{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:29:56Z","timestamp":1730305796550,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/wifs.2018.8630783","type":"proceedings-article","created":{"date-parts":[[2019,1,31]],"date-time":"2019-01-31T19:51:36Z","timestamp":1548964296000},"page":"1-7","source":"Crossref","is-referenced-by-count":6,"title":["Revealing the processing history of pitch-shifted voice using CNNs"],"prefix":"10.1109","author":[{"given":"Lihua","family":"Wang","sequence":"first","affiliation":[]},{"given":"Huixin","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Xiaodan","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Xiangui","family":"Kang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.21437\/Interspeech.2016-1280"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TIFS.2014.2301912"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1016\/j.dsp.2015.06.010"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1016\/0167-6393(94)00054-E"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1037\/0096-1523.12.3.295"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1121\/1.400476"},{"key":"ref16","article-title":"Generalization and network design strategies","author":"lecun","year":"1989","journal-title":"Proc of the International Conference on Connectionism in Perspective"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/ICASSP.2013.6639347"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/WACV.2016.7477557"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/LSP.2015.2438008"},{"year":"2012","journal-title":"Time-scale\/pitch Modification Tools for Matlab","key":"ref4"},{"year":"2010","journal-title":"2003 NIST Speaker Recognition Evaluation Database","key":"ref27"},{"year":"2012","journal-title":"Praat Doing phonetics by computer","key":"ref3"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/978-3-540-71505-4_7","article-title":"Voice Disguise and Automatic Detection: Review and Perspectives","volume":"4391","author":"perrot","year":"2005","journal-title":"Proceedings of the Workshop on Progress in Nonlinear Speech Processing"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TASL.2007.899236"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1016\/j.forsciint.2007.05.019"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/ODYSSEY.2006.248123"},{"year":"2013","journal-title":"Cool Edit Pro Is Now Adobe Audition","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1121\/1.2935782"},{"year":"2017","journal-title":"Audacity A Free Multi-track Audio Editor and Recorder","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1145\/3065386"},{"year":"2012","journal-title":"TIMIT Acoustic-Phonetic Continuous Speech Corpus","key":"ref22"},{"key":"ref21","article-title":"A Multi-Purpose Image Counteranti-forensic Method Using Convolutional Neural Networks","author":"yu","year":"2016","journal-title":"Proceedings of 2016 International Workshop on Digital Forensics and Watermarking"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/ICASSP.2013.6639067"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/BTAS.2013.6712706"},{"year":"2013","journal-title":"Advanced Utilization of Multimedia to Promote Higher Education Reform Speech Database (UME)","key":"ref26"},{"key":"ref25","article-title":"Spoofing Detection with DNN and One-class SVM for the ASVspoof 2015 Challenge","author":"villalba","year":"2015","journal-title":"Proceedings of INTERSPEECH 2015 Annual Conference of the International Speech Communication Association"}],"event":{"name":"2018 IEEE International Workshop on Information Forensics and Security (WIFS)","start":{"date-parts":[[2018,12,11]]},"location":"Hong Kong, Hong Kong","end":{"date-parts":[[2018,12,13]]}},"container-title":["2018 IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8627366\/8630758\/08630783.pdf?arnumber=8630783","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T19:11:54Z","timestamp":1643224314000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8630783\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/wifs.2018.8630783","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}