{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T21:10:01Z","timestamp":1750540201676,"version":"3.41.0"},"reference-count":46,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/ijcnn.2017.7966294","type":"proceedings-article","created":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T21:41:30Z","timestamp":1499722890000},"page":"3483-3490","source":"Crossref","is-referenced-by-count":13,"title":["On the use of deep recurrent neural networks for detecting audio spoofing attacks"],"prefix":"10.1109","author":[{"given":"Simone","family":"Scardapane","sequence":"first","affiliation":[]},{"given":"Lucas","family":"Stoffl","sequence":"additional","affiliation":[]},{"given":"Florian","family":"Rohrbein","sequence":"additional","affiliation":[]},{"given":"Aurelio","family":"Uncini","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"2951","article-title":"Practical bayesian optimization of machine learning algorithms","author":"snoek","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref38","first-page":"281","article-title":"Random search for hyper-parameter optimization","volume":"13","author":"bergstra","year":"2012","journal-title":"Journal of Machine Learning Research"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2010.2098858"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1109\/TPAMI.2011.104","article-title":"Probabilistic models for inference about identity","volume":"34","author":"prince","year":"2012","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178810"},{"key":"ref30","doi-asserted-by":"crossref","DOI":"10.21437\/Interspeech.2012-462","article-title":"Spoofing countermeasures for the protection of automatic speaker recognition systems against attacks with artificial signals","author":"alegre","year":"2012","journal-title":"Interspeech 2012"},{"journal-title":"Recurrent Neural Network Regularization","year":"2014","author":"zaremba","key":"ref37"},{"key":"ref36","first-page":"1929","article-title":"Dropout: a simple way to prevent neural networks from overfitting","volume":"15","author":"srivastava","year":"2014","journal-title":"Journal of Machine Learning Research"},{"journal-title":"Adam A method for stochastic optimization","year":"2014","author":"kingma","key":"ref35"},{"journal-title":"LSTM A Search Space Odyssey","year":"2015","author":"greff","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6853887"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"1915","DOI":"10.21437\/Interspeech.2014-433","article-title":"Ensemble deep learning for speech recognition","author":"deng","year":"2014","journal-title":"Proc INTERSPEECH 2014"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"2180","DOI":"10.21437\/Interspeech.2014-488","article-title":"Adaptation of deep neural network acoustic models using factorised i-vectors","author":"karanasou","year":"2014","journal-title":"Proc INTERSPEECH 2014"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2015.2420092"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"2037","DOI":"10.21437\/Interspeech.2015-462","article-title":"Asvspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge","author":"wu","year":"2015","journal-title":"Proceedings of Interspeech 2015"},{"key":"ref14","first-page":"1310","article-title":"On the difficulty of training recurrent neural networks","volume":"28","author":"pascanu","year":"2013","journal-title":"Proc of the 2013 Internal Conference on Machine Learning (ICML)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6637694"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2015.2400218"},{"journal-title":"How to construct deep recurrent neural networks","year":"2013","author":"pascanu","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ASRU.2013.6707742"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2011.2165944"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"925","DOI":"10.21437\/Interspeech.2013-288","article-title":"Spoofing and countermeasures for automatic speaker verification","author":"evans","year":"2013","journal-title":"Interspeech 2013"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"653","DOI":"10.21437\/Interspeech.2011-268","article-title":"One-to-many voice conversion based on tensor representation of speaker space","author":"saito","year":"2011","journal-title":"Interspeech 2011"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2013.2272524"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1999.0361"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"2053","DOI":"10.21437\/Interspeech.2007-173","article-title":"Artificial impostor voice transformation effects on false acceptance rates","author":"bonastre","year":"2007","journal-title":"Interspeech 2007"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2014.10.005"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2010.2064307"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2006.870086"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-6524-8_7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2205597"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.886017"},{"journal-title":"WaveNet A Generative Model for Raw Audio","year":"2016","author":"oord","key":"ref46"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"2072","DOI":"10.21437\/Interspeech.2015-469","article-title":"Development of crim system for the automatic speaker verification spoofing and countermeasures challenge 2015","author":"alam","year":"2015","journal-title":"Proceedings of Interspeech 2015"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2015.2468583"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178826"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2016.7472724"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1992.225953"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"2062","DOI":"10.21437\/Interspeech.2015-467","article-title":"Combining evidences from mel cepstral, cochlear filter cepstral and instantaneous frequency features for detection of natural vs. spoofed speech","author":"patel","year":"2015","journal-title":"Proceedings of Interspeech 2015"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2007.366962"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"2052","DOI":"10.21437\/Interspeech.2015-465","article-title":"Spoofing speech detection using high dimensional magnitude and phase features: The ntu approach for asvspoof 2015 challenge","author":"xiao","year":"2015","journal-title":"Proceedings of Interspeech 2015"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2007.907344"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"2097","DOI":"10.21437\/Interspeech.2015-474","article-title":"Robust deep feature for spoofing detection-the sjtu system for asvspoof 2015 challenge","author":"chen","year":"2015","journal-title":"Proceedings of Interspeech 2015"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2008.2006647"}],"event":{"name":"2017 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2017,5,14]]},"location":"Anchorage, AK, USA","end":{"date-parts":[[2017,5,19]]}},"container-title":["2017 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7958416\/7965814\/07966294.pdf?arnumber=7966294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T20:32:38Z","timestamp":1750537958000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7966294\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2017.7966294","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}