{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:17:37Z","timestamp":1763191057154,"version":"3.45.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1109\/ijcnn64981.2025.11229195","type":"proceedings-article","created":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T18:46:15Z","timestamp":1763145975000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Robust Deepfake Speech Algorithm Recognition: Classifying Generative Algorithms via Speaker X-Vectors and Deep Learning"],"prefix":"10.1109","author":[{"given":"Harry","family":"Maltby","sequence":"first","affiliation":[{"name":"University of East London,School of Architecture, Computing and Engineering,London,UK"}]},{"given":"Julie","family":"Wall","sequence":"additional","affiliation":[{"name":"University of West London,School of Computing and Engineering,London,UK"}]},{"given":"Cornelius","family":"Glackin","sequence":"additional","affiliation":[{"name":"Verint Systems UK Ltd.,London,UK"}]},{"given":"Mansour","family":"Moniri","sequence":"additional","affiliation":[{"name":"University of East London,School of Architecture, Computing and Engineering,London,UK"}]},{"given":"Roman","family":"Shrestha","sequence":"additional","affiliation":[{"name":"Verint Systems UK Ltd.,London,UK"}]},{"given":"Nigel","family":"Cannings","sequence":"additional","affiliation":[{"name":"Verint Systems UK Ltd.,London,UK"}]},{"given":"Iwa","family":"Salami","sequence":"additional","affiliation":[{"name":"University of East London,Royal Docks School of Business and Law,London,UK"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Fraudsters Cloned Company Director\u2019s Voice In $35 Million Heist, Police Find","volume-title":"Forbes","author":"Brewster","year":"2021"},{"key":"ref2","article-title":"Slew of deepfake video adverts of Sunak on Facebook raises alarm over AI risk to election","volume-title":"The Guardian","author":"Quinn","year":"2024"},{"key":"ref3","article-title":"Deepfake of principal\u2019s voice is the latest case of AI being used for harm","volume-title":"The Independent","author":"Finley","year":"2024"},{"key":"ref4","first-page":"129","article-title":"Looking for the Right Paths to Use XAI in the Judiciary: Which Branches of Law Need Inherently Interpretable Machine Learning Models and Why?","volume-title":"English. In: Joint Proceedings of the xAI 2024 Late-breaking Work, Demos and Doctoral Consortium","volume":"3793","author":"Porebski","year":"2024"},{"key":"ref5","first-page":"89","article-title":"Detecting Unknown Speech Spoofing Algorithms with Nearest Neighbors","author":"Lu","year":"2023","journal-title":"DADA@ IJCAI"},{"key":"ref6","first-page":"107","article-title":"From Speaker Verification to Deepfake Algorithm Recognition: Our Learned Lessons from ADD2023 Track 3","author":"Qin","year":"2023","journal-title":"DADA@ IJCAI"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/taslp.2023.3285283"},{"article-title":"Add 2023: the second audio deepfake detection challenge","year":"2023","author":"Yi","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCAN58655.2023.10395679"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2022.04.005"},{"key":"ref11","first-page":"31","article-title":"Deepfake Algorithm Recognition System with Augmented Data for ADD 2023 Challenge","author":"Zeng","year":"2023","journal-title":"DADA@ IJCAI"},{"key":"ref12","first-page":"64","article-title":"The NPU-ASLP System for Deepfake Algorithm Recognition in ADD 2023 Challenge","author":"Wang","year":"2023","journal-title":"DADA@ IJCAI"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.21437\/ASVSPOOF.2021-12","article-title":"UR Channel-Robust Synthetic Speech Detection System for ASVspoof 2021","volume-title":"ArXiv","author":"Chen","year":"2021"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3552466.3556523"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PRAI55851.2022.9904136"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3605098.3635911"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ijcnn60899.2024.10650554"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/dasc\/picom\/cbdcom\/cy55231.2022.9927875"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8461375"},{"volume-title":"Bayesian HMM Clustering of X-Vector Sequences (VBx) in Speaker Diarization: Theory, Implementation and Analysis on Standard Tasks","year":"2022","author":"Landini","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7953152"},{"article-title":"Musan: A music, speech, and noise corpus","year":"2015","author":"Snyder","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.21437\/interspeech.2021-1208"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.21437\/interspeech.2020-2337"},{"volume-title":"Zeroth-Korean Speech Corpus","key":"ref25"},{"volume-title":"Kokoro Speech Dataset","year":"2021","author":"Iida","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9054017"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2022.01.002"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.21437\/CHiME.2020-1"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9746270"},{"key":"ref31","article-title":"AISHELL-4: An Open Source Dataset for Speech Enhancement, Separation, Recognition and Speaker Diarization in Conference Scenario","volume-title":"Interspeech","author":"Fu","year":"2021"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00612"},{"key":"ref33","first-page":"76","article-title":"Deepfake Algorithm Recognition through Multi-model Fusion Based On Manifold Measure","author":"Tian","year":"2023","journal-title":"DADA@ IJCAI"}],"event":{"name":"2025 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2025,6,30]]},"location":"Rome, Italy","end":{"date-parts":[[2025,7,5]]}},"container-title":["2025 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11227166\/11227148\/11229195.pdf?arnumber=11229195","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:12:40Z","timestamp":1763190760000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11229195\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/ijcnn64981.2025.11229195","relation":{},"subject":[],"published":{"date-parts":[[2025,6,30]]}}}