{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:25:12Z","timestamp":1774365912742,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":87,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,13]],"date-time":"2022-11-13T00:00:00Z","timestamp":1668297600000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS2114161,CNS2114220,CCF1909963,CCF2028876"],"award-info":[{"award-number":["CNS2114161,CNS2114220,CCF1909963,CCF2028876"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","award":["FA87501820058"],"award-info":[{"award-number":["FA87501820058"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484755","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"1884-1899","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Robust Detection of Machine-induced Audio Attacks in Intelligent Audio Systems with Microphone Array"],"prefix":"10.1145","author":[{"given":"Zhuohang","family":"Li","sequence":"first","affiliation":[{"name":"University of Tennessee, Knoxville, TN, USA"}]},{"given":"Cong","family":"Shi","sequence":"additional","affiliation":[{"name":"Rutgers University, New Brunswick, NJ, USA"}]},{"given":"Tianfang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Rutgers University, New Brunswick, NJ, USA"}]},{"given":"Yi","family":"Xie","sequence":"additional","affiliation":[{"name":"Rutgers University, New Brunswick, NJ, USA"}]},{"given":"Jian","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Tennessee, Knoxville, TN, USA"}]},{"given":"Bo","family":"Yuan","sequence":"additional","affiliation":[{"name":"Rutgers University, New Brunswick, NJ, USA"}]},{"given":"Yingying","family":"Chen","sequence":"additional","affiliation":[{"name":"Rutgers University, New Brunswick, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/cloud.google.com\/text-to-speech\/docs","author":"Speech Google","year":"2020","unstructured":"2020. Google Text-to-Speech. (2020). https:\/\/cloud.google.com\/text-to-speech\/docs"},{"key":"e_1_3_2_1_2_1","unstructured":"2021. Hidden Voice Commands. (2021). https:\/\/www.hiddenvoicecommands.com\/demo"},{"key":"e_1_3_2_1_3_1","unstructured":"2021. The LJ Speech Dataset. (2021). https:\/\/keithito.com\/LJ-Speech-Dataset\/"},{"key":"e_1_3_2_1_4_1","unstructured":"2021. Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems. (2021). https:\/\/sites.google.com\/view\/practicalhiddenvoice\/home"},{"key":"e_1_3_2_1_5_1","unstructured":"2021. Ultrasonic Dynamic Speaker Vifa. (2021). http:\/\/www.avisoft.com\/playback\/vifa\/"},{"key":"e_1_3_2_1_6_1","unstructured":"2021. ASVspoof 2021: Automatic Speaker Verification Spoofing and Countermeasures Challenge Evaluation Plan. (2021). https:\/\/www.asvspoof.org\/asvspoof2021\/asvspoof2021_evaluation_plan.pdf"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Hadi Abdullah Washington Garcia Christian Peeters Patrick Traynor Kevin R. B. Butler and Joseph Wilson. 2019. Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems. (2019). arxiv: cs.CR\/1904.05734","DOI":"10.14722\/ndss.2019.23362"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8461912"},{"key":"e_1_3_2_1_9_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Ahmed Muhammad Ejaz","year":"2020","unstructured":"Muhammad Ejaz Ahmed, Il-Youp Kwak, Jun Ho Huh, Iljoo Kim, Taekkyung Oh, and Hyoungshick Kim. 2020. Void: A fast and light voice liveness detection system. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 2685--2702. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/ahmed-muhammad"},{"key":"e_1_3_2_1_10_1","volume-title":"Microphone array signal processing","author":"Benesty Jacob","unstructured":"Jacob Benesty, Jingdong Chen, and Yiteng Huang. 2008. Microphone array signal processing. Vol. 1. Springer Science & Business Media."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196545"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212505"},{"key":"e_1_3_2_1_13_1","volume-title":"25th $$USENIX$$ Security Symposium ($$USENIX$$ Security 16). 