{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T00:21:02Z","timestamp":1769214062737,"version":"3.49.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/slt.2018.8639511","type":"proceedings-article","created":{"date-parts":[[2019,2,14]],"date-time":"2019-02-14T23:36:34Z","timestamp":1550187394000},"page":"132-138","source":"Crossref","is-referenced-by-count":9,"title":["An Experimental Study on Audio Replay Attack Detection Using Deep Neural Networks"],"prefix":"10.1109","author":[{"given":"Bekir","family":"Bakar","sequence":"first","affiliation":[]},{"given":"Cemal","family":"Hanilci","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2012.2201472"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4960401"},{"key":"ref12","first-page":"2037","article-title":"ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge","author":"wu","year":"2015","journal-title":"Proc INTERSPEECH"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"2","DOI":"10.21437\/Interspeech.2017-1111","article-title":"The ASVspoof 2017 challenge: Assessing the limits of replay spoofing attack detection","author":"kinnunen","year":"2017","journal-title":"Proc INTERSPEECH"},{"key":"ref14","first-page":"2087","article-title":"A comparison of features for synthetic speech detection","author":"sahidullah","year":"2015","journal-title":"Proc INTERSPEECH"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2017-456"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2017-776"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"97","DOI":"10.21437\/Interspeech.2017-1377","article-title":"Replay attack detection using dnn for channel discrimination","author":"nagarsheth","year":"2017","journal-title":"Proc INTERSPEECH"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"82","DOI":"10.21437\/Interspeech.2017-360","article-title":"Audio replay attack detection with deep learning frameworks","author":"lavrentyeva","year":"2017","journal-title":"Proc INTERSPEECH"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/BIOSIG.2016.7736933"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1895","DOI":"10.21437\/Eurospeech.1997-504","article-title":"The DET curve in assessment of detection task performance","author":"martin","year":"1997","journal-title":"Proc EUROSPEECH"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2015.7358783"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1980.1163420"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2437652"},{"key":"ref6","first-page":"131","article-title":"Speaker verification performance degradation against spoofing and tampering attacks","author":"villalba","year":"2010","journal-title":"Proc FALA"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3080-9"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2014.10.005"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178810"},{"key":"ref2","first-page":"1","article-title":"Re-assessing the threat of replay spoofing attacks against automatic speaker verification","author":"alegre","year":"2014","journal-title":"Proc BIOSIG"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2015.05.002"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2009.08.009"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2017.2743340"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623612"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2016-41"},{"key":"ref24","first-page":"1929","article-title":"Dropout: A simple way to prevent neural networks from overfitting","author":"srivastava","year":"2014","journal-title":"Journal of Machine Learning Research"},{"key":"ref23","first-page":"448","article-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift","author":"ioffe","year":"2015","journal-title":"Proc International Conference on Machine Learning"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"296","DOI":"10.21437\/Odyssey.2018-42","article-title":"Asvspoof 2017 version 2.0: meta-data analysis and baseline enhancements","author":"delgado","year":"2018","journal-title":"Proc Odyssey"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7953187"}],"event":{"name":"2018 IEEE Spoken Language Technology Workshop (SLT)","location":"Athens, Greece","start":{"date-parts":[[2018,12,18]]},"end":{"date-parts":[[2018,12,21]]}},"container-title":["2018 IEEE Spoken Language Technology Workshop (SLT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8632666\/8639030\/08639511.pdf?arnumber=8639511","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,11]],"date-time":"2022-09-11T22:19:25Z","timestamp":1662934765000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8639511\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/slt.2018.8639511","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}