{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:03:16Z","timestamp":1750309396332,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T00:00:00Z","timestamp":1745452800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,24]]},"DOI":"10.1145\/3696673.3723086","type":"proceedings-article","created":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T15:11:23Z","timestamp":1746717083000},"page":"263-268","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Forensic Investigation of Synthetic Voice Spoofing Detection in Social App"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-9143-9083","authenticated-orcid":false,"given":"Inioluwa","family":"Kola-Adelakin","sequence":"first","affiliation":[{"name":"Department of Computer&amp; Info Sciences, Florida A&amp;M University, Tallahassee, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9950-1953","authenticated-orcid":false,"given":"Maryam","family":"Taeb","sequence":"additional","affiliation":[{"name":"Department of Cybersecurity and Information Technology, University of West Florida, Pensacola, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4610-6479","authenticated-orcid":false,"given":"Hongmei","family":"Chi","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Sciences, Florida A&amp;M University, Tallahassee, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,5,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2019. Voice Fraud Scams Company out of $243 000. https:\/\/www.forbes.com\/sites\/jessedamiani\/2019\/09\/03\/a-voice-deepfake-was-used-to-scam-a-ceo-out-of-243000\/"},{"key":"e_1_3_2_1_2_1","unstructured":"2021. Increasing Threat of DeepFake Identities. https:\/\/www.dhs.gov\/sites\/default\/files\/publications\/increasing_threats_of_deepfake_identities_0.pdf"},{"volume-title":"IEEE Conference Publication. https:\/\/ieeexplore.ieee.org\/document\/10404433","key":"e_1_3_2_1_3_1","unstructured":"2023. Deep Learning based Spoof Detection: An Experimental Study. In IEEE Conference Publication. https:\/\/ieeexplore.ieee.org\/document\/10404433"},{"key":"e_1_3_2_1_4_1","unstructured":"2024. The Fake-or-Real (FoR) Dataset (Deepfake Audio). https:\/\/www.kaggle.com\/datasets\/mohammedabdeldayem\/the-fake-or-real-dataset"},{"volume-title":"Smart Optical Fiber Network Health Monitoring Using Deep Learning-Based Distributed Acoustic Sensing Technique. In 2024 Multimedia University Engineering Conference (MECON). IEEE, 1--6.","key":"e_1_3_2_1_5_1","unstructured":"2024. Smart Optical Fiber Network Health Monitoring Using Deep Learning-Based Distributed Acoustic Sensing Technique. In 2024 Multimedia University Engineering Conference (MECON). IEEE, 1--6."},{"key":"e_1_3_2_1_6_1","unstructured":"2024. Temporal Convolutional Networks and Forecasting - Unit8. https:\/\/unit8.com\/resources\/temporal-convolutional-networks-and-forecasting\/"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-024-01812-2"},{"key":"e_1_3_2_1_8_1","volume-title":"Muhammad Usman Tariq, Anwar Ghani, and Daehan Kwak.","author":"Ali Ghulam","year":"2024","unstructured":"Ghulam Ali, Javed Rashid, Muhammad Rameez ul Hussnain, Muhammad Usman Tariq, Anwar Ghani, and Daehan Kwak. 2024. Beyond the Illusion: Ensemble Learning for Effective Voice Deepfake Detection. IEEE Access (2024)."},{"key":"e_1_3_2_1_9_1","volume-title":"Concrete Problems in AI Safety. arXiv preprint arXiv:1606.06565","author":"Amodei Dario","year":"2016","unstructured":"Dario Amodei, Chris Olah, Jacob Steinhardt, Paul Christiano, John Schulman, and Dan Man\u00e9. 2016. Concrete Problems in AI Safety. arXiv preprint arXiv:1606.06565 (2016)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMART59791.2023.10428163"},{"key":"e_1_3_2_1_11_1","unstructured":"PR Aravind Usamath Nechiyil Nandakumar Paramparambath et al. 2020. Audio Spoofing Verification Using Deep Convolutional Neural Networks by Transfer Learning. arXiv.org (August 2020). https:\/\/arxiv.org\/abs\/2008.03464"},{"key":"e_1_3_2_1_12_1","volume-title":"People Are Poorly Equipped to Detect AI-Powered Voice Clones. arXiv.org (October","author":"Barrington Sarah","year":"2024","unstructured":"Sarah Barrington and Hany Farid. 