{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T09:40:04Z","timestamp":1743846004809,"version":"3.40.3"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T00:00:00Z","timestamp":1729987200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T00:00:00Z","timestamp":1729987200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,27]]},"DOI":"10.1109\/ieeeconf60004.2024.10942853","type":"proceedings-article","created":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T18:20:20Z","timestamp":1743790820000},"page":"362-366","source":"Crossref","is-referenced-by-count":0,"title":["Improving Fairness in Synthetic Speech Detectors"],"prefix":"10.1109","author":[{"given":"Amit Kumar","family":"Singh Yadav","sequence":"first","affiliation":[{"name":"School of Electrical and Computer Engineering, Purdue University,Video and Image Processing Lab (VIPER),West Lafayette,Indiana,USA"}]},{"given":"Kratika","family":"Bhagtani","sequence":"additional","affiliation":[{"name":"School of Electrical and Computer Engineering, Purdue University,Video and Image Processing Lab (VIPER),West Lafayette,Indiana,USA"}]},{"given":"Paolo","family":"Bestagini","sequence":"additional","affiliation":[{"name":"Informazione e Bioingegneria, Politecnico di Milano,Dipartimento di Elettronica,Milano,Italy"}]},{"given":"Edward J.","family":"Delp","sequence":"additional","affiliation":[{"name":"School of Electrical and Computer Engineering, Purdue University,Video and Image Processing Lab (VIPER),West Lafayette,Indiana,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.21437\/interspeech.2019-2249"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.25144\/18952"},{"volume-title":"XTTS","year":"2023","key":"ref3"},{"key":"ref4","article-title":"Will All Content Soon Be Fake?","author":"Marr","year":"2024","journal-title":"Forbes"},{"key":"ref5","article-title":"Algorithms are pushing AI-generated falsehoods at an alarming rate. How do we stop this?","author":"Risius","year":"2024","journal-title":"The Conversation US, Inc."},{"key":"ref6","article-title":"Voice Deepfakes Are Coming for Your Bank Balance","author":"Flitter","year":"2023","journal-title":"The New York Times"},{"key":"ref7","article-title":"They thought loved ones were calling for help. It was an AI scam","author":"Verma","year":"2023","journal-title":"The Washington Post"},{"key":"ref8","article-title":"Scammers are using voice-cloning A.I. tools to sound like victims\u2019 relatives in desperate need of financial help. It\u2019s working","author":"Mollman","year":"2023","journal-title":"The New York Times"},{"key":"ref9","article-title":"The Pros and Cons of Facebook\u2019s New Deepfakes Policy","author":"Gregory","year":"2020","journal-title":"Witness"},{"key":"ref10","article-title":"Google and Facebook urged by EU to label AI-generated content","author":"Reed","year":"2023","journal-title":"The Guardian US"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2021.3089437"},{"key":"ref12","first-page":"112","article-title":"Automatic Speaker Verification Spoofing and Deepfake Detection Using Wav2vec 2.0 and Data Augmentation","volume-title":"Proceedings of the Speaker and Language Recognition Workshop, Odyssey","author":"Tak"},{"key":"ref13","first-page":"13","article-title":"Fake Speech Detection Using Residual Network with Transformer Encoder","volume-title":"Proceedings of the ACM Workshop on Information Hiding and Multimedia Security","author":"Zhang"},{"key":"ref14","first-page":"163","article-title":"Extracting efficient spectrograms from mp3 compressed speech signals for synthetic speech detection","volume-title":"Proceedings of the ACM Workshop on Information Hiding and Multimedia Security","author":"Xiang"},{"journal-title":"FairSSD: Understanding Bias in Synthetic Speech Detectors","year":"2024","author":"Kumar","key":"ref15"},{"journal-title":"American Speech-Language-Hearing Association","key":"ref16","article-title":"Stuttering"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"543","DOI":"10.1016\/j.specom.2011.11.004","article-title":"Design, Analysis, and Experimental Evaluation of Block Based Transformation in MFCC Computation for Speaker Recognition","volume":"54","author":"Sahidullah","year":"2012","journal-title":"Speech Communication"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2017.01.001"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9413828"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2015-472"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ASYU52992.2021.9598977"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-2892"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA58977.2023.00075"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA58977.2023.00072"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1121\/1.1915893","article-title":"A Scale for the Measurement of the Psychological Magnitude Pitch","volume":"8","author":"Smith Stevens","year":"1937","journal-title":"Journal of the Acoustical Society of America"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178964"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2022-227"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i10.21315"},{"key":"ref29","article-title":"wav2vec 2.0: A framework for self-supervised learning of speech representations","author":"Baevski","year":"2020","journal-title":"October"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.2352\/ei.2023.35.4.mwsf-372"},{"key":"ref31","first-page":"157","article-title":"Synthesized speech attribution using the patchout spectrogram attribution transformer","volume-title":"Proceedings of the ACM Workshop on Information Hiding and Multimedia Security","author":"Bhagtani"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10446471"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/IEEECONF59524.2023.10476982"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2022.3233236"},{"key":"ref35","first-page":"567","article-title":"An examination of fairness of ai models for deepfake detection","volume-title":"Proceedings of the International Joint Conference on Artificial Intelligence","author":"Trinh"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2021.3132237"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3524846.3527337"},{"key":"ref38","article-title":"Gbdf: Gender balanced deepfake dataset towards fair deepfake detection","author":"Varma Nadimpalli","year":"2022","journal-title":"arXiv preprint"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/WACV57701.2024.00459"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9413520"},{"volume-title":"librosa\/librosa: 0.10.1","year":"2023","author":"McFee","key":"ref41"},{"article-title":"Does audio deepfake detection general-ize?","volume-title":"Proceedings of the ISCA Interspeech","author":"M\u00fcller","key":"ref42"},{"key":"ref43","first-page":"168","article-title":"Classification Assessment Methods","volume-title":"Applied Computing and Informatics","author":"Tharwat","year":"2021"}],"event":{"name":"2024 58th Asilomar Conference on Signals, Systems, and Computers","start":{"date-parts":[[2024,10,27]]},"location":"Pacific Grove, CA, USA","end":{"date-parts":[[2024,10,30]]}},"container-title":["2024 58th Asilomar Conference on Signals, Systems, and Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10942562\/10942606\/10942853.pdf?arnumber=10942853","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T09:03:00Z","timestamp":1743843780000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10942853\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,27]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/ieeeconf60004.2024.10942853","relation":{},"subject":[],"published":{"date-parts":[[2024,10,27]]}}}