{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T13:09:32Z","timestamp":1730293772121,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,8,24]],"date-time":"2022-08-24T00:00:00Z","timestamp":1661299200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,8,24]],"date-time":"2022-08-24T00:00:00Z","timestamp":1661299200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,8,24]]},"DOI":"10.1109\/rtsi55261.2022.9905158","type":"proceedings-article","created":{"date-parts":[[2022,10,4]],"date-time":"2022-10-04T19:52:55Z","timestamp":1664913175000},"page":"50-54","source":"Crossref","is-referenced-by-count":1,"title":["Detecting Replay Attack on Voice-Controlled Systems using Small Neural Networks"],"prefix":"10.1109","author":[{"given":"Nadeen","family":"Ahmed","sequence":"first","affiliation":[{"name":"American University of Sharjah,Computer Science and Engineering,Sharjah,UAE"}]},{"given":"Jowaria","family":"Khan","sequence":"additional","affiliation":[{"name":"American University of Sharjah,Computer Science and Engineering,Sharjah,UAE"}]},{"given":"Nouran","family":"Sheta","sequence":"additional","affiliation":[{"name":"American University of Sharjah,Computer Science and Engineering,Sharjah,UAE"}]},{"given":"Rahma","family":"Tarek","sequence":"additional","affiliation":[{"name":"American University of Sharjah,Computer Science and Engineering,Sharjah,UAE"}]},{"given":"Imran","family":"Zualkernan","sequence":"additional","affiliation":[{"name":"American University of Sharjah,Computer Science and Engineering,Sharjah,UAE"}]},{"given":"Fadi","family":"Aloul","sequence":"additional","affiliation":[{"name":"American University of Sharjah,Computer Science and Engineering,Sharjah,UAE"}]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"journal-title":"Cross Validated","article-title":"Calculate EER from FAR and FRR?","year":"2016","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2671435"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-2039"},{"key":"ref12","article-title":"Deep Residual Learning for Image Recognition","author":"he","year":"2015","journal-title":"arXiv arXiv 1512 03385"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053303"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI47803.2020.9308489"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3012411"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2017.01.001"},{"key":"ref17","first-page":"1","article-title":"Audio replay spoofing attack detection using deep learning feature and long-short-term memory recurrent neural network","author":"huang","year":"2021","journal-title":"AIIPCC 2021 The Second International Conference on Artificial Intelligence Information Processing and Cloud Computing"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.specom.2021.12.003","article-title":"Uncertainty assessment for detection of spoofing attacks to speaker verification systems using a Bayesian approach","volume":"137","author":"s\u00fcsl\u00fc","year":"2022","journal-title":"Speech Commun"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11235-x"},{"key":"ref28","article-title":"CNN Long Short-Term Memory Networks","author":"brownlee","year":"2017","journal-title":"Machine Learning Mastery"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.21437\/Eurospeech.1997-504"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2020.107398"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2018.8487334"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/i-PACT52855.2021.9696686"},{"journal-title":"2 1 Gaussian mixture models &#x2014; scikit-learn 0 15-git documentation","year":"2022","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.116597"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-2312(03)00431-4"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2020.2999828"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-816801-1.00002-5"},{"key":"ref9","first-page":"86","author":"lavrentyeva","year":"2017","journal-title":"Audio Replay Attack Detection with Deep Learning Frameworks"},{"key":"ref1","first-page":"2355","author":"gong","year":"2019","journal-title":"ReMASC Realistic Replay Attack Corpus for Voice Controlled Systems"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9054322"},{"journal-title":"Mobile Wearable and Ubiquitous Technologies","article-title":"Combating Replay Attacks Against Voice Assistants | Proceedings of the ACM on Interactive","year":"2022","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791200"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI51800.2020.00036"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3000641"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-1991"},{"key":"ref25","article-title":"Voice Recognition Algorithms using Mel Frequency Cepstral Coefficient (MFCC) and Dynamic Time Warping (DTW) Techniques","author":"muda","year":"2010","journal-title":"arXiv arXiv 1003 4083"}],"event":{"name":"2022 IEEE 7th Forum on Research and Technologies for Society and Industry Innovation (RTSI)","start":{"date-parts":[[2022,8,24]]},"location":"Paris, France","end":{"date-parts":[[2022,8,26]]}},"container-title":["2022 IEEE 7th Forum on Research and Technologies for Society and Industry Innovation (RTSI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9904954\/9905077\/09905158.pdf?arnumber=9905158","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T22:52:36Z","timestamp":1667515956000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9905158\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,24]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/rtsi55261.2022.9905158","relation":{},"subject":[],"published":{"date-parts":[[2022,8,24]]}}}