513--530.","author":"Carlini Nicholas","unstructured":"Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, and Wenchao Zhou. 2016. Hidden voice commands. In 25th $$USENIX$$ Security Symposium ($$USENIX$$ Security 16). 513--530."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00009"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.133"},{"key":"e_1_3_2_1_16_1","volume-title":"Quantized CNN: A unified approach to accelerate and compress convolutional networks","author":"Cheng Jian","year":"2017","unstructured":"Jian Cheng, Jiaxiang Wu, Cong Leng, Yuhang Wang, and Qinghao Hu. 2017. Quantized CNN: A unified approach to accelerate and compress convolutional networks. IEEE transactions on neural networks and learning systems, Vol. 29, 10 (2017), 4730--4743."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2012.2201472"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00024"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117823"},{"key":"e_1_3_2_1_20_1","volume-title":"International conference on machine learning. PMLR, 1180--1189","author":"Ganin Yaroslav","year":"2015","unstructured":"Yaroslav Ganin and Victor Lempitsky. 2015. Unsupervised domain adaptation by backpropagation. International conference on machine learning. PMLR, 1180--1189."},{"key":"e_1_3_2_1_21_1","first-page":"1","article-title":"Voice In Ear: Spoofing-Resistant and Passphrase-Independent Body Sound Authentication","volume":"5","author":"Gao Yang","year":"2021","unstructured":"Yang Gao, Yincheng Jin, Jagmohan Chauhan, Seokmin Choi, Jiyang Li, and Zhanpeng Jin. 2021. Voice In Ear: Spoofing-Resistant and Passphrase-Independent Body Sound Authentication. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, Vol. 5, 1 (2021), 1--25.","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"e_1_3_2_1_22_1","volume-title":"ReMASC: realistic replay attack corpus for voice controlled systems. arXiv preprint arXiv:1904.03365","author":"Gong Yuan","year":"2019","unstructured":"Yuan Gong, Jian Yang, Jacob Huber, Mitchell MacKnight, and Christian Poellabauer. 2019. ReMASC: realistic replay attack corpus for voice controlled systems. arXiv preprint arXiv:1904.03365 (2019)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2020.2996908"},{"key":"e_1_3_2_1_24_1","volume-title":"2017 10Th international conference on electrical and electronics engineering (ELECO). IEEE, 1187--1191","author":"Cemal Hanilcc","year":"2017","unstructured":"Cemal Hanilcc i. 2017. Features and classifiers for replay spoofing attack detection. In 2017 10Th international conference on electrical and electronics engineering (ELECO). IEEE, 1187--1191."},{"key":"e_1_3_2_1_25_1","volume-title":"Ng","author":"Hannun Awni","year":"2014","unstructured":"Awni Hannun, Carl Case, Jared Casper, Bryan Catanzaro, Greg Diamos, Erich Elsen, Ryan Prenger, Sanjeev Satheesh, Shubho Sengupta, Adam Coates, and Andrew Y. Ng. 2014. Deep Speech: Scaling up end-to-end speech recognition. (2014). arxiv: cs.CL\/1412.5567"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3345429"},{"key":"e_1_3_2_1_28_1","volume-title":"Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861","author":"Howard Andrew G","year":"2017","unstructured":"Andrew G Howard, Menglong Zhu, Bo Chen, Dmitry Kalenichenko, Weijun Wang, Tobias Weyand, Marco Andreetto, and Hartwig Adam. 2017. Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861 (2017)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"e_1_3_2_1_30_1","volume-title":"WaveGuard: Understanding and Mitigating Audio Adversarial Examples. arXiv preprint arXiv:2103.03344","author":"Hussain Shehzeen","year":"2021","unstructured":"Shehzeen Hussain, Paarth Neekhara, Shlomo Dubnov, Julian McAuley, and Farinaz Koushanfar. 2021. WaveGuard: Understanding and Mitigating Audio Adversarial Examples. arXiv preprint arXiv:2103.03344 (2021)."