{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:07:06Z","timestamp":1776107226393,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":80,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T00:00:00Z","timestamp":1765238400000},"content-version":"vor","delay-in-days":372,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1933208, CNS-2206950"],"award-info":[{"award-number":["CNS-1933208, CNS-2206950"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Office of Naval Research","award":["ONR-OTA N00014-21-1-2658"],"award-info":[{"award-number":["ONR-OTA N00014-21-1-2658"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3670325","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"2696-2710","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["\"Better Be Computer or I'm Dumb\": A Large-Scale Evaluation of Humans as Audio Deepfake Detectors"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-9806-5887","authenticated-orcid":false,"given":"Kevin","family":"Warren","sequence":"first","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0672-9479","authenticated-orcid":false,"given":"Tyler","family":"Tucker","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3522-4282","authenticated-orcid":false,"given":"Anna","family":"Crowder","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7807-7941","authenticated-orcid":false,"given":"Daniel","family":"Olszewski","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2525-4478","authenticated-orcid":false,"given":"Allison","family":"Lu","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2870-1913","authenticated-orcid":false,"given":"Caroline","family":"Fedele","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9521-8422","authenticated-orcid":false,"given":"Magdalena","family":"Pasternak","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7989-7350","authenticated-orcid":false,"given":"Seth","family":"Layton","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7498-4239","authenticated-orcid":false,"given":"Kevin","family":"Butler","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5629-4755","authenticated-orcid":false,"given":"Carrie","family":"Gates","sequence":"additional","affiliation":[{"name":"Dalhousie University, Halifax, Nova Scotia, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7143-5189","authenticated-orcid":false,"given":"Patrick","family":"Traynor","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00014"},{"key":"e_1_3_2_1_2_1","volume-title":"Statistics: The Art and Science of Learning from Data.","author":"Agresti Alan","year":"2009","unstructured":"Alan Agresti and Christie Franklin. 2009. Statistics: The Art and Science of Learning from Data. Upper Saddle River, NJ."},{"key":"e_1_3_2_1_3_1","volume-title":"Detecting AI-Synthesized Speech Using Bispectral Analysis. In CVPR Workshops.","author":"AlBadawy Ehab A","year":"2019","unstructured":"Ehab A AlBadawy, Siwei Lyu, and Hany Farid. 2019. Detecting AI-Synthesized Speech Using Bispectral Analysis. In CVPR Workshops."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583222"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/00031305.2018.1543135"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212505"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Blue Logan","year":"2022","unstructured":"Logan Blue, Kevin Warren, Hadi Abdullah, Cassidy Gibson, Luis Vargas, Jessica O'Dell, Kevin Butler, and Patrick Traynor. 2022. Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_8_1","volume-title":"Voice-Face Homogeneity Tells Deepfake. arXiv","author":"Cheng Harry","year":"2022","unstructured":"Harry Cheng, Yangyang Guo, Tianyi Wang, Qi Li, Xiaojun Chang, and Liqiang Nie. 2022. Voice-Face Homogeneity Tells Deepfake. arXiv (2022)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2020.2999185"},{"key":"e_1_3_2_1_10_1","volume-title":"Xception: Deep Learning with Depthwise Separable Convolutions. arXiv","author":"Chollet Franc","year":"2017","unstructured":"Franc cois Chollet. 