{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:00:41Z","timestamp":1773615641546,"version":"3.50.1"},"reference-count":22,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624700846","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:23:09Z","timestamp":1741962189000},"page":"1212-1217","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Detecting Synthesized Audio Files Using Graph Neural Networks"],"prefix":"10.3103","volume":"58","author":[{"given":"O. A.","family":"Izotova","sequence":"first","affiliation":[]},{"given":"D. S.","family":"Lavrova","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7783_CR1","unstructured":"Mahmud, B.U. and Sharmin, A., Deep insights of deepfake technology: A review, DUJASE, 2021, vol. 5, nos.\u00a01\u20132, pp. 13\u201323. arXiv:2105.00192"},{"key":"7783_CR2","unstructured":"Sumsub research: Global deepfake incidents surge tenfold from 2022 to 2023, 2023. https:\/\/sumsub.com\/newsroom\/sumsub-research-global-deepfake-incidents-surge-tenfold-from-2022-to-2023\/. Cited April 25, 2024."},{"key":"7783_CR3","doi-asserted-by":"publisher","first-page":"902","DOI":"10.3103\/s0146411617080107","volume":"51","author":"D.V. Ivanov","year":"2017","unstructured":"Ivanov, D.V., Moskvin, D.A., and Ovasapyan, T.D., Approaches to detecting active network nodes in IPv6 address space, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 902\u2013906. https:\/\/doi.org\/10.3103\/s0146411617080107","journal-title":"Autom. Control Comput. Sci."},{"key":"7783_CR4","doi-asserted-by":"publisher","first-page":"1092","DOI":"10.3103\/s0146411621080228","volume":"55","author":"R.A. Ognev","year":"2021","unstructured":"Ognev, R.A., Zhukovskii, E.V., and Zegzhda, D.P., Detection of malicious executable files based on clustering of activities, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 1092\u20131098. https:\/\/doi.org\/10.3103\/s0146411621080228","journal-title":"Autom. Control Comput. Sci."},{"key":"7783_CR5","doi-asserted-by":"publisher","first-page":"3447","DOI":"10.1007\/s13369-021-06297-w","volume":"47","author":"J. Khochare","year":"2021","unstructured":"Khochare, J., Joshi, Ch., Yenarkar, B., Suratkar, Sh., and Kazi, F., A deep learning framework for audio deepfake detection, Arabian J. Sci. Eng., 2021, vol. 47, no. 3, pp. 3447\u20133458. https:\/\/doi.org\/10.1007\/s13369-021-06297-w","journal-title":"Arabian J. Sci. Eng."},{"key":"7783_CR6","doi-asserted-by":"publisher","unstructured":"Guera, D. and Delp, E.J., Deepfake video detection using recurrent neural networks, 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), Auckland, New Zealand, 2018, IEEE, 2018, pp. 1\u20136. https:\/\/doi.org\/10.1109\/avss.2018.8639163","DOI":"10.1109\/avss.2018.8639163"},{"key":"7783_CR7","doi-asserted-by":"publisher","unstructured":"Zhong, W., Tang, D., Xu, Z., Wang, R., Duan, N., Zhou, M., Wang, J., and Yin, J., Neural deepfake detection with factual structure of text, Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP), Webber, B., Cohn, T., He, Yu., and Liu, Ya., Eds., Association for Computational Linguistics, 2020, pp. 2461\u20132470. https:\/\/doi.org\/10.18653\/v1\/2020.emnlp-main.193","DOI":"10.18653\/v1\/2020.emnlp-main.193"},{"key":"7783_CR8","doi-asserted-by":"publisher","first-page":"3974","DOI":"10.1007\/s10489-022-03766-z","volume":"53","author":"M. Masood","year":"2023","unstructured":"Masood, M., Nawaz, M., Malik, Kh.M., Javed, A., Irtaza, A., and Malik, H., Deepfakes generation and detection: State-of-the-art, open challenges, countermeasures, and way forward, Appl. Intell., 2023, vol. 53, no. 4, pp.\u00a03974\u20134026. https:\/\/doi.org\/10.1007\/s10489-022-03766-z","journal-title":"Appl. Intell."},{"key":"7783_CR9","first-page":"1259","volume":"868","author":"M.A. Poltavtseva","year":"2019","unstructured":"Poltavtseva, M.A., Zegzhda, P., Arai, K., Kapoor, S., and Bhatia, R., Heterogeneous semistructured objects analysis, IEEE J. Electron Devices Soc., 2019, vol. 868, p. 1259.","journal-title":"IEEE J. Electron Devices Soc."},{"key":"7783_CR10","doi-asserted-by":"publisher","unstructured":"Yi, J., Wang, C., Tao, J., Zhang, X., Zhang, Ch.Yu., and Zhao, Ya., Audio deepfake detection: A survey, arXiv Preprint, 2023. https:\/\/doi.org\/10.48550\/arXiv.2308.14970","DOI":"10.48550\/arXiv.2308.14970"},{"key":"7783_CR11","doi-asserted-by":"publisher","unstructured":"Wijethunga, R.L.M.A.P.C., Matheesha, D.M.K., Noman, A.A., De Silva, K.H.V.T.A., Tissera, M., and Rupasinghe, L., Deepfake audio detection: A deep learning based solution for group conversations, 2020 2nd\u00a0International Conference on Advancements in Computing (ICAC), Malabe, Sri Lanka, 2020, IEEE, 2020, vol.