2024. People Are Poorly Equipped to Detect AI-Powered Voice Clones. arXiv.org (October 2024). https:\/\/arxiv.org\/abs\/2410.03791"},{"key":"e_1_3_2_1_13_1","unstructured":"Thomas Brewster. 2023. Fraudsters Cloned Company Director's Voice In $35 Million Heist Police Find. https:\/\/www.forbes.com\/sites\/thomasbrewster\/2021\/10\/14\/huge-bank-fraud-uses-deep-fake-voice-tech-to-steal-millions\/"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/acea05"},{"key":"e_1_3_2_1_15_1","unstructured":"Joseph Cox. 2024. How I Broke Into a Bank Account With an AI-Generated Voice. https:\/\/www.vice.com\/en\/article\/how-i-broke-into-a-bank-account-with-an-ai-generated-voice\/"},{"key":"e_1_3_2_1_16_1","unstructured":"CrowdStrike. 2025. CrowdStrike 2024 Global Threat Report | CrowdStrike. https:\/\/www.crowdstrike.com\/en-us\/global-threat-report\/"},{"key":"e_1_3_2_1_17_1","volume-title":"Voice Auth: Audio Verification with Deep-Learning. In 2024 8th International Conference on Computing, Communication, Control and Automation (ICCUBEA). IEEE, 1--6.","author":"Deore Abhishek","year":"2024","unstructured":"Abhishek Deore, Om Badhakh, Sarthak Agase, Siddhesh Dalvi, and Pravin Futane. 2024. Voice Auth: Audio Verification with Deep-Learning. In 2024 8th International Conference on Computing, Communication, Control and Automation (ICCUBEA). IEEE, 1--6."},{"key":"e_1_3_2_1_18_1","unstructured":"Maggie Harrison Dupr\u00e9. 2024. The Pentagon Wants to Flood Social Media With Fake AI People. https:\/\/futurism.com\/the-byte\/pentagon-wants-fake-ai-people"},{"key":"e_1_3_2_1_19_1","volume-title":"How to Design AI for Social Good: Seven Essential Factors. Ethics, Governance, and Policies in Artificial Intelligence","author":"Floridi Luciano","year":"2021","unstructured":"Luciano Floridi, Josh Cowls, Thomas C King, and Mariarosaria Taddeo. 2021. How to Design AI for Social Good: Seven Essential Factors. Ethics, Governance, and Policies in Artificial Intelligence (2021), 125--151."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2110013119"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS55849.2022.9975381"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3231480"},{"key":"e_1_3_2_1_23_1","volume-title":"Promising for Patients or Deeply Disturbing? The Ethical and Legal Aspects of Deepfake Therapy. Journal of Medical Ethics","author":"Hoek Saar","year":"2024","unstructured":"Saar Hoek, Suzanne Metselaar, Corrette Ploem, and Marieke Bak. 2024. Promising for Patients or Deeply Disturbing? The Ethical and Legal Aspects of Deepfake Therapy. Journal of Medical Ethics (2024)."},{"key":"e_1_3_2_1_24_1","volume-title":"Mobilenets: Efficient Convolutional Neural Networks for Mobile Vision Applications. arXiv preprint arXiv:1704.04861","author":"Howard Andrew G","year":"2017","unstructured":"Andrew G Howard. 2017. Mobilenets: Efficient Convolutional Neural Networks for Mobile Vision Applications. arXiv preprint arXiv:1704.04861 (2017)."},{"key":"e_1_3_2_1_25_1","unstructured":"Osman Husain. 2025. 99 Global Phishing Statistics Industry Trends (2023--2025). https:\/\/controld.com\/blog\/phishing-statistics-industry-trends\/"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Ziyue Jiang Hongcheng Zhu Li Peng Wenbing Ding and Yanzhen Ren. 2020. Self-Supervised Spoofing Audio Detection Scheme. In Interspeech. 4223--4227.","DOI":"10.21437\/Interspeech.2020-1760"},{"key":"e_1_3_2_1_27_1","volume-title":"MIS-AVoiDD: Modality Invariant and Specific Representation for Audio-Visual Deepfake Detection. In 2023 International Conference on Machine Learning and Applications (ICMLA). IEEE, 1371--1378","author":"Katamneni Vinaya Sree","year":"2023","unstructured":"Vinaya Sree Katamneni and Ajita Rattani. 2023. MIS-AVoiDD: Modality Invariant and Specific Representation for Audio-Visual Deepfake Detection. In 2023 International Conference on Machine Learning and Applications (ICMLA). IEEE, 1371--1378."},{"key":"e_1_3_2_1_28_1","volume-title":"How Deep Are the Fakes? Focusing on Audio Deepfake: A Survey. arXiv.org (November","author":"Khanjani Zahra","year":"2021","unstructured":"Zahra Khanjani, Gabrielle Watson, and Vandana P Janeja. 