{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T18:25:38Z","timestamp":1770056738608,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,12]]},"DOI":"10.1145\/3784833.3784892","type":"proceedings-article","created":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T05:22:31Z","timestamp":1770009751000},"page":"176-181","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Optimizing Audio Deepfake Detection via Simplifying Graph Convolution"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2529-129X","authenticated-orcid":false,"given":"Yufei","family":"Liu","sequence":"first","affiliation":[{"name":"Southeast University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5161-8855","authenticated-orcid":false,"given":"Zhangyao","family":"Song","sequence":"additional","affiliation":[{"name":"Southeast University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8991-6757","authenticated-orcid":false,"given":"Tao","family":"Guo","sequence":"additional","affiliation":[{"name":"Southeast University, Nanjing, China"}]}],"member":"320","published-online":{"date-parts":[[2026,2]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"N. Br\u00fcmmer and E. de Villiers. 2013. The BOSARIS Toolkit: Theory Algorithms and Code for Surviving the New DCF. CoRR abs\/1304.2865 (2013). arXiv:https:\/\/arXiv.org\/abs\/1304.2865http:\/\/arxiv.org\/abs\/1304.2865"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCT.2013.6749625"},{"key":"e_1_3_3_1_4_2","unstructured":"G.\u00a0Y. Chen Y. Wu S.\u00a0J. Liu T. Liu X.\u00a0Y. Du and F.\u00a0W. Wei. 2023. WavMark: Watermarking for Audio Generation. arxiv:https:\/\/arXiv.org\/abs\/2308.12770\u00a0[cs.SD]"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3595353.3595883"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.5555\/3692070.3692661"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","unstructured":"T. Kinnunen H. Delgado N. Evans K.\u00a0A. Lee V. Vestman A. Nautsch M. Todisco X. Wang M. Sahidullah J. Yamagishi and D.\u00a0A. Reynolds. 2020. Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification: Fundamentals. IEEE\/ACM Transactions on Audio Speech and Language Processing 28 (2020) 2195\u20132210. 10.1109\/TASLP.2020.3009494","DOI":"10.1109\/TASLP.2020.3009494"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2018-44"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","unstructured":"P. Kosta k. Slavko D. Igor and W. Adam. 2022. Robust speech watermarking by a jointly trained embedder and detector using a DNN. Digital Signal Processing 122 (2022) 103381. 10.1016\/j.dsp.2021.103381","DOI":"10.1016\/j.dsp.2021.103381"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","unstructured":"B. Li J. Chen Y. Xu W. Li and Z. Liu. 2024. DRAW: Dual-Decoder-Based Robust Audio Watermarking Against Desynchronization and Replay Attacks. IEEE Transactions on Information Forensics and Security 19 (2024) 6529\u20136544. 10.1109\/TIFS.2024.3416047","DOI":"10.1109\/TIFS.2024.3416047"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i11.26550"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","unstructured":"M.\u00a0A. Nasr W. El-Shafai N. Abdel-Salam E.\u00a0S.\u00a0M. El-Rabaie A.\u00a0S. El-Fishawy and F.\u00a0E. Abd El-Samie. 2025. A comprehensive survey of audio forgery detection: challenges and novel trends. Journal of Electrical Systems and Information Technology 12 1 (2025) 30. 10.1186\/s43067-025-00225-w","DOI":"10.1186\/s43067-025-00225-w"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.21437\/ASVSPOOF.2021-1"},{"key":"e_1_3_3_1_14_2","first-page":"6815","volume-title":"Proceedings of the IEEE ICASSP","author":"Tak H.","year":"2022","unstructured":"H. Tak, J. Jung, and J. Yamagishi. 2022. AASIST: Audio Anti-Spoofing Using Integrated Spectro-Temporal Graph Attention Networks. In Proceedings of the IEEE ICASSP. 6815\u20136819."},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2022-16"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-2249"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","unstructured":"M.\u00a0S. Uddin Ohidujjaman M. Hasan and T. Shimamura. 2024. Audio Watermarking: A Comprehensive Review. International Journal of Advanced Computer Science and Applications 15 5 (2024). 10.14569\/IJACSA.2024.01505141","DOI":"10.14569\/IJACSA.2024.01505141"},{"key":"e_1_3_3_1_18_2","volume-title":"6th International Conference on Learning Representations, ICLR 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings","author":"Velickovic P.","year":"2018","unstructured":"P. Velickovic, G. Cucurull, A. Casanova, A. Romero, P. Li\u00f2, and Y. Bengio. 2018. Graph Attention Networks. In 6th International Conference on Learning Representations, ICLR 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings. https:\/\/openreview.net\/forum?id=rJXMpikCZ"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","unstructured":"X. Wang J. Yamagishi M. Todisco H. Delgado A. Nautsch N. Evans M. Sahidullah V. Vestman T. Kinnunen K.\u00a0A. Lee L. Juvela P. Alku Y.\u00a0H. Peng H.\u00a0T. Hwang Y. Tsao H.\u00a0M. Wang S. Le\u00a0Maguer M. Becker F. Henderson R. Clark Y. Zhang Q. Wang Y. Jia K. Onuma K. Mushika T. Kaneda Y. Jiang L.\u00a0J. Liu Y.\u00a0C. Wu W.\u00a0C. Huang T. Toda K. Tanaka H. Kameoka I. Steiner D. Matrouf J.\u00a0F. Bonastre A. Govender S. Ronanki J.\u00a0X. Zhang and Z.\u00a0H. Ling. 2020. ASVspoof 2019: A large-scale public database of synthesized converted and replayed speech. Computer Speech & Language 64 (2020) 101114. 10.1016\/j.csl.2020.101114","DOI":"10.1016\/j.csl.2020.101114"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.21437\/INTERSPEECH.2017-1452"},{"key":"e_1_3_3_1_21_2","first-page":"6861","volume-title":"Proceedings of the 36th International Conference on Machine Learning","author":"Wu F.","year":"2019","unstructured":"F. Wu, A. Souza, T.\u00a0Y. Zhang, C. Fifty, T. Yu, and K. Weinberger. 2019. Simplifying Graph Convolutional Networks. In Proceedings of the 36th International Conference on Machine Learning. PMLR, 6861\u20136871."}],"event":{"name":"ICCIP 2025: 2025 the 11th International Conference on Communication and Information Processing","location":"Lingshui Hainan China","acronym":"ICCIP 2025"},"container-title":["Proceedings of the 2025 11th International Conference on Communication and Information Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3784833.3784892","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T07:46:16Z","timestamp":1770018376000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3784833.3784892"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,12]]},"references-count":20,"alternative-id":["10.1145\/3784833.3784892","10.1145\/3784833"],"URL":"https:\/\/doi.org\/10.1145\/3784833.3784892","relation":{},"subject":[],"published":{"date-parts":[[2025,11,12]]},"assertion":[{"value":"2026-02-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}