2017. Xception: Deep Learning with Depthwise Separable Convolutions. arXiv (2017)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2022.3205562"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-1929"},{"key":"e_1_3_2_1_13_1","volume-title":"Audio-Visual Person-of-Interest DeepFake Detection. arXiv","author":"Cozzolino Davide","year":"2022","unstructured":"Davide Cozzolino, Matthias Nie\u00dfner, and Luisa Verdoliva. 2022. Audio-Visual Person-of-Interest DeepFake Detection. arXiv (2022)."},{"key":"e_1_3_2_1_14_1","unstructured":"H\u00e9ctor Delgado Nicholas Evans Jeeweon Jung Tomi Kinnunen Ivan Kukanov Kong Lee Xuechen Liu Hye-jin Shim Md Sahidullah and Hemlata Tak. 2021. ASVspoof 2021 Baseline CM and Evaluation Package. https:\/\/github.com\/asvspoof-challenge\/2021."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-demos.25"},{"key":"e_1_3_2_1_16_1","article-title":"A Novel Smart Deepfake Video Detection System","volume":"14","author":"Elpeltagy Marwa","year":"2023","unstructured":"Marwa Elpeltagy, Aya Ismail, Mervat S. Zaki, and Kamal Eldahshan. 2023. A Novel Smart Deepfake Video Detection System. International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 14, 1 (2023).","journal-title":"International Journal of Advanced Computer Science and Applications (IJACSA)"},{"key":"e_1_3_2_1_17_1","volume-title":"Self-Supervised Video Forensics by Audio-Visual Anomaly Detection. arXiv","author":"Feng Chao","year":"2023","unstructured":"Chao Feng, Ziyang Chen, and Andrew Owens. 2023. Self-Supervised Video Forensics by Audio-Visual Anomaly Detection. arXiv (2023)."},{"key":"e_1_3_2_1_18_1","unstructured":"Christian Canton Ferrer Brian Dolhansky Ben Pflaum Joanna Bitton Jacqueline Pan and Jikuo Lu. 2020. Deepfake Detection Challenge Results: An Open Initiative to Advance AI. https:\/\/ai.facebook.com\/blog\/deepfake-detection-challenge-results-an-open-initiative-to-advance-ai\/."},{"key":"e_1_3_2_1_19_1","unstructured":"Emily Flitter and Stacy Cowley. 2023. Voice Deepfakes Are Coming for Your Bank Balance. The New York Times - https:\/\/www.nytimes.com\/2023\/08\/30\/business\/voice-deepfakes-bank-scams.html."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the Conference on Neural Information Processing Systems (NeurIPS).","author":"Frank Joel","year":"2021","unstructured":"Joel Frank and Lea Sch\u00f6nherr. 2021. WaveFake: A Data Set to Facilitate Audio DeepFake Detection. In Proceedings of the Conference on Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2110013119"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.23919\/APSIPAASC55919.2022.9980255"},{"key":"e_1_3_2_1_23_1","volume-title":"NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage. Network and Distributed Systems Security Symposium","author":"Hassan Wajih Ul","year":"2019","unstructured":"Wajih Ul Hassan, Shengjian Guo, Ding Li, Zhengzhang Chen, Kangkook Jee, Zhichun Li, and Adam Bates. 2019. NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage. Network and Distributed Systems Security Symposium (2019)."},{"key":"e_1_3_2_1_24_1","unstructured":"Joe Hernandez. 2023. That panicky call from a relative? It could be a thief using a voice clone FTC warns. National Public Radio - https:\/\/www.npr.org\/2023\/03\/22\/1165448073\/voice-clones-ai-scams-ftc."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSST57195.2022.10016871"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.110124"},{"key":"e_1_3_2_1_27_1","unstructured":"Keith Ito and Linda Johnson. 2017. The LJ Speech Dataset. https:\/\/keithito.com\/LJ-Speech-Dataset."},{"key":"e_1_3_2_1_28_1","volume-title":"Patrick Nguyen, Ruoming Pang, Ignacio Lopez Moreno, and Yonghui Wu.","author":"Jia Ye","year":"2018","unstructured":"Ye Jia, Yu Zhang, Ron Weiss, Quan Wang, Jonathan Shen, Fei Ren, zhifeng Chen, Patrick Nguyen, Ruoming Pang, Ignacio Lopez Moreno, and Yonghui Wu. 2018. Transfer Learning from Speaker Verification to Multispeaker Text-To-Speech Synthesis. In Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_29_1","volume-title":"Ignacio Lopez Moreno, and Yonghui Wu","author":"Jia Ye","year":"2019","unstructured":"Ye Jia, Yu Zhang, Ron J. Weiss, Quan Wang, Jonathan Shen, Fei Ren, Zhifeng Chen, Patrick Nguyen, Ruoming Pang, Ignacio Lopez Moreno, and Yonghui Wu. 2019. Transfer Learning from Speaker Verification to Multispeaker Text-To-Speech Synthesis. arXiv (2019)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2022-10078"},{"key":"e_1_3_2_1_31_1","volume-title":"Defense Against Adversarial Attacks on Audio DeepFake Detection. arXiv","author":"Kawa Piotr","year":"2022","unstructured":"Piotr Kawa, Marcin Plata, and Piotr Syga. 2022. Defense Against Adversarial Attacks on Audio DeepFake Detection. arXiv (2022)."