{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:57:47Z","timestamp":1773511067257,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":72,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,18]],"date-time":"2023-06-18T00:00:00Z","timestamp":1687046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,18]]},"DOI":"10.1145\/3581791.3596862","type":"proceedings-article","created":{"date-parts":[[2023,6,16]],"date-time":"2023-06-16T17:52:21Z","timestamp":1686937941000},"page":"219-232","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["\"Is this my president speaking?\" Tamper-proofing Speech in Live Recordings"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3963-9966","authenticated-orcid":false,"given":"Irtaza","family":"Shahid","sequence":"first","affiliation":[{"name":"Computer Science, University of Maryland, College Park, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5261-7780","authenticated-orcid":false,"given":"Nirupam","family":"Roy","sequence":"additional","affiliation":[{"name":"Computer Science, University of Maryland, College Park, MD, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2023,6,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Last accessed","year":"2022","unstructured":"https:\/\/www.congress.gov\/bill\/116th-congress\/house-bill\/3230. Last accessed 09 December 2022 . https:\/\/www.congress.gov\/bill\/116th-congress\/house-bill\/3230. Last accessed 09 December 2022."},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/faq.whatsapp.com\/820124435853543. Last accessed","author":"About","year":"2023","unstructured":"About end-to-end encryption. https:\/\/faq.whatsapp.com\/820124435853543. Last accessed 07 April 2023 . About end-to-end encryption. https:\/\/faq.whatsapp.com\/820124435853543. Last accessed 07 April 2023."},{"key":"e_1_3_2_1_3_1","volume-title":"https:\/\/contentauthenticity.org\/. Last accessed","author":"Content","year":"2022","unstructured":"Content authenticity initiative. https:\/\/contentauthenticity.org\/. Last accessed 09 December 2022 . Content authenticity initiative. https:\/\/contentauthenticity.org\/. Last accessed 09 December 2022."},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/signal.org\/docs\/. Last accessed","year":"2023","unstructured":"Documentation. https:\/\/signal.org\/docs\/. Last accessed 07 April 2023 . Documentation. https:\/\/signal.org\/docs\/. Last accessed 07 April 2023."},{"key":"e_1_3_2_1_5_1","volume-title":"https:\/\/about.fb.com\/wp-content\/uploads\/2016\/07\/messenger-secret-conversations-technical-whitepaper.pdf. Last accessed","year":"2023","unstructured":"messenger secret conversations technical whitepaper. https:\/\/about.fb.com\/wp-content\/uploads\/2016\/07\/messenger-secret-conversations-technical-whitepaper.pdf. Last accessed 07 April 2023 . messenger secret conversations technical whitepaper. https:\/\/about.fb.com\/wp-content\/uploads\/2016\/07\/messenger-secret-conversations-technical-whitepaper.pdf. Last accessed 07 April 2023."},{"key":"e_1_3_2_1_6_1","volume-title":"https:\/\/pypi.org\/project\/pyzbar\/. Last accessed","year":"2022","unstructured":"python one dimensional barcode and qr code reader. https:\/\/pypi.org\/project\/pyzbar\/. Last accessed 09 December 2022 . python one dimensional barcode and qr code reader. https:\/\/pypi.org\/project\/pyzbar\/. Last accessed 09 December 2022."},{"key":"e_1_3_2_1_7_1","volume-title":"https:\/\/pypi.org\/project\/qrcode\/. Last accessed","year":"2022","unstructured":"python qr code generator. https:\/\/pypi.org\/project\/qrcode\/. Last accessed 09 December 2022 . python qr code generator. https:\/\/pypi.org\/project\/qrcode\/. Last accessed 09 December 2022."},{"key":"e_1_3_2_1_8_1","volume-title":"https:\/\/docslib.org\/doc\/5559699\/securing-american-elections. Last accessed","author":"Securing","year":"2022","unstructured":"Securing american elections. https:\/\/docslib.org\/doc\/5559699\/securing-american-elections. Last accessed 09 December 2022 . Securing american elections. https:\/\/docslib.org\/doc\/5559699\/securing-american-elections. Last accessed 09 December 2022."},{"key":"e_1_3_2_1_9_1","volume-title":"2019--2020: 86th legislature. https:\/\/legiscan.com\/TX\/text\/SB751\/id\/2027638. Last accessed","author":"Texas","year":"2022","unstructured":"Texas sb751 : 2019--2020: 86th legislature. https:\/\/legiscan.com\/TX\/text\/SB751\/id\/2027638. Last accessed 09 December 2022 . Texas sb751: 2019--2020: 86th legislature. https:\/\/legiscan.com\/TX\/text\/SB751\/id\/2027638. Last accessed 09 December 2022."