{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T05:14:24Z","timestamp":1772601264170,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100014236","name":"UC Berkeley Center For Long-Term Cybersecurity (CLTC)","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100014236","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1109\/wifs58808.2023.10374911","type":"proceedings-article","created":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T19:32:20Z","timestamp":1704137540000},"page":"1-6","source":"Crossref","is-referenced-by-count":16,"title":["Single and Multi-Speaker Cloned Voice Detection: From Perceptual to Learned Features"],"prefix":"10.1109","author":[{"given":"Sarah","family":"Barrington","sequence":"first","affiliation":[{"name":"School of Information"}]},{"given":"Romit","family":"Barua","sequence":"additional","affiliation":[{"name":"School of Information"}]},{"given":"Gautham","family":"Koorma","sequence":"additional","affiliation":[{"name":"School of Information"}]},{"given":"Hany","family":"Farid","sequence":"additional","affiliation":[{"name":"School of Information"}]}],"member":"263","reference":[{"key":"ref1","first-page":"104","article-title":"Detecting AIsynthesized speech using bispectral analysis","volume-title":"International Conference on Computer Vision and Pattern Recognition Workshop","author":"AIBadawy","year":"2019"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/a15050155"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-37742-6_21"},{"key":"ref4","first-page":"2691","article-title":"Who are you (I really wanna know)? Detecting audio deepfakes through vocal tract reconstruction","volume-title":"USENIX Security Symposium","author":"Blue","year":"2022"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2216035119"},{"key":"ref6","first-page":"2709","article-title":"Yourtts: Towards zero-shot multi-speaker tts and zero-shot voice conversion for everyone","volume-title":"International Conference on Machine Learning","author":"Casanova","year":"2022"},{"key":"ref7","volume-title":"How I broke into a bank account with an AI-generated voice","author":"Cox"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2012-135"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1873951.1874246"},{"key":"ref10","author":"Frank","year":"2021","journal-title":"Wavefake: A data set to facilitate audio deepfake detection"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.4930"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1121\/1.399423"},{"key":"ref13","article-title":"That panicky call from a relative? It could be a thief using a voice clone","volume-title":"FTC warns","author":"Hernandez"},{"key":"ref14","volume-title":"The lj speech dataset","author":"Ito","year":"2017"},{"key":"ref15","volume-title":"Mom, these bad men have me\u2019: She believes scammers cloned her daughters voice in a fake kidnapping","author":"Karimi"},{"key":"ref16","volume-title":"Fake audio falsely claims to reveal private Biden comments","author":"Kelety"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9746806"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3552466.3556523"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2022-108"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/E88-A.1.280"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS55849.2022.9975428"},{"key":"ref22","first-page":"1786","article-title":"Detecting deepfake videos using digital watermarking","volume-title":"Asia-Pacific Signal and Information Processing Association Annual Summit and Conference","author":"Qureshi","year":"2021"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2020.3038524"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9414234"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-2279"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3552466.3556525"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9746939"}],"event":{"name":"2023 IEEE International Workshop on Information Forensics and Security (WIFS)","location":"N\u00fcrnberg, Germany","start":{"date-parts":[[2023,12,4]]},"end":{"date-parts":[[2023,12,7]]}},"container-title":["2023 IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10374479\/10374570\/10374911.pdf?arnumber=10374911","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T23:55:39Z","timestamp":1705103739000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10374911\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/wifs58808.2023.10374911","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]}}}