},{"key":"e_1_3_2_1_32_1","volume-title":"SpecRNet: Towards Faster and More Accessible Audio DeepFake Detection. arXiv","author":"Kawa Piotr","year":"2022","unstructured":"Piotr Kawa, Marcin Plata, and Piotr Syga. 2022. SpecRNet: Towards Faster and More Accessible Audio DeepFake Detection. arXiv (2022)."},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the Workshop on Synthetic Multimedia - Audiovisual Deepfake Generation and Detection.","author":"Khalid Hasam","unstructured":"Hasam Khalid, Minha Kim, Shahroz Tariq, and Simon S. Woo. 2021. Evaluation of an Audio-Video Multimodal Deepfake Dataset Using Unimodal and Multimodal Detectors. In Proceedings of the Workshop on Synthetic Multimedia - Audiovisual Deepfake Generation and Detection."},{"key":"e_1_3_2_1_34_1","volume-title":"Woo","author":"Khalid Hasam","year":"2022","unstructured":"Hasam Khalid, Shahroz Tariq, Minha Kim, and Simon S. Woo. 2022. FakeAVCeleb: A Novel Audio-Video Multimodal Deepfake Dataset. In Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks (NeurIPS Datasets and Benchmarks)."},{"key":"e_1_3_2_1_35_1","volume-title":"Deepfake Detection: Humans vs. Machines. arXiv","author":"Korshunov Pavel","year":"2020","unstructured":"Pavel Korshunov and S\u00e9bastien Marcel. 2020. Deepfake Detection: Humans vs. Machines. arXiv (2020)."},{"key":"e_1_3_2_1_36_1","volume-title":"Daniel Olszewski, Kevin Warren, Carrie Gates, Kevin Butler, and Patrick Traynor.","author":"Layton Seth","year":"2024","unstructured":"Seth Layton, Thiago De Andrade, Daniel Olszewski, Kevin Warren, Carrie Gates, Kevin Butler, and Patrick Traynor. 2024. Every Breath You Don't Take: Deepfake Speech Detection Using Breath. arXiv preprint arXiv:2404.15143 (2024)."},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the USENIX Security Symposium (Security).","author":"Layton Seth","year":"2024","unstructured":"Seth Layton, Tyler Tucker, Daniel Olszewski, Kevin Warren, Kevin Butler, and Patrick Traynor. 2024. SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Deepfake Datasets. In Proceedings of the USENIX Security Symposium (Security)."},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the Workshop on Security Implications of Deepfakes and Cheapfakes.","author":"Lee Sangjun","unstructured":"Sangjun Lee, Donggeun Ko, Jinyong Park, Saebyeol Shin, Donghee Hong, and Simon S. Woo. 2022. Deepfake Detection for Fake Images with Facemasks. In Proceedings of the Workshop on Security Implications of Deepfakes and Cheapfakes."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/WASPAA58266.2023.10248132"},{"key":"e_1_3_2_1_40_1","volume-title":"CFAD: A Chinese Dataset for Fake Audio Detection. arXiv","author":"Ma Haoxin","year":"2022","unstructured":"Haoxin Ma, Jiangyan Yi, Chenglong Wang, Xinrui Yan, Jianhua Tao, Tao Wang, Shiming Wang, and Ruibo Fu. 2022. CFAD: A Chinese Dataset for Fake Audio Detection. arXiv (2022)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0285333"},{"key":"e_1_3_2_1_42_1","volume-title":"Securing Voice-Driven Interfaces Against Fake (Cloned) Audio Attacks. In 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR).","author":"Malik Hafiz","year":"2019","unstructured":"Hafiz Malik. 2019. Securing Voice-Driven Interfaces Against Fake (Cloned) Audio Attacks. In 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR)."},{"key":"e_1_3_2_1_43_1","unstructured":"Taylor Martin. 2018. How to Change Your Google Home's Voice. https:\/\/www.cnet.com\/home\/smart-home\/how-to-change-the-voice-of-google-home\/"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.11613\/BM.2012.031"},{"key":"e_1_3_2_1_45_1","unstructured":"Microsoft. 