},{"key":"e_1_3_2_1_10_1","volume-title":"Apr","author":"Digital","year":"2021","unstructured":"Digital certificates and certificate authorities. https:\/\/www.ibm.com\/docs\/en\/db2\/11.1?topic=SSEPGG_11.1.0%2Fcom.ibm.db2.luw.admin.sec.doc%2Fdoc%2Fc0053515.html , Apr 2021 . Last accessed 09 December 2022. Digital certificates and certificate authorities. https:\/\/www.ibm.com\/docs\/en\/db2\/11.1?topic=SSEPGG_11.1.0%2Fcom.ibm.db2.luw.admin.sec.doc%2Fdoc%2Fc0053515.html, Apr 2021. Last accessed 09 December 2022."},{"key":"e_1_3_2_1_11_1","volume-title":"Limits of deepfake detection: A robust estimation viewpoint. arXiv preprint arXiv:1905.03493","author":"Agarwal Sakshi","year":"2019","unstructured":"Sakshi Agarwal and Lav R Varshney . Limits of deepfake detection: A robust estimation viewpoint. arXiv preprint arXiv:1905.03493 , 2019 . Sakshi Agarwal and Lav R Varshney. Limits of deepfake detection: A robust estimation viewpoint. arXiv preprint arXiv:1905.03493, 2019."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00338"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3498361.3539775"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3572864.3581587"},{"key":"e_1_3_2_1_15_1","first-page":"513","volume-title":"Usenix security symposium","author":"Carlini Nicholas","year":"2016","unstructured":"Nicholas Carlini , Pratyush Mishra , Tavish Vaidya , Yuankai Zhang , Micah Sherr , Clay Shields , David A Wagner , and Wenchao Zhou . Hidden voice commands . In Usenix security symposium , pages 513 -- 530 , 2016 . Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David A Wagner, and Wenchao Zhou. Hidden voice commands. In Usenix security symposium, pages 513--530, 2016."},{"key":"e_1_3_2_1_16_1","first-page":"1","volume-title":"Audio adversarial examples: Targeted attacks on speech-to-text. In 2018 IEEE security and privacy workshops (SPW)","author":"Carlini Nicholas","year":"2018","unstructured":"Nicholas Carlini and David Wagner . Audio adversarial examples: Targeted attacks on speech-to-text. In 2018 IEEE security and privacy workshops (SPW) , pages 1 -- 7 . IEEE , 2018 . Nicholas Carlini and David Wagner. Audio adversarial examples: Targeted attacks on speech-to-text. In 2018 IEEE security and privacy workshops (SPW), pages 1--7. IEEE, 2018."},{"key":"e_1_3_2_1_17_1","first-page":"2667","volume-title":"USENIX Security Symposium","author":"Chen Yuxuan","year":"2020","unstructured":"Yuxuan Chen , Xuejing Yuan , Jiangshan Zhang , Yue Zhao , Shengzhi Zhang , Kai Chen , and XiaoFeng Wang . Devil's whisper : A general approach for physical adversarial attacks against commercial black-box speech recognition devices . In USENIX Security Symposium , pages 2667 -- 2684 , 2020 . Yuxuan Chen, Xuejing Yuan, Jiangshan Zhang, Yue Zhao, Shengzhi Zhang, Kai Chen, and XiaoFeng Wang. Devil's whisper: A general approach for physical adversarial attacks against commercial black-box speech recognition devices. In USENIX Security Symposium, pages 2667--2684, 2020."},{"key":"e_1_3_2_1_18_1","volume-title":"What is transport layer security? https:\/\/www.cloudflare.com\/learning\/ssl\/transport-layer-security-tls\/. Last accessed","year":"2022","unstructured":"Cloudflare. What is transport layer security? https:\/\/www.cloudflare.com\/learning\/ssl\/transport-layer-security-tls\/. Last accessed 09 December 2022 . Cloudflare. What is transport layer security? https:\/\/www.cloudflare.com\/learning\/ssl\/transport-layer-security-tls\/. Last accessed 09 December 2022."},{"key":"e_1_3_2_1_19_1","volume-title":"Wordsig: Qr streams enabling platform-independent self-identification that's impossible to deepfake. arXiv preprint arXiv:2207.10806","author":"Critch Andrew","year":"2022","unstructured":"Andrew Critch . Wordsig: Qr streams enabling platform-independent self-identification that's impossible to deepfake. arXiv preprint arXiv:2207.10806 , 2022 . Andrew Critch. Wordsig: Qr streams enabling platform-independent self-identification that's impossible to deepfake. arXiv preprint arXiv:2207.10806, 2022."