{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:05:45Z","timestamp":1730297145495,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T00:00:00Z","timestamp":1673222400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T00:00:00Z","timestamp":1673222400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,1,9]]},"DOI":"10.1109\/slt54892.2023.10022504","type":"proceedings-article","created":{"date-parts":[[2023,1,27]],"date-time":"2023-01-27T18:54:03Z","timestamp":1674845643000},"page":"593-598","source":"Crossref","is-referenced-by-count":2,"title":["How to Boost Anti-Spoofing with X-Vectors"],"prefix":"10.1109","author":[{"given":"Xinyue","family":"Ma","sequence":"first","affiliation":[{"name":"Tsinghua University,Tsinghua National Laboratory for Information Science and Technology,Department of Electronic Engineering,Beijing,China"}]},{"given":"Shanshan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tencent Research,Beijing,China"}]},{"given":"Shen","family":"Huang","sequence":"additional","affiliation":[{"name":"Tencent Research,Beijing,China"}]},{"given":"Ji","family":"Gao","sequence":"additional","affiliation":[{"name":"Tencent Research,Beijing,China"}]},{"given":"Ying","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Xinjiang University,Ururmqi,China"}]},{"given":"Liang","family":"He","sequence":"additional","affiliation":[{"name":"Tsinghua University,Tsinghua National Laboratory for Information Science and Technology,Department of Electronic Engineering,Beijing,China"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.21437\/Interspeech.2020-1052"},{"volume-title":"ASVspoof 2019: Automatic speaker verification spoofing and countermeasures challenge evaluation plan.","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TASLP.2020.3009494"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/ICME51207.2021.9428313"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.21437\/Interspeech.2019-1794"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ICASSP39728.2021.9413828"},{"key":"ref7","article-title":"Complementing Handcrafted Features with Raw Waveform Using a Light-weight Auxiliary Model","volume":"abs\/2109. 02773","author":"Teng","year":"2021","journal-title":"ArXiv"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/LSP.2021.3089437"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/ICASSP39728.2021.9414234"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ASRU.2013.6707705"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1186\/s13636-019-0166-8"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.21437\/Interspeech.2017-620"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.21437\/Interspeech.2018-1929"},{"key":"ref14","first-page":"2087","article-title":"A Comparison of Features for Synthetic Speech Detection","volume-title":"conference of the international speech communication association","author":"Kinnunen"},{"volume-title":"ASRU Workshop","author":"Povey","article-title":"The Kaldi Speech Recognition Toolkit","key":"ref15"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.21437\/Interspeech.2019-1760"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TIFS.2020.3039045"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/ICASSP.2019.8683477"},{"key":"ref19","article-title":"MUSAN: A Music, Speech, and Noise Corpus","volume":"abs\/1510. 08484","author":"Snyder","year":"2015","journal-title":"ArXiv"},{"key":"ref20","article-title":"Large-Margin Softmax Loss for Convolutional Neural Networks","volume-title":"ProC. Int. Conf. Mach. Learn.","volume":"abs\/1612. 02295","author":"Liu"}],"event":{"name":"2022 IEEE Spoken Language Technology Workshop (SLT)","start":{"date-parts":[[2023,1,9]]},"location":"Doha, Qatar","end":{"date-parts":[[2023,1,12]]}},"container-title":["2022 IEEE Spoken Language Technology Workshop (SLT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10022052\/10022330\/10022504.pdf?arnumber=10022504","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T08:06:32Z","timestamp":1707811592000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10022504\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,9]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/slt54892.2023.10022504","relation":{},"subject":[],"published":{"date-parts":[[2023,1,9]]}}}