2023. Speaker Recognition | Microsoft Azure. https:\/\/azure.microsoft.com\/en-us\/products\/cognitive-services\/speaker-recognition."},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Mink Jaron","year":"2022","unstructured":"Jaron Mink, Licheng Luo, Nat a M. Barbosa, Olivia Figueira, Yang Wang, and Gang Wang. 2022. DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_47_1","volume-title":"Delp","author":"Montserrat Daniel Mas","year":"2020","unstructured":"Daniel Mas Montserrat, Hanxiang Hao, S. K. Yarlagadda, Sriram Baireddy, Ruiting Shao, J\u00e1nos Horv\u00e1th, Emily Bartusiak, Justin Yang, David G\u00fcera, Fengqing Zhu, and Edward J. Delp. 2020. Deepfakes Detection with Automatic Face Weighting. arXiv (2020)."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_30"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2022-108"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3552466.3556531"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23206"},{"key":"e_1_3_2_1_52_1","volume-title":"Advances in Speech Recognition: Mobile Environments, Call Centers and Clinics","author":"Neustein Amy","unstructured":"Amy Neustein. 2010. Advances in Speech Recognition: Mobile Environments, Call Centers and Clinics. Springer Science & Business Media."},{"key":"e_1_3_2_1_53_1","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS).","author":"Olszewski Daniel","year":"2023","unstructured":"Daniel Olszewski, Allison Lu, Carson Stillman, Kevin Warren, Cole Kitroser, Alejandro Pascual, Divyajyoti Ukirde, Kevin Butler, and Patrick Traynor. 2023. ?Get In Researchers; We?re Measuring Reproducibility?: A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS55849.2022.9975428"},{"key":"e_1_3_2_1_55_1","volume-title":"Proceedings of the International Conference on Machine Learning.","author":"Qian Kaizhi","year":"2019","unstructured":"Kaizhi Qian, Yang Zhang, Shiyu Chang, Xuesong Yang, and Mark Hasegawa-Johnson. 2019. AUTOVC: Zero-Shot Voice Style Transfer with Only Autoencoder Loss. In Proceedings of the International Conference on Machine Learning."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPED.2019.8906599"},{"key":"e_1_3_2_1_57_1","unstructured":"Emma Roth. 2022. James Earl Jones lets AI take over the voice of Darth Vader. The Verge - https:\/\/www.theverge.com\/2022\/9\/24\/23370097\/darth-vader-james-earl-jones-obi-wan-kenobi-star-wars-ai-disney-lucasfilm."},{"key":"e_1_3_2_1_58_1","unstructured":"Adam Satariano and Paul Mozur. 2023. The People Onscreen Are Fake. The Disinformation Is Real. The New York Times - https:\/\/www.nytimes.com\/2023\/02\/07\/technology\/artificial-intelligence-training-deepfake.html."},{"key":"e_1_3_2_1_59_1","volume-title":"Wav2vec: Unsupervised Pre-training for Speech Recognition. arXiv","author":"Schneider Steffen","year":"2019","unstructured":"Steffen Schneider, Alexei Baevski, Ronan Collobert, and Michael Auli. 2019. Wav2vec: Unsupervised Pre-training for Speech Recognition. arXiv (2019)."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.23919\/APSIPAASC55919.2022.9980296"},{"key":"e_1_3_2_1_61_1","unstructured":"Umar Shakir. 2022. Alexa's English Accents Are Now Selectable Without Changing Your Region. https:\/\/www.theverge.com\/23475121\/amazon-alexa-english-accent-switch-update-region-free"},{"key":"e_1_3_2_1_62_1","volume-title":"JSUT Corpus: Free Large-Scale Japanese Speech Corpus for End-to-End Speech Synthesis. arXiv","author":"Sonobe Ryosuke","year":"2017","unstructured":"Ryosuke Sonobe, Shinnosuke Takamichi, and Hiroshi Saruwatari. 2017. JSUT Corpus: Free Large-Scale Japanese Speech Corpus for End-to-End Speech Synthesis. arXiv (2017)."},{"key":"e_1_3_2_1_63_1","volume-title":"Exposing AI-Synthesized Human Voices Using Neural Vocoder Artifacts. arXiv","author":"Sun Chengzhe","year":"2023","unstructured":"Chengzhe Sun, Shan Jia, Shuwei Hou, Ehab AlBadawy, and Siwei Lyu. 2023. Exposing AI-Synthesized Human Voices Using Neural Vocoder Artifacts. arXiv (2023)."