{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:17:19Z","timestamp":1771658239420,"version":"3.50.1"},"reference-count":44,"publisher":"Zhejiang University Press","issue":"5","license":[{"start":{"date-parts":[[2021,1,29]],"date-time":"2021-01-29T00:00:00Z","timestamp":1611878400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,29]],"date-time":"2021-01-29T00:00:00Z","timestamp":1611878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front Inform Technol Electron Eng"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1631\/fitee.1900690","type":"journal-article","created":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T21:11:13Z","timestamp":1611868273000},"page":"697-708","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Latent discriminative representation learning for speaker recognition","\u7528\u4e8e\u8bf4\u8bdd\u4eba\u8bc6\u522b\u7684\u6f5c\u5728\u53ef\u533a\u5206\u6027\u8868\u5f81\u5b66\u4e60"],"prefix":"10.1631","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3149-2605","authenticated-orcid":false,"given":"Duolin","family":"Huang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0616-4431","authenticated-orcid":false,"given":"Qirong","family":"Mao","sequence":"additional","affiliation":[]},{"given":"Zhongchen","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Zhishen","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Sidheswar","family":"Routryar","sequence":"additional","affiliation":[]},{"given":"Elias-Nii-Noi","family":"Ocquaye","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2021,1,29]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ssp.2016.7551807"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/iwbf.2017.7935102"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2015-81"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s00138-015-0709-7"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/icassp.2013.6639150"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/tassp.1980.1163420"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/tasl.2010.2064307"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-01778-5_6"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2017.01.009"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5130\/ajict.v3i2.508"},{"key":"ref11","first-page":"27403","article-title":"DARPA TIMIT acoustic-phonetic continous speech corpus CD-ROM","volume-title":"NIST Speech Disc 1\u20131.1. NASA STI\/Recon Technical Report N","volume":"93","author":"Garofolo","year":"1993"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.21437\/interspeech.2018-1942"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/icassp.2016.7472652"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1121\/1.399423"},{"key":"ref15","volume-title":"Spoken Language Processing: a Guide to Theory, Algorithm and System Development.","author":"Huang","year":"2001"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/iccv.2017.453"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/tasl.2007.894527"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1631\/fitee.1500380"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.21437\/interspeech.2018-1759"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/icassp.2014.6853887"},{"key":"ref21","volume-title":"Deep speaker: an end-to-end neural speaker embedding system.","author":"Li","year":"2017"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2018.02.005"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/tmm.2014.2360798"},{"key":"ref24","volume-title":"Robust speaker recognition using unsupervised adversarial invariance.","author":"Peri","year":"2019"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/5.18626"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/89.365379"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1999.0361"},{"key":"ref28","article-title":"MSR Identity Toolbox v1.0: a MATLAB Toolbox for Speaker Recognition Research","volume-title":"Microsoft Research Technical Report","author":"Sadjadi","year":"2013"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2015.7298682"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.5120\/2188-2774"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/slt.2016.7846260"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.21437\/interspeech.2017-620"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/icassp.2018.8461375"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/mcas.2011.941079"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/icassp.2013.6638974"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/icassp.2014.6854363"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/nnsp.2000.890157"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46478-7_31"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.21437\/interspeech.2018-1015"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.23919\/apsipa.2018.8659722"},{"key":"ref41","volume-title":"The HTK Hidden Markov Model Toolkit: Design and Philosophy.","author":"Young","year":"1993"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:19952144"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.21437\/interspeech.2017-1608"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2018.00354"}],"updated-by":[{"DOI":"10.1631\/fitee.19e0690","type":"erratum","label":"Erratum","source":"publisher","updated":{"date-parts":[[2021,5,22]],"date-time":"2021-05-22T00:00:00Z","timestamp":1621641600000}}],"container-title":["Frontiers of Information Technology &amp; Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1900690.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1631\/FITEE.1900690\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1900690.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T06:56:39Z","timestamp":1771656999000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1631\/FITEE.1900690"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,29]]},"references-count":44,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["1629"],"URL":"https:\/\/doi.org\/10.1631\/fitee.1900690","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,29]]},"assertion":[{"value":"10 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 July 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 May 2021","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Erratum","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"An Erratum to this paper has been published:","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1631\/FITEE.19e0690","URL":"https:\/\/doi.org\/10.1631\/FITEE.19e0690","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Duolin HUANG, Qirong MAO, Zhongchen MA, Zhishen ZHENG, Sidheswar ROUTRAY, and Elias-Nii-Noi OC-QUAYE declare that they have no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethics guidelines"}}]}}