},{"key":"e_1_3_2_1_20_1","volume-title":"Real time speech enhancement in the waveform domain. arXiv preprint arXiv:2006.12847","author":"Defossez Alexandre","year":"2020","unstructured":"Alexandre Defossez , Gabriel Synnaeve , and Yossi Adi . Real time speech enhancement in the waveform domain. arXiv preprint arXiv:2006.12847 , 2020 . Alexandre Defossez, Gabriel Synnaeve, and Yossi Adi. Real time speech enhancement in the waveform domain. arXiv preprint arXiv:2006.12847, 2020."},{"key":"e_1_3_2_1_21_1","volume-title":"Signet: Convolutional siamese network for writer independent offline signature verification. arXiv preprint arXiv:1707.02131","author":"Dey Sounak","year":"2017","unstructured":"Sounak Dey , Anjan Dutta , J Ignacio Toledo , Suman K Ghosh , Josep Llad\u00f3s , and Umapada Pal . Signet: Convolutional siamese network for writer independent offline signature verification. arXiv preprint arXiv:1707.02131 , 2017 . Sounak Dey, Anjan Dutta, J Ignacio Toledo, Suman K Ghosh, Josep Llad\u00f3s, and Umapada Pal. Signet: Convolutional siamese network for writer independent offline signature verification. arXiv preprint arXiv:1707.02131, 2017."},{"key":"e_1_3_2_1_22_1","unstructured":"Bluetooth Doc. Advance audio distribution profile specification. Adopted version 1.  Bluetooth Doc. Advance audio distribution profile specification. Adopted version 1."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00790"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524510"},{"key":"e_1_3_2_1_25_1","unstructured":"Kaylee Fagan. A viral video that appeared to show obama calling trump a 'dips---' shows a disturbing new trend called 'deepfakes'.  Kaylee Fagan. A viral video that appeared to show obama calling trump a 'dips---' shows a disturbing new trend called 'deepfakes'."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3467880"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.05.012"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00500"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307645"},{"key":"e_1_3_2_1_30_1","volume-title":"RAND CORP SANTA MONICA CA","author":"Helmus Todd C","year":"2022","unstructured":"Todd C Helmus . Artificial intelligence, deepfakes, and disinformation: A primer. Technical report , RAND CORP SANTA MONICA CA , 2022 . Todd C Helmus. Artificial intelligence, deepfakes, and disinformation: A primer. Technical report, RAND CORP SANTA MONICA CA, 2022."},{"key":"e_1_3_2_1_31_1","volume-title":"Deepfakeson-phys: Deepfakes detection based on heart rate estimation. arXiv preprint arXiv:2010.00400","author":"Hernandez-Ortega Javier","year":"2020","unstructured":"Javier Hernandez-Ortega , Ruben Tolosana , Julian Fierrez , and Aythami Morales . Deepfakeson-phys: Deepfakes detection based on heart rate estimation. arXiv preprint arXiv:2010.00400 , 2020 . Javier Hernandez-Ortega, Ruben Tolosana, Julian Fierrez, and Aythami Morales. Deepfakeson-phys: Deepfakes detection based on heart rate estimation. arXiv preprint arXiv:2010.00400, 2020."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2716281.2836097"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01252-6_7"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.51593\/20190030"},{"key":"e_1_3_2_1_35_1","volume-title":"Lille","author":"Koch Gregory","year":"2015","unstructured":"Gregory Koch , Richard Zemel , Ruslan Salakhutdinov , Siamese neural networks for one-shot image recognition. In ICML deep learning workshop, volume 2, page 0 . Lille , 2015 . Gregory Koch, Richard Zemel, Ruslan Salakhutdinov, et al. Siamese neural networks for one-shot image recognition. In ICML deep learning workshop, volume 2, page 0. Lille, 2015."},{"key":"e_1_3_2_1_36_1","unstructured":"Marcus Krieg. Why video is the most persuasive form of content.  Marcus Krieg. Why video is the most persuasive form of content."},{"key":"e_1_3_2_1_37_1","volume-title":"Speaker Perception and Recognition: An Integrative Framework for Computational Speech Processing. kassel university press GmbH","author":"Lapteva Oxana","year":"2011","unstructured":"Oxana Lapteva . Speaker Perception and Recognition: An Integrative Framework for Computational Speech Processing. kassel university press GmbH , 2011 . Oxana Lapteva. Speaker Perception and Recognition: An Integrative Framework for Computational Speech Processing. kassel university press GmbH, 2011."