},{"key":"e_1_3_2_1_31_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Tomi Kinnunen Md Sahidullah H\u00e9ctor Delgado Massimiliano Todisco Nicholas Evans Junichi Yamagishi and Kong Aik Lee. 2017. The ASVspoof 2017 challenge: Assessing the limits of replay spoofing attack detection. (2017).","DOI":"10.21437\/Interspeech.2017-1111"},{"key":"e_1_3_2_1_33_1","volume-title":"Thirteenth Annual Conference of the International Speech Communication Association .","author":"De Leon Phillip L","year":"2012","unstructured":"Phillip L De Leon, Bryan Stewart, and Junichi Yamagishi. 2012. Synthetic speech discrimination using pitch pattern statistics derived from image analysis. In Thirteenth Annual Conference of the International Speech Communication Association ."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2946140"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3376897.3377856"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423348"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682739"},{"key":"e_1_3_2_1_38_1","volume-title":"Rethinking the value of network pruning. arXiv preprint arXiv:1810.05270","author":"Liu Zhuang","year":"2018","unstructured":"Zhuang Liu, Mingjie Sun, Tinghui Zhou, Gao Huang, and Trevor Darrell. 2018. Rethinking the value of network pruning. arXiv preprint arXiv:1810.05270 (2018)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_30"},{"key":"e_1_3_2_1_40_1","volume-title":"Discrete-time signal processing","author":"Oppenheim Alan V","unstructured":"Alan V Oppenheim, John R Buck, and Ronald W Schafer. 2001. Discrete-time signal processing. Vol. 2 .Upper Saddle River, NJ: Prentice Hall."},{"key":"e_1_3_2_1_41_1","volume-title":"15th $$USENIX$$ Symposium on Networked Systems Design and Implementation ($$NSDI$$ 18). 547--560.","author":"Roy Nirupam","unstructured":"Nirupam Roy, Sheng Shen, Haitham Hassanieh, and Romit Roy Choudhury. 2018. Inaudible voice commands: The long-range attack and defense. In 15th $$USENIX$$ Symposium on Networked Systems Design and Implementation ($$NSDI$$ 18). 547--560."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Md Sahidullah Tomi Kinnunen and Cemal Hanilcc i. 2015. A comparison of features for synthetic speech detection. (2015).","DOI":"10.21437\/Interspeech.2015-472"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2398812"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Jonathan Shen Ruoming Pang Ron J. Weiss Mike Schuster Navdeep Jaitly Zongheng Yang Zhifeng Chen Yu Zhang Yuxuan Wang RJ Skerry-Ryan Rif A. Saurous Yannis Agiomyrgiannakis and Yonghui Wu. 2018a. Natural TTS Synthesis by Conditioning WaveNet on Mel Spectrogram Predictions. (2018). arxiv: cs.CL\/1712.05884","DOI":"10.1109\/ICASSP.2018.8461368"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11784"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427259"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Sayaka Shiota Fernando Villavicencio Junichi Yamagishi Nobutaka Ono Isao Echizen and Tomoko Matsui. 2015. Voice liveness detection algorithms based on pop noise caused by human breath for automatic speaker verification. In Sixteenth annual conference of the international speech communication association .","DOI":"10.21437\/Interspeech.2015-92"},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings of the International Conference on Learning Representation. 1--14","author":"Simonyan Karen","year":"2015","unstructured":"Karen Simonyan and Andrew Zisserman. 2015. Very deep convolutional networks for large-scale image recognition. In Proceedings of the International Conference on Learning Representation. 1--14."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"e_1_3_2_1_52_1","volume-title":"Proceedings of the Sixteenth Annual Conference of the International Speech Communication Association.","author":"Lopez-Moreno Ignacio","year":"2015","unstructured":"Yu-hsin Chen, Ignacio Lopez-Moreno, Tara N Sainath, Mirk\u00f3 Visontai, Raziel Alvarez, and Carolina Parada. 2015. Locally-connected and convolutional neural networks for small footprint speaker recognition. In Proceedings of the Sixteenth Annual Conference of the International Speech Communication Association."