},{"key":"e_1_3_2_1_64_1","volume-title":"Proceedings of the Symposium on Usable Privacy and Security (SOUPS).","author":"Tang Jenny","year":"2022","unstructured":"Jenny Tang, Eleanor Birrell, and Ada Lerner. 2022. Replication: How Well Do My Results Generalize Now? The External Validity of Online Privacy and Security Surveys. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS)."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W19-8643"},{"key":"e_1_3_2_1_66_1","unstructured":"Pranshu Verma and Will Oremus. 2023. AI voice clones mimic politicians and celebrities reshaping reality. The Washington Post - https:\/\/www.washingtonpost.com\/technology\/2023\/10\/13\/ai-voice-cloning-deepfakes\/."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359830"},{"key":"e_1_3_2_1_68_1","volume-title":"VoicePop: A Pop Noise Based Anti-spoofing System for Voice Authentication on Smartphones. In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.","author":"Wang Qian","year":"2019","unstructured":"Qian Wang, Xiu Lin, Man Zhou, Yanjiao Chen, Cong Wang, Qi Li, and Xiangyang Luo. 2019. VoicePop: A Pop Noise Based Anti-spoofing System for Voice Authentication on Smartphones. In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413716"},{"key":"e_1_3_2_1_70_1","volume-title":"Investigating Active-Learning-Based Training Data Selection for Speech Spoofing Countermeasure. In 2022 IEEE Spoken Language Technology Workshop (SLT).","author":"Wang Xin","year":"2023","unstructured":"Xin Wang and Junichi Yamagishi. 2023. Investigating Active-Learning-Based Training Data Selection for Speech Spoofing Countermeasure. In 2022 IEEE Spoken Language Technology Workshop (SLT)."},{"key":"e_1_3_2_1_71_1","volume-title":"Spoofed Training Data for Speech Spoofing Countermeasure Can Be Efficiently Created Using Neural Vocoders. arXiv","author":"Wang Xin","year":"2023","unstructured":"Xin Wang and Junichi Yamagishi. 2023. Spoofed Training Data for Speech Spoofing Countermeasure Can Be Efficiently Created Using Neural Vocoders. arXiv (2023)."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3369811"},{"key":"e_1_3_2_1_73_1","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS).","author":"Wenger Emily","unstructured":"Emily Wenger, Max Bronckers, Christian Cianfarani, Jenna Cryan, Angela Sha, Haitao Zheng, and Ben Y. Zhao. 2021. \"Hello, It's Me\": Deep Learning-based Speech Synthesis Attacks in the Real World. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_74_1","volume-title":"Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).","author":"Jung Jee","unstructured":"Jee weon Jung, Hee-Soo Heo, Hemlata Tak, Hye jin Shim, Joon Son Chung, Bong-Jin Lee, Ha jin Yu, and Nicholas W. D. Evans. 2021. AASIST: Audio Anti-Spoofing Using Integrated Spectro-Temporal Graph Attention Networks. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW58289.2023.00074"},{"key":"e_1_3_2_1_76_1","volume-title":"Tomi Kinnunen, Nicholas Evans, and H\u00e9ctor Delgado.","author":"Yamagishi Junichi","year":"2021","unstructured":"Junichi Yamagishi, Xin Wang, Massimiliano Todisco, Md Sahidullah, Jose Patino, Andreas Nautsch, Xuechen Liu, Kong Aik Lee, Tomi Kinnunen, Nicholas Evans, and H\u00e9ctor Delgado. 2021. ASVspoof 2021: Accelerating Progress in Spoofed and Deepfake Speech Detection. In The Automatic Speaker Verification and Spoofing Countermeasures Challenge."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3262148"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2017.2771947"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133962"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978296"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670325","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3670325","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3670325","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:20:13Z","timestamp":1755843613000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670325"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":80,"alternative-id":["10.1145\/3658644.3670325","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3670325","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}