\u00a01, pp. 192\u2013197. https:\/\/doi.org\/10.1109\/icac51239.2020.9357161","DOI":"10.1109\/icac51239.2020.9357161"},{"key":"7783_CR12","doi-asserted-by":"publisher","unstructured":"Nasar, B.F., T, S., and Lason, E.R., Deepfake detection in media files\u2014Audios, images and videos, 2020 IEEE Recent Advances in Intelligent Computational Systems (RAICS), Thiruvanathapuram, India, 2020, IEEE, 2020, pp. 74\u201379. https:\/\/doi.org\/10.1109\/raics51191.2020.9332516","DOI":"10.1109\/raics51191.2020.9332516"},{"key":"7783_CR13","doi-asserted-by":"publisher","first-page":"2208","DOI":"10.3390\/sym14102208","volume":"14","author":"M. Kalinin","year":"2022","unstructured":"Kalinin, M., Ovasapyan, T., and Poltavtseva, M., Application of the learning automaton model for ensuring cyber resiliency, Symmetry, 2022, vol. 14, no. 10, p. 2208. https:\/\/doi.org\/10.3390\/sym14102208","journal-title":"Symmetry"},{"key":"7783_CR14","doi-asserted-by":"publisher","unstructured":"Conti, E., Salvi, D., Borrelli, C., Hosler, B., Bestagini, P., Antonacci, F., Sarti, A., Stamm, M.C., and Tubaro, S., Deepfake speech detection through emotion recognition: A semantic approach, ICASSP 2022\u20142022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Singapore, 2022, IEEE, 2022, pp.\u00a08962\u20138966. https:\/\/doi.org\/10.1109\/icassp43922.2022.9747186","DOI":"10.1109\/icassp43922.2022.9747186"},{"key":"7783_CR15","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/tnnls.2020.2978386","volume":"32","author":"Z. Wu","year":"2020","unstructured":"Wu, Z., Pan, Sh., Chen, F., Long, G., Zhang, Ch., and Yu, P.S., A comprehensive survey on graph neural networks, IEEE Trans. Neural Networks Learn. Syst., 2020, vol. 32, no. 1, pp. 4\u201324. https:\/\/doi.org\/10.1109\/tnnls.2020.2978386","journal-title":"IEEE Trans. Neural Networks Learn. Syst."},{"key":"7783_CR16","doi-asserted-by":"publisher","first-page":"834","DOI":"10.3103\/s0146411615080234","volume":"49","author":"A.Yu. Chernov","year":"2015","unstructured":"Chernov, A.Yu. and Konoplev, A.S., The use of virtualization technology in the dynamic analysis of software code, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 834\u2013837. https:\/\/doi.org\/10.3103\/s0146411615080234","journal-title":"Autom. Control Comput. Sci."},{"key":"7783_CR17","doi-asserted-by":"publisher","unstructured":"Dakhnovich, A., Moskvin, D., and Zegzhda, D., A necessary condition for industrial internet of things sustainability, Mobile Internet Security, You, I., Kim, H., Youn, TY., Palmieri, F., and Kotenko, I., Eds., Communications in Computer and Information Science, vol. 1544, Singapore: Springer, 2022, pp. 79\u201389. https:\/\/doi.org\/10.1007\/978-981-16-9576-6_7","DOI":"10.1007\/978-981-16-9576-6_7"},{"key":"7783_CR18","unstructured":"Librosa\u2014librosa 0.10.1 documentation. https:\/\/librosa.org\/doc\/latest\/index.html. Cited April 25, 2024."},{"key":"7783_CR19","unstructured":"SpeechRecognition. https:\/\/pypi.org\/project\/SpeechRecognition\/. Cited April 25, 2024."},{"key":"7783_CR20","unstructured":"NLTK: Natural language toolkit. https:\/\/www.nltk.org\/. Cited April 25, 2024."},{"key":"7783_CR21","unstructured":"ASVspoof 2019. https:\/\/www.asvspoof.org\/index2019.html. Cited April 25, 2024."},{"key":"7783_CR22","unstructured":"In-the-Wild Datset. https:\/\/deepfake-total.com\/in_the_wild. Cited April 25, 2024."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700846.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624700846","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700846.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:40Z","timestamp":1773612160000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624700846"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":22,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7783"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624700846","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"3 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 May 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}