},{"key":"e_1_3_2_1_53_1","volume-title":"Master handbook of acoustics","author":"Alton Everest F","unstructured":"F Alton Everest and Ken C Pohlmann. 2015. Master handbook of acoustics. McGraw-Hill Education ."},{"key":"e_1_3_2_1_54_1","volume-title":"STC antispoofing systems for the ASVspoof2019 challenge. arXiv preprint arXiv:1904.05576 (","author":"Lavrentyeva Galina","year":"2019","unstructured":"Galina Lavrentyeva, Sergey Novoselov, Andzhukaev Tseren, Marina Volkova, Artem Gorlanov, and Alexandr Kozlov. 2019. STC antispoofing systems for the ASVspoof2019 challenge. arXiv preprint arXiv:1904.05576 ( 2019)."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2960369"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SLT.2018.8639585"},{"key":"e_1_3_2_1_57_1","volume-title":"Proceedings of the 29th $$USENIX$$ Security Symposium ($$USENIX$$ Security 20)","author":"Sugawara Takeshi","year":"2020","unstructured":"Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, and Kevin Fu. 2020. Light commands: laser-based audio injection attacks on voice-controllable systems. In Proceedings of the 29th $$USENIX$$ Security Symposium ($$USENIX$$ Security 20). 2631--2648 ."},{"key":"e_1_3_2_1_58_1","volume-title":"Spoofing attack detection using the non-linear fusion of sub-band classifiers. arXiv preprint arXiv:2005.10393 (","author":"Tak Hemlata","year":"2020","unstructured":"Hemlata Tak, Jose Patino, Andreas Nautsch, Nicholas Evans, and Massimiliano Todisco. 2020. Spoofing attack detection using the non-linear fusion of sub-band classifiers. arXiv preprint arXiv:2005.10393 ( 2020)."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9414234"},{"key":"e_1_3_2_1_60_1","volume-title":"ASVspoof 2019: Future horizons in spoofed and fake audio detection. arXiv preprint arXiv:1904.05441 (","author":"Todisco Massimiliano","year":"2019","unstructured":"Massimiliano Todisco, Xin Wang, Ville Vestman, Md Sahidullah, H\u00e9ctor Delgado, Andreas Nautsch, Junichi Yamagishi, Nicholas Evans, Tomi Kinnunen, and Kong Aik Lee. 2019. ASVspoof 2019: Future horizons in spoofed and fake audio detection. arXiv preprint arXiv:1904.05441 ( 2019)."},{"key":"e_1_3_2_1_61_1","volume-title":"Low latency end-to-end streaming speech recognition with a scout network. arXiv preprint arXiv:2003.10369 (","author":"Wang Chengyi","year":"2020","unstructured":"Chengyi Wang, Yu Wu, Shujie Liu, Jinyu Li, Liang Lu, Guoli Ye, and Ming Zhou. 2020. Low latency end-to-end streaming speech recognition with a scout network. arXiv preprint arXiv:2003.10369 ( 2020)."},{"key":"e_1_3_2_1_62_1","volume-title":"A comparative study on recent neural spoofing countermeasures for synthetic speech detection. arXiv preprint arXiv:2103.11326 (","author":"Wang Xin","year":"2021","unstructured":"Xin Wang and Junich Yamagishi. 2021. A comparative study on recent neural spoofing countermeasures for synthetic speech detection. arXiv preprint arXiv:2103.11326 ( 2021)."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2833032"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354248"},{"key":"e_1_3_2_1_65_1","volume-title":"Network and Distributed Systems Security (NDSS) Symposium.","author":"Zhang Guoming","year":"2021","unstructured":"Guoming Zhang, Xiaoyu Ji, Xinfeng Li, Gang Qu, and Wenyuan Xu. 2021. EarArray: Defending against Dolphin Attack via Acoustic Attenuation. In Network and Distributed Systems Security (NDSS) Symposium."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2016-41"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.316"},{"key":"e_1_3_2_1_68_1","volume-title":"9th $$USENIX$$ Workshop on Offensive Technologies ($$WOOT$$ 15) .","author":"Vaidya Tavish","unstructured":"Tavish Vaidya, Yuankai Zhang, Micah Sherr, and Clay Shields. 2015. Cocaine noodles: exploiting the gap between human and machine speech recognition. In 9th $$USENIX$$ Workshop on Offensive Technologies ($$WOOT$$ 15) ."