{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T02:55:32Z","timestamp":1764557732839,"version":"3.37.3"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T00:00:00Z","timestamp":1730937600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T00:00:00Z","timestamp":1730937600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62322120,U21B2010,62306316,62206278"],"award-info":[{"award-number":["62322120,U21B2010,62306316,62206278"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,11,7]]},"DOI":"10.1109\/iscslp63861.2024.10800741","type":"proceedings-article","created":{"date-parts":[[2024,12,23]],"date-time":"2024-12-23T19:11:17Z","timestamp":1734981077000},"page":"476-480","source":"Crossref","is-referenced-by-count":1,"title":["Reject Threshold Adaptation for Open-Set Model Attribution of Deepfake Audio"],"prefix":"10.1109","author":[{"given":"Xinrui","family":"Yan","sequence":"first","affiliation":[{"name":"Beihang University"}]},{"given":"Jiangyan","family":"Yi","sequence":"additional","affiliation":[{"name":"Beihang University"}]},{"given":"Jianhua","family":"Tao","sequence":"additional","affiliation":[{"name":"Tsinghua University,Department of Automation"}]},{"given":"Yujie","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute of Automation, Chinese Academy of Sciences"}]},{"given":"Hao","family":"Gu","sequence":"additional","affiliation":[{"name":"Institute of Automation, Chinese Academy of Sciences"}]},{"given":"Guanjun","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Automation, Chinese Academy of Sciences"}]},{"given":"Junzuo","family":"Zhou","sequence":"additional","affiliation":[{"name":"Institute of Automation, Chinese Academy of Sciences"}]},{"given":"Yong","family":"Ren","sequence":"additional","affiliation":[{"name":"Institute of Automation, Chinese Academy of Sciences"}]},{"given":"Tao","family":"Xu","sequence":"additional","affiliation":[{"name":"Institute of Automation, Chinese Academy of Sciences"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/SPED.2019.8906599"},{"year":"2022","author":"Yan","journal-title":"System fingerprint recognition for deepfake audio: An initial dataset and investigation","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/ICASSP48485.2024.10445906"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/ICCV.2019.00765"},{"key":"ref5","first-page":"36571","article-title":"Are you stealing my model? sample correlation for fingerprinting deep neural networks","volume":"35","author":"Guan","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TPAMI.2020.2981604"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/ICCV48922.2021.00085"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/CVPR.2019.00241"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TIP.2021.3128318"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TPAMI.2022.3227913"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/ICCV48922.2021.00917"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/CVPR42600.2020.01183"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/CVPR52729.2023.01522"},{"key":"ref14","article-title":"Open-set recognition: A good closed-set classifier is all you need?","volume-title":"OpenReview","author":"Vaze","year":"2021"},{"key":"ref15","article-title":"A baseline for detecting misclassified and out-of-distribution examples in neural networks","volume-title":"International Conference on Learning Representations","author":"Hendrycks","year":"2022"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/jstars.2024.3416175"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/CVPR.2016.173"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.18653\/v1\/d17-1314"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/CVPR.2019.00414"},{"key":"ref20","first-page":"89","article-title":"Detecting unknown speech spoofing algorithms with nearest neighbors","author":"Lu","year":"2023","journal-title":"DADA@ IJCAI"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/5.18626"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/CVPR.2019.00013"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/3552466.3556525"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/CVPR.2016.90"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.21437\/Interspeech.2015-472"},{"key":"ref26","first-page":"144","article-title":"React: Out-of-distribution detection with rectified activations","volume":"34","author":"Sun","year":"2021","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref27","first-page":"23 803","article-title":"Cross-entropy loss functions: Theoretical analysis and applications","volume-title":"International conference on Machine learning","author":"Mao","year":"2023"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1051\/itmconf\/20182300037"},{"volume-title":"Multi-class metrics made simple, part ii: the f1-score","year":"2023","author":"Shmueli","key":"ref29"}],"event":{"name":"2024 IEEE 14th International Symposium on Chinese Spoken Language Processing (ISCSLP)","start":{"date-parts":[[2024,11,7]]},"location":"Beijing, China","end":{"date-parts":[[2024,11,10]]}},"container-title":["2024 IEEE 14th International Symposium on Chinese Spoken Language Processing (ISCSLP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10799944\/10799969\/10800741.pdf?arnumber=10800741","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,13]],"date-time":"2025-01-13T19:37:20Z","timestamp":1736797040000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10800741\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,7]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/iscslp63861.2024.10800741","relation":{},"subject":[],"published":{"date-parts":[[2024,11,7]]}}}