{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T00:37:23Z","timestamp":1773621443906,"version":"3.50.1"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/icmlc.2011.6016982","type":"proceedings-article","created":{"date-parts":[[2011,9,21]],"date-time":"2011-09-21T20:16:22Z","timestamp":1316636182000},"page":"1708-1713","source":"Crossref","is-referenced-by-count":79,"title":["Channel pattern noise based playback attack detection algorithm for speaker recognition"],"prefix":"10.1109","author":[{"given":"Zhi-Feng","family":"Wang","sequence":"first","affiliation":[]},{"given":"Gang","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Qian-Hua","family":"He","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"1678","article-title":"Score normalization in playback attack detection","author":"wei","year":"2010","journal-title":"Proc of the ICASSP Conference"},{"key":"ref3","first-page":"145","article-title":"Vulnerability of speaker verification to voice mimicking","author":"wah","year":"2004","journal-title":"Proceeding of IS 1M P2004 Conference"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2005.1415185"},{"key":"ref6","author":"pohlmann","year":"2010","journal-title":"Principles of Digital Audio"},{"key":"ref5","first-page":"699","article-title":"Pre-vention of impostors entering speaker recognition sys-tems","volume":"48","author":"lipeng","year":"2008","journal-title":"Journal of Tsinghua University"},{"key":"ref8","author":"rabiner","year":"2010","journal-title":"Theory and Applications of Digital Speech Processing"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1993.319235"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1049\/el:20082455"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/89.326616"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/1961253a0"}],"event":{"name":"2011 International Conference on Machine Learning and Cybernetics (ICMLC)","location":"Guilin, China","start":{"date-parts":[[2011,7,10]]},"end":{"date-parts":[[2011,7,13]]}},"container-title":["2011 International Conference on Machine Learning and Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6009138\/6016945\/06016982.pdf?arnumber=6016982","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T12:20:59Z","timestamp":1490098859000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6016982\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/icmlc.2011.6016982","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}