{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T23:11:24Z","timestamp":1768000284732,"version":"3.49.0"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,18]]},"DOI":"10.1109\/ijcnn52387.2021.9534312","type":"proceedings-article","created":{"date-parts":[[2021,9,21]],"date-time":"2021-09-21T20:40:52Z","timestamp":1632256852000},"page":"1-7","source":"Crossref","is-referenced-by-count":7,"title":["End-to-end spoofing speech detection and knowledge distillation under noisy conditions"],"prefix":"10.1109","author":[{"given":"Pengfei","family":"Liu","sequence":"first","affiliation":[]},{"given":"Zhenchuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yingchun","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-2249"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2671435"},{"key":"ref33","article-title":"Fitnets: Hints for thin deep nets","author":"romero","year":"2014","journal-title":"ArXiv Preprint"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00454"},{"key":"ref31","article-title":"Distilling task-specific knowledge from bert into simple neural networks","author":"tang","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref30","article-title":"Distilling the knowledge in a neural network","author":"hinton","year":"2015","journal-title":"ArXiv Preprint"},{"key":"ref37","first-page":"1607","article-title":"Born again neural networks","author":"furlanello","year":"2018","journal-title":"International Conference on Machine Learning"},{"key":"ref36","article-title":"Paying more attention to attention: Improving the performance of convolutional neural networks via attention transfer","author":"zagoruyko","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.754"},{"key":"ref34","first-page":"775","article-title":"Kdgan: Knowledge distillation with generative adversarial networks","author":"wang","year":"2018","journal-title":"Advances in neural information processing systems"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178838"},{"key":"ref40","author":"rafii","year":"2017","journal-title":"The MUSDB18 corpus for music separation"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2005.06.042"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298965"},{"key":"ref14","article-title":"Wav2letter: an end-to-end convnet-based speech recognition system","author":"collobert","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6639100"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288859"},{"key":"ref17","article-title":"Improving neural networks by preventing co-adaptation of feature detectors","author":"hinton","year":"2012","journal-title":"ArXiv Preprint"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SLT.2014.7078567"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2017.2732162"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2017.01.001"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2015.07.007"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2016-41"},{"key":"ref6","article-title":"Asvspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge","author":"wu","year":"2015","journal-title":"Sixteenth Annual Conference of the International Speech Communication Association"},{"key":"ref29","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014","journal-title":"ArXiv Preprint"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1980.1163420"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7953080"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791200"},{"key":"ref2","author":"sahidullah","year":"2015","journal-title":"A comparison of features for synthetic speech detection"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2018.2851155"},{"key":"ref1","author":"sahidullah","year":"2015","journal-title":"A comparison of features for synthetic speech detection"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8461852"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2016.10.002"},{"key":"ref45","article-title":"Voice conversion from unaligned corpora using variational au-toencoding wasserstein generative adversarial networks","author":"hsu","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-1909"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7953215"},{"key":"ref21","article-title":"Spoofing detection under noisy conditions: a preliminary investigation and an initial database","author":"tian","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2018-44"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2016-743"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"18","DOI":"10.25080\/Majora-7b98e3ed-003","article-title":"librosa: Audio and music signal analysis in python","volume":"8","author":"mcfee","year":"2015","journal-title":"Proceedings of the 14th Python in Science Conference"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SPLIM.2016.7528399"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-2723"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00279"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-1768"},{"key":"ref25","article-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift","author":"ioffe","year":"2015","journal-title":"ArXiv Preprint"}],"event":{"name":"2021 International Joint Conference on Neural Networks (IJCNN)","location":"Shenzhen, China","start":{"date-parts":[[2021,7,18]]},"end":{"date-parts":[[2021,7,22]]}},"container-title":["2021 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9533266\/9533267\/09534312.pdf?arnumber=9534312","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:45:53Z","timestamp":1652197553000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9534312\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,18]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/ijcnn52387.2021.9534312","relation":{},"subject":[],"published":{"date-parts":[[2021,7,18]]}}}