty of prince Al-Hussien bin Abdullah for IT,Dept. of Information Technology,Zarqa,Jordan,13133"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-14059-5"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-33743-7_49"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.442"},{"key":"ref14","first-page":"674","article-title":"Protecting data privacy and prevent fake news and deep-fakes in social media via blockchain technology","volume":"2","author":"jing","year":"2021","journal-title":"Advances in Cyber Security Second In-ternational Conference ACeS 2020"},{"key":"ref31","article-title":"How deep are the fakes? focusing on audio deepfake: A survey","author":"khanjani","year":"2021","journal-title":"ArXiv Preprint"},{"key":"ref30","article-title":"Synthetic speech detection using deep neural networks","author":"reimao","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref11","article-title":"Review of end-to-end speech synthesis technology based on deep learning","author":"mu","year":"2021","journal-title":"ArXiv Preprint"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.47852\/bonviewAIA3202820"},{"key":"ref10","first-page":"17022","article-title":"Hifi-gan: Gen-erative adversarial networks for efficient and high fidelity speech synthesis","volume":"33","author":"kong","year":"2020","journal-title":"Advances in neural information processing systems"},{"key":"ref32","first-page":"3102","article-title":"Deep voice: Real-time neural text-to-speech","author":"li","year":"0","journal-title":"Proc of the International Conference on Machine Learning (ICML)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-022-07080-1"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11182964"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud-EdgeCom49738.2020.00021"},{"key":"ref16","article-title":"A review of ensemble learning and data augmentation models for class imbalanced problems: combination, implementation and evaluation","author":"khan","year":"2023","journal-title":"ArXiv Preprint"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-5301-8_44"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3231480"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-1814"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.12928\/telkomnika.v21i1.24259"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/DeSE54285.2021.9719332"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/4980920"},{"key":"ref20","first-page":"189","article-title":"A comprehensive survey on deepfake detection techniques","volume":"10","author":"sultan","year":"2022","journal-title":"International Journal of Intelligent Systems and Applications in Engineering"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISESD56103.2022.9980803"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.apacoust.2023.109254"},{"key":"ref28","article-title":"Asvspoof 2021: Towards spoofed and deepfake speech detection in the wild","author":"liu","year":"2022","journal-title":"ArXiv Preprint"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1063\/5.0106614"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107005"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-14347-8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IOTSMS58070.2022.10061881"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-33743-7_47"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5267\/j.ijdns.2023.2.002"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03604-4"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13914-9"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-14347-8"}],"event":{"name":"2023 International Conference on Information Technology (ICIT)","location":"Amman, Jordan","start":{"date-parts":[[2023,8,9]]},"end":{"date-parts":[[2023,8,10]]}},"container-title":["2023 International Conference on Information Technology (ICIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10225686\/10225751\/10226172.pdf?arnumber=10226172","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T17:43:35Z","timestamp":1695059015000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10226172\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,9]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/icit58056.2023.10226172","relation":{},"subject":[],"published":{"date-parts":[[2023,8,9]]}}}