2021. How Deep Are the Fakes? Focusing on Audio Deepfake: A Survey. arXiv.org (November 2021). https:\/\/arxiv.org\/abs\/2111.14203"},{"key":"e_1_3_2_1_29_1","unstructured":"Keepnet Labs. 2024. 2024 Voice Phishing (Vishing) Response Report - Keepnet Labs. https:\/\/keepnetlabs.com\/reports\/2024-voice-phishing-response-report"},{"key":"e_1_3_2_1_30_1","volume-title":"Audio Anti-Spoofing Detection: A Survey. arXiv preprint arXiv:2404.13914","author":"Li Menglu","year":"2024","unstructured":"Menglu Li, Yasaman Ahmadiadli, and Xiao-Ping Zhang. 2024. Audio Anti-Spoofing Detection: A Survey. arXiv preprint arXiv:2404.13914 (2024)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23146637"},{"key":"e_1_3_2_1_32_1","volume-title":"Silence is Golden: What do ASVspoof-Trained Models Really Learn? arXiv.org (June","author":"M\u00fcller Nicolas M","year":"2021","unstructured":"Nicolas M M\u00fcller, Franziska Dieckmann, Pavel Czempin, Roman Canals, Konstantin B\u00f6ttinger, and Jennifer Williams. 2021. Speech is Silver, Silence is Golden: What do ASVspoof-Trained Models Really Learn? arXiv.org (June 2021). https:\/\/arxiv.org\/abs\/2106.12914"},{"key":"e_1_3_2_1_33_1","unstructured":"Grace Noto. 2024. Scammers Siphon $25M from Engineering Firm Arup via AI Deep-fake 'CFO'. https:\/\/www.cfodive.com\/news\/scammers-siphon-25m-engineering-firm-arup-deepfake-cfo-ai\/716501\/"},{"key":"e_1_3_2_1_34_1","volume-title":"FoR: A Dataset for Synthetic Speech Detection. In 2019 International Conference on Speech Technology and Human-Computer Dialogue (SpeD). IEEE, 1--10","author":"Reimao Ricardo","year":"2019","unstructured":"Ricardo Reimao and Vassilios Tzerpos. 2019. FoR: A Dataset for Synthetic Speech Detection. In 2019 International Conference on Speech Technology and Human-Computer Dialogue (SpeD). IEEE, 1--10."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.58496\/MJAIH\/2024\/019"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Maryam Taeb Hongmei Chi and Shonda Bernadin. 2022. Digital Evidence Acquisition and Deepfake Detection with Decentralized Applications. In Practice and Experience in Advanced Research Computing. ACM 1--2.","DOI":"10.1145\/3491418.3535127"},{"key":"e_1_3_2_1_37_1","volume-title":"Targeted Data Extraction and Deepfake Detection with Blockchain Technology. In 2022 6th International Conference on Universal Village (UV). IEEE, 1--7.","author":"Taeb Maryam","year":"2022","unstructured":"Maryam Taeb, Hongmei Chi, and Shonda Bernadin. 2022. Targeted Data Extraction and Deepfake Detection with Blockchain Technology. In 2022 6th International Conference on Universal Village (UV). IEEE, 1--7."},{"volume-title":"Guidance for the Development of AI Risk and Impact Assessments","author":"Yeung Louis Au","key":"e_1_3_2_1_38_1","unstructured":"Louis Au Yeung. 2021. Guidance for the Development of AI Risk and Impact Assessments. Center for Long-Term Cybersecurity, University of California, Berkeley."},{"key":"e_1_3_2_1_39_1","volume-title":"Chu Yuan Zhang, and Yan Zhao","author":"Yi Jiangyan","year":"2023","unstructured":"Jiangyan Yi, Chenglong Wang, Jianhua Tao, Xiaohui Zhang, Chu Yuan Zhang, and Yan Zhao. 2023. Audio Deepfake Detection: A Survey. arXiv preprint arXiv:2308.14970 (2023)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1155\/2023\/8830894"}],"event":{"name":"ACMSE 2025: 2025 ACM Southeast Conference","acronym":"ACMSE 2025","location":"Southeast Missouri State University Cape Girardeau MO USA"},"container-title":["Proceedings of the 2025 ACM Southeast Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696673.3723086","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696673.3723086","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:57:44Z","timestamp":1750294664000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696673.3723086"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,24]]},"references-count":40,"alternative-id":["10.1145\/3696673.3723086","10.1145\/3696673"],"URL":"https:\/\/doi.org\/10.1145\/3696673.3723086","relation":{},"subject":[],"published":{"date-parts":[[2025,4,24]]},"assertion":[{"value":"2025-05-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}