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/103085.103090"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742667"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"e_1_3_2_1_42_1","volume-title":"Exposing deepfake videos by detecting face warping artifacts. arXiv preprint arXiv:1811.00656","author":"Li Yuezun","year":"2018","unstructured":"Yuezun Li and Siwei Lyu . Exposing deepfake videos by detecting face warping artifacts. arXiv preprint arXiv:1811.00656 , 2018 . Yuezun Li and Siwei Lyu. Exposing deepfake videos by detecting face warping artifacts. arXiv preprint arXiv:1811.00656, 2018."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00217"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3498361.3538943"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2016.7899663"},{"key":"e_1_3_2_1_46_1","volume-title":"The creation and detection of deepfakes: A survey. ACM Computing Surveys (CSUR), 54(1):1--41","author":"Mirsky Yisroel","year":"2021","unstructured":"Yisroel Mirsky and Wenke Lee . The creation and detection of deepfakes: A survey. ACM Computing Surveys (CSUR), 54(1):1--41 , 2021 . Yisroel Mirsky and Wenke Lee. The creation and detection of deepfakes: A survey. ACM Computing Surveys (CSUR), 54(1):1--41, 2021."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413570"},{"key":"e_1_3_2_1_48_1","volume-title":"Facesigns: Semi-fragile neural watermarks for media authentication and countering deepfakes. arXiv preprint arXiv:2204.01960","author":"Neekhara Paarth","year":"2022","unstructured":"Paarth Neekhara , Shehzeen Hussain , Xinqiao Zhang , Ke Huang , Julian McAuley , and Farinaz Koushanfar . Facesigns: Semi-fragile neural watermarks for media authentication and countering deepfakes. arXiv preprint arXiv:2204.01960 , 2022 . Paarth Neekhara, Shehzeen Hussain, Xinqiao Zhang, Ke Huang, Julian McAuley, and Farinaz Koushanfar. Facesigns: Semi-fragile neural watermarks for media authentication and countering deepfakes. arXiv preprint arXiv:2204.01960, 2022."},{"key":"e_1_3_2_1_49_1","volume-title":"Altered video makes pelosi seem to slur words. https:\/\/apnews.com\/article\/social-media-donald-trump-nancy-pelosi-ap-top-news-not-real-news-4841d0ebcc704524a38b1c8e213764d0. Last accessed","author":"AP","year":"2022","unstructured":"AP news. Altered video makes pelosi seem to slur words. https:\/\/apnews.com\/article\/social-media-donald-trump-nancy-pelosi-ap-top-news-not-real-news-4841d0ebcc704524a38b1c8e213764d0. Last accessed 09 December 2022 . AP news. Altered video makes pelosi seem to slur words. https:\/\/apnews.com\/article\/social-media-donald-trump-nancy-pelosi-ap-top-news-not-real-news-4841d0ebcc704524a38b1c8e213764d0. Last accessed 09 December 2022."},{"key":"e_1_3_2_1_50_1","volume-title":"Cuong M Nguyen, Dung Nguyen, Duc Thanh Nguyen, and Saeid Nahavandi. Deep learning for deepfakes creation and detection: A survey. arXiv preprint arXiv:1909.11573","author":"Nguyen Thanh Thi","year":"2019","unstructured":"Thanh Thi Nguyen , Quoc Viet Hung Nguyen , Cuong M Nguyen, Dung Nguyen, Duc Thanh Nguyen, and Saeid Nahavandi. Deep learning for deepfakes creation and detection: A survey. arXiv preprint arXiv:1909.11573 , 2019 . Thanh Thi Nguyen, Quoc Viet Hung Nguyen, Cuong M Nguyen, Dung Nguyen, Duc Thanh Nguyen, and Saeid Nahavandi. Deep learning for deepfakes creation and detection: A survey. arXiv preprint arXiv:1909.11573, 2019."},{"key":"e_1_3_2_1_51_1","volume-title":"Mar","author":"Palmer Ewan","year":"2022","unstructured":"Ewan Palmer . Trump deepfake shows ex-president joining russia's version of youtube , Mar 2022 . Ewan Palmer. Trump deepfake shows ex-president joining russia's version of youtube, Mar 2022."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178964"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860012"},{"key":"e_1_3_2_1_54_1","volume-title":"Mls: A large-scale multilingual dataset for speech research. ArXiv, abs\/2012.03411","author":"Pratap Vineel","year":"2020","unstructured":"Vineel Pratap , Qiantong Xu , Anuroop Sriram , Gabriel Synnaeve , and Ronan Collobert . Mls: A large-scale multilingual dataset for speech research. ArXiv, abs\/2012.03411 , 2020 . Vineel Pratap, Qiantong Xu, Anuroop Sriram, Gabriel Synnaeve, and Ronan Collobert. Mls: A large-scale multilingual dataset for speech research. ArXiv, abs\/2012.03411, 2020."