{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:30:11Z","timestamp":1730305811179,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/wifs47025.2019.9035106","type":"proceedings-article","created":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T03:17:42Z","timestamp":1584415062000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Blind Vocoder Speech Reconstruction using Generative Adversarial Networks"],"prefix":"10.1109","author":[{"given":"Yoav","family":"Blum","sequence":"first","affiliation":[]},{"given":"David","family":"Burshtein","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"265","article-title":"Tensorflow: A system for large-scale machine learning","author":"abadi","year":"2016","journal-title":"USENIX Symp on Operating Systems Design & Implementation"},{"key":"ref32","article-title":"DARPA TIMIT acoustic-phonetic continous speech corpus CD-ROM. NIST speech disc 1-1.1","volume":"93","author":"garofolo","year":"1993","journal-title":"NASA STI\/Recon Technical Report N"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1137\/0901021"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/29.7548"},{"key":"ref35","first-page":"311","article-title":"BLEU: a method for automatic evaluation of machine translation","author":"papineni","year":"2002","journal-title":"Proceedings of the 40th Annual Meeting on Association for Computational Linguistics Association for Computational Linguistics"},{"key":"ref34","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014","journal-title":"International Conference on Learning Representations"},{"key":"ref10","first-page":"125","article-title":"Emotion recognition by speech signals","author":"kwon","year":"2003","journal-title":"8th European Conference on Speech Communication and Technology"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2002.5745552"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/97.736233"},{"key":"ref13","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref14","first-page":"214","article-title":"Wasserstein GAN","author":"arjovsky","year":"2017","journal-title":"International Conference on Machine Learning"},{"key":"ref15","first-page":"5767","article-title":"Improved training of wasserstein GANs","author":"gulrajani","year":"2017","journal-title":"Advances in neural information processing systems"},{"article-title":"Conditional CycleGAN for attribute guided face image generation","year":"2017","author":"lu","key":"ref16"},{"key":"ref17","first-page":"1809","article-title":"Improved HMM-based vocoder for statistical synthesizers","author":"erro","year":"2011","journal-title":"12th Annual Conference of the International Speech Communication Association"},{"key":"ref18","first-page":"5679","article-title":"Speech waveform synthesis from MFCC sequences with generative adversarial networks","author":"juvela","year":"2018","journal-title":"IEEE International Conference on Acoustics Speech and Signal Processing"},{"article-title":"Parallel-data-free voice conversion using cycle-consistent adversarial networks","year":"2017","author":"kaneko","key":"ref19"},{"key":"ref28","article-title":"Conditional generative adversarial nets","author":"mirza","year":"2014","journal-title":"Advances in neural information processing systems"},{"article-title":"Reverse engineering of communications networks: evolution and challenges","year":"2017","author":"teimouri","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1314389.1314399"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/EURCON.2003.1248009"},{"journal-title":"Deep Learning","year":"2016","author":"goodfellow","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/11790754_2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1985.13340"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2011.6123128"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2416685"},{"key":"ref9","first-page":"2429","article-title":"An accurate and robust gender identification algorithm","author":"demarco","year":"2011","journal-title":"12th Annual Conference of the International Speech Communication Association"},{"key":"ref1","first-page":"1060","article-title":"Generative adversarial text to image synthesis","author":"reed","year":"2016","journal-title":"33rd International Conference on Machine Learning"},{"article-title":"StarGAN-VC: Nonparallel many-to-many voice conversion with star generative adversarial networks","year":"2018","author":"kameoka","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/29.1651"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICECOM.2003.1290965"},{"year":"0","author":"mondal","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/b97391"},{"key":"ref26","volume":"338","author":"villani","year":"2008","journal-title":"Optimal Transport Old and New"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1985.1168147"}],"event":{"name":"2019 IEEE International Workshop on Information Forensics and Security (WIFS)","start":{"date-parts":[[2019,12,9]]},"location":"Delft, Netherlands","end":{"date-parts":[[2019,12,12]]}},"container-title":["2019 IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9034067\/9034979\/09035106.pdf?arnumber=9035106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T20:26:08Z","timestamp":1658262368000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9035106\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/wifs47025.2019.9035106","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}