{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T00:40:03Z","timestamp":1767832803666,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,25]],"date-time":"2024-10-25T00:00:00Z","timestamp":1729814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,25]]},"DOI":"10.1145\/3704323.3704334","type":"proceedings-article","created":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T08:25:22Z","timestamp":1736238322000},"page":"366-371","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["An End-to-End Audio Transformer with Multi-student Knowledge Distillation algorithm for Deepfake Speech Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-4906-5272","authenticated-orcid":false,"given":"Weidong","family":"An","sequence":"first","affiliation":[{"name":"School of Information Science and Technology, Beijing University of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7828-2242","authenticated-orcid":false,"given":"Ruwei","family":"Li","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Beijing University Of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-1823-6966","authenticated-orcid":false,"given":"Haoyu","family":"Ge","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Beijing University Of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5237-5466","authenticated-orcid":false,"given":"Man","family":"Li","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Beijing University Of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9614-3715","authenticated-orcid":false,"given":"Huaiyu","family":"Li","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Chengdu university of information technology, Chengdu, Sichuan, China"}]}],"member":"320","published-online":{"date-parts":[[2025,1,7]]},"reference":[{"key":"e_1_3_3_1_1_2","volume-title":"Apr. 03, 2021. Accessed","author":"Bai Z.","year":"2024","unstructured":"Z. Bai and X.-L. Zhang, \u201cSpeaker Recognition Based on Deep Learning: An Overview.\u201d arXiv, Apr. 03, 2021. Accessed: May 21, 2024. [Online]. Available: http:\/\/arxiv.org\/abs\/2012.00931"},{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2017.10.010"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2020.101096"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2020-19"},{"key":"e_1_3_3_1_5_2","volume-title":"Feb. 04, 2022. Accessed","author":"Wang X.","year":"2024","unstructured":"X. Wang and J. Yamagishi, \u201cInvestigating self-supervised front ends for speech spoofing countermeasures.\u201d arXiv, Feb. 04, 2022. Accessed: May 21, 2024. [Online]. Available: http:\/\/arxiv.org\/abs\/2111.07725"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2023.3285283"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.21437\/ASVSPOOF.2021-10"},{"key":"e_1_3_3_1_8_2","volume-title":"Jul. 19, 2016. Accessed","author":"Wang Y.","year":"2023","unstructured":"Y. Wang, P. Getreuer, T. Hughes, R. F. Lyon, and R. A. Saurous, \u201cTrainable Frontend For Robust and Far-Field Keyword Spotting.\u201d arXiv, Jul. 19, 2016. Accessed: Nov. 18, 2023. [Online]. Available: http:\/\/arxiv.org\/abs\/1607.05666."},{"key":"e_1_3_3_1_9_2","volume-title":"Mar. 09, 2015. Accessed","author":"Hinton G.","year":"2024","unstructured":"G. Hinton, O. Vinyals, and J. Dean, \u201cDistilling the Knowledge in a Neural Network.\u201d arXiv, Mar. 09, 2015. Accessed: Jul. 01, 2024. [Online]. Available: http:\/\/arxiv.org\/abs\/1503.02531"},{"key":"e_1_3_3_1_10_2","volume-title":"Apr. 14, 2019. Accessed","author":"Todisco M.","year":"2024","unstructured":"M. Todisco et al., \u201cASVspoof 2019: Future Horizons in Spoofed and Fake Audio Detection.\u201d arXiv, Apr. 14, 2019. Accessed: May 21, 2024. [Online]. Available: http:\/\/arxiv.org\/abs\/1904.05441."},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"crossref","unstructured":"J. Yamagishi X. Wang M. Todisco M. Sahidullah J. Patino A. Nautsch X. Liu K. A. Lee T. Kinnunen N. Evans et al. \u201cAsvspoof 2021: accelerating progress in spoofed and deepfake speech detection \u201d","DOI":"10.21437\/ASVSPOOF.2021-8"},{"key":"e_1_3_3_1_12_2","volume-title":"Feb. 13, 2021. Accessed","author":"Li X.","year":"2024","unstructured":"X. Li et al., \u201cReplay and Synthetic Speech Detection with Res2net Architecture.\u201d arXiv, Feb. 13, 2021. Accessed: May 21, 2024. [Online]. Available: http:\/\/arxiv.org\/abs\/2010.15006."},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2021.3089437"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2023-1206"},{"key":"e_1_3_3_1_15_2","unstructured":"C. Wang J. Yi X. Zhang J. Tao L. Xu and R. Fu \u201cLow-rank Adaptation Method for Wav2vec2-based Fake Audio Detection\u201d."},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.21437\/ASVSPOOF.2021-5"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.21437\/ASVSPOOF.2021-12"},{"key":"e_1_3_3_1_18_2","volume-title":"Oct. 20, 2021. Accessed","author":"Cohen A.","year":"2024","unstructured":"A. Cohen, I. Rimon, E. Aflalo, and H. Permuter, \u201cA Study On Data Augmentation In Voice Anti-Spoofing.\u201d arXiv, Oct. 20, 2021. Accessed: Mar. 19, 2024. [Online]. Available: http:\/\/arxiv.org\/abs\/2110.10491."}],"event":{"name":"ICCPR 2024: 2024 13th International Conference on Computing and Pattern Recognition","location":"Tianjin China","acronym":"ICCPR 2024"},"container-title":["Proceedings of the 2024 13th International Conference on Computing and Pattern Recognition"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3704323.3704334","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3704323.3704334","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:52Z","timestamp":1750295872000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3704323.3704334"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,25]]},"references-count":18,"alternative-id":["10.1145\/3704323.3704334","10.1145\/3704323"],"URL":"https:\/\/doi.org\/10.1145\/3704323.3704334","relation":{},"subject":[],"published":{"date-parts":[[2024,10,25]]},"assertion":[{"value":"2025-01-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}