},{"key":"e_1_3_2_1_55_1","first-page":"1786","volume-title":"2021 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","author":"Qureshi Amna","year":"2021","unstructured":"Amna Qureshi , David Meg\u00edas , and Minoru Kuribayashi . Detecting deepfake videos using digital watermarking . In 2021 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC) , pages 1786 -- 1793 . IEEE, 2021 . Amna Qureshi, David Meg\u00edas, and Minoru Kuribayashi. Detecting deepfake videos using digital watermarking. In 2021 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), pages 1786--1793. IEEE, 2021."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906415"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3539490.3539600"},{"key":"e_1_3_2_1_58_1","volume-title":"Mar","author":"Simonite Tom","year":"2022","unstructured":"Tom Simonite . A zelensky deepfake was quickly defeated. the next one might not be , Mar 2022 . Tom Simonite. A zelensky deepfake was quickly defeated. the next one might not be, Mar 2022."},{"key":"e_1_3_2_1_59_1","volume-title":"MP3: The meaning of a format","author":"Sterne Jonathan","year":"2012","unstructured":"Jonathan Sterne . MP3: The meaning of a format . Duke University Press , 2012 . Jonathan Sterne. MP3: The meaning of a format. Duke University Press, 2012."},{"key":"e_1_3_2_1_60_1","volume-title":"Principles of voice production","author":"Titze Ingo R","year":"2000","unstructured":"Ingo R Titze . Principles of voice production . National Center for Voice and Speech , 2000 . Ingo R Titze. Principles of voice production. National Center for Voice and Speech, 2000."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1612524113"},{"key":"e_1_3_2_1_62_1","volume-title":"Mar","author":"Victor Daniel","year":"2021","unstructured":"Daniel Victor . Your loved ones, and eerie tom cruise videos, reanimate unease with deepfakes , Mar 2021 . Daniel Victor. Your loved ones, and eerie tom cruise videos, reanimate unease with deepfakes, Mar 2021."},{"issue":"3","key":"e_1_3_2_1_63_1","first-page":"328","article-title":"Phoneme recognition using time-delay neural networks. Acoustics, Speech and Signal Processing","volume":"37","author":"Waibel Alexander","year":"1989","unstructured":"Alexander Waibel , Toshiyuki Hanazawa , Geoffrey Hinton , Kiyohiro Shikano , and Kevin J Lang . Phoneme recognition using time-delay neural networks. Acoustics, Speech and Signal Processing , IEEE Transactions on , 37 ( 3 ): 328 -- 339 , 1989 . Alexander Waibel, Toshiyuki Hanazawa, Geoffrey Hinton, Kiyohiro Shikano, and Kevin J Lang. Phoneme recognition using time-delay neural networks. Acoustics, Speech and Signal Processing, IEEE Transactions on, 37(3):328--339, 1989.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475518"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00872"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815165"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00765"},{"key":"e_1_3_2_1_69_1","first-page":"49","volume-title":"27th {USENIX} Security Symposium ({USENIX} Security 18)","author":"Yuan Xuejing","year":"2018","unstructured":"Xuejing Yuan , Yuxuan Chen , Yue Zhao , Yunhui Long , Xiaokang Liu , Kai Chen , Shengzhi Zhang , Heqing Huang , Xiaofeng Wang , and Carl A Gunter . Comman-dersong: A systematic approach for practical adversarial voice recognition . In 27th {USENIX} Security Symposium ({USENIX} Security 18) , pages 49 -- 64 , 2018 . Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, and Carl A Gunter. Comman-dersong: A systematic approach for practical adversarial voice recognition. In 27th {USENIX} Security Symposium ({USENIX} Security 18), pages 49--64, 2018."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11733-y"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS47025.2019.9035107"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.229"}],"event":{"name":"MobiSys '23: 21st Annual International Conference on Mobile Systems, Applications and Services","location":"Helsinki Finland","acronym":"MobiSys '23","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581791.3596862","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:31Z","timestamp":1750178191000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581791.3596862"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,18]]},"references-count":72,"alternative-id":["10.1145\/3581791.3596862","10.1145\/3581791"],"URL":"https:\/\/doi.org\/10.1145\/3581791.3596862","relation":{},"subject":[],"published":{"date-parts":[[2023,6,18]]},"assertion":[{"value":"2023-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}