},{"key":"e_1_3_2_1_69_1","unstructured":"Aaron van den Oord Sander Dieleman Heiga Zen Karen Simonyan Oriol Vinyals Alex Graves Nal Kalchbrenner Andrew Senior and Koray Kavukcuoglu. 2016. WaveNet: A Generative Model for Raw Audio. (2016). arxiv: cs.SD\/1609.03499"},{"key":"e_1_3_2_1_70_1","article-title":"Visualizing data using t-SNE","volume":"9","author":"der Maaten Laurens Van","year":"2008","unstructured":"Laurens Van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. Journal of machine learning research, Vol. 9, 11 (2008).","journal-title":"Journal of machine learning research"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359830"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2015-473"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413716"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417254"},{"key":"e_1_3_2_1_75_1","volume-title":"Saurous","author":"Wang Yuxuan","year":"2017","unstructured":"Yuxuan Wang, RJ Skerry-Ryan, Daisy Stanton, Yonghui Wu, Ron J. Weiss, Navdeep Jaitly, Zongheng Yang, Ying Xiao, Zhifeng Chen, Samy Bengio, Quoc Le, Yannis Agiomyrgiannakis, Rob Clark, and Rif A. Saurous. 2017. Tacotron: Towards End-to-End Speech Synthesis. (2017). arxiv: cs.CL\/1703.10135"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"crossref","unstructured":"Marcin Witkowski Stanislaw Kacprzak Piotr Zelasko Konrad Kowalczyk and Jakub Galka. 2017. Audio Replay Attack Detection Using High-Frequency Features. In Interspeech. 27--31.","DOI":"10.21437\/Interspeech.2017-776"},{"key":"e_1_3_2_1_77_1","volume-title":"Principal component analysis. Chemometrics and intelligent laboratory systems","author":"Wold Svante","year":"1987","unstructured":"Svante Wold, Kim Esbensen, and Paul Geladi. 1987. Principal component analysis. Chemometrics and intelligent laboratory systems, Vol. 2, 1--3 (1987), 37--52."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPA.2013.6694344"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2015-465"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2019.8902985"},{"key":"e_1_3_2_1_81_1","volume-title":"Robust audio adversarial example for a physical attack. arXiv preprint arXiv:1810.11793","author":"Yakura Hiromu","year":"2018","unstructured":"Hiromu Yakura and Jun Sakuma. 2018. Robust audio adversarial example for a physical attack. arXiv preprint arXiv:1810.11793 (2018)."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053288"},{"key":"e_1_3_2_1_83_1","volume-title":"Characterizing audio adversarial examples using temporal dependency. arXiv preprint arXiv:1809.10875","author":"Yang Zhuolin","year":"2018","unstructured":"Zhuolin Yang, Bo Li, Pin-Yu Chen, and Dawn Song. 2018. Characterizing audio adversarial examples using temporal dependency. arXiv preprint arXiv:1809.10875 (2018)."},{"key":"e_1_3_2_1_84_1","volume-title":"Commandersong: A systematic approach for practical adversarial voice recognition. In 27th $$USENIX$$ Security Symposium ($$USENIX$$ Security 18). 49--64.","author":"Yuan Xuejing","year":"2018","unstructured":"Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, and Carl A Gunter. 2018. Commandersong: A systematic approach for practical adversarial voice recognition. In 27th $$USENIX$$ Security Symposium ($$USENIX$$ Security 18). 49--64."},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133962"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978296"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484755","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484755","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484755","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:50:31Z","timestamp":1763499031000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484755"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":87,"alternative-id":["10.1145\/3460120.3484755","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484755","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}