{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:57:56Z","timestamp":1725807476880},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["Grant agreement No 951911 - AI4Media"],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,27]]},"DOI":"10.1145\/3512732.3533585","type":"proceedings-article","created":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T22:34:13Z","timestamp":1656110053000},"page":"3-9","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["On the Generalizability of Two-dimensional Convolutional Neural Networks for Fake Speech Detection"],"prefix":"10.1145","author":[{"given":"Christoforos","family":"Papastergiopoulos","sequence":"first","affiliation":[{"name":"Center for Research and Technology Hellas - Information Technologies Institute, Thessaloniki, Greece"}]},{"given":"Anastasios","family":"Vafeiadis","sequence":"additional","affiliation":[{"name":"Center for Research and Technology Hellas - Information Technologies Institute, Thessaloniki, Greece"}]},{"given":"Ioannis","family":"Papadimitriou","sequence":"additional","affiliation":[{"name":"Center for Research and Technology Hellas - Information Technologies Institute, Thessaloniki, Greece"}]},{"given":"Konstantinos","family":"Votis","sequence":"additional","affiliation":[{"name":"Center for Research and Technology Hellas - Information Technologies Institute, Thessaloniki, Greece"}]},{"given":"Dimitrios","family":"Tzovaras","sequence":"additional","affiliation":[{"name":"Center for Research and Technology Hellas - Information Technologies Institute, Thessaloniki, Greece"}]}],"member":"320","published-online":{"date-parts":[[2022,6,27]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"The creation and detection of deepfakes: A survey. ACM Computing Surveys (CSUR), 54(1):1--41","author":"Mirsky Yisroel","year":"2021","unstructured":"Yisroel Mirsky and Wenke Lee . The creation and detection of deepfakes: A survey. ACM Computing Surveys (CSUR), 54(1):1--41 , 2021 . Yisroel Mirsky and Wenke Lee. The creation and detection of deepfakes: A survey. ACM Computing Surveys (CSUR), 54(1):1--41, 2021."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_2_1","DOI":"10.1016\/j.inffus.2020.06.014"},{"key":"e_1_3_2_2_3_1","volume-title":"Implications of artificial intelligence for cybersecurity: Proceedings of a workshop","author":"Engineering National Academies of Sciences, Medicine, et al.","year":"2020","unstructured":"Engineering National Academies of Sciences, Medicine, et al. Implications of artificial intelligence for cybersecurity: Proceedings of a workshop . National Academies Press , 2020 . Engineering National Academies of Sciences, Medicine, et al. Implications of artificial intelligence for cybersecurity: Proceedings of a workshop. National Academies Press, 2020."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_4_1","DOI":"10.1109\/SPED.2019.8906599"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_5_1","DOI":"10.6028\/NIST.IR.4930"},{"key":"e_1_3_2_2_6_1","volume-title":"Adversarial examples: Attacks and defenses for deep learning","author":"Yuan Xiaoyong","year":"2019","unstructured":"Xiaoyong Yuan , Pan He , Qile Zhu , and Xiaolin Li . Adversarial examples: Attacks and defenses for deep learning . IEEE transactions on neural networks and learning systems, 30(9):2805--2824, 2019 . Xiaoyong Yuan, Pan He, Qile Zhu, and Xiaolin Li. Adversarial examples: Attacks and defenses for deep learning. IEEE transactions on neural networks and learning systems, 30(9):2805--2824, 2019."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_7_1","DOI":"10.5555\/1592988"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_8_1","DOI":"10.1109\/TASL.2013.2269291"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_9_1","DOI":"10.1109\/ICASSP.2013.6639225"},{"key":"e_1_3_2_2_10_1","volume-title":"Mixture density networks. Technical report","author":"Bishop Christopher M","year":"1994","unstructured":"Christopher M Bishop . Mixture density networks. Technical report , 1994 . Christopher M Bishop. Mixture density networks. Technical report, 1994."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_11_1","DOI":"10.1109\/ICASSP.2017.7953210"},{"key":"e_1_3_2_2_12_1","volume-title":"et al. Tacotron: Towards end-to-end speech synthesis. arXiv preprint arXiv:1703.10135","author":"Wang Yuxuan","year":"2017","unstructured":"Yuxuan Wang , RJ Skerry-Ryan , Daisy Stanton , Yonghui Wu , Ron J Weiss , Navdeep Jaitly , Zongheng Yang , Ying Xiao , Zhifeng Chen , Samy Bengio , et al. Tacotron: Towards end-to-end speech synthesis. arXiv preprint arXiv:1703.10135 , 2017 . Yuxuan Wang, RJ Skerry-Ryan, Daisy Stanton, Yonghui Wu, Ron J Weiss, Navdeep Jaitly, Zongheng Yang, Ying Xiao, Zhifeng Chen, Samy Bengio, et al. Tacotron: Towards end-to-end speech synthesis. arXiv preprint arXiv:1703.10135, 2017."},{"key":"e_1_3_2_2_13_1","volume-title":"Speaker identification and verification using gaussian mixture speaker models. Speech communication, 17(1--2):91--108","author":"Reynolds Douglas A","year":"1995","unstructured":"Douglas A Reynolds . Speaker identification and verification using gaussian mixture speaker models. Speech communication, 17(1--2):91--108 , 1995 . Douglas A Reynolds. Speaker identification and verification using gaussian mixture speaker models. Speech communication, 17(1--2):91--108, 1995."},{"key":"e_1_3_2_2_14_1","volume-title":"Speaker verification using adapted gaussian mixture models. Digital signal processing, 10(1--3):19--41","author":"Reynolds Douglas A","year":"2000","unstructured":"Douglas A Reynolds , Thomas F Quatieri , and Robert B Dunn . Speaker verification using adapted gaussian mixture models. Digital signal processing, 10(1--3):19--41 , 2000 . Douglas A Reynolds, Thomas F Quatieri, and Robert B Dunn. Speaker verification using adapted gaussian mixture models. Digital signal processing, 10(1--3):19--41, 2000."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_15_1","DOI":"10.1016\/S1007-0214(08)70083-X"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_16_1","DOI":"10.1109\/TASL.2008.2004297"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_17_1","DOI":"10.1109\/LSP.2013.2273127"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_18_1","DOI":"10.1109\/PRIA.2015.7161639"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_19_1","DOI":"10.1007\/s12065-016-0150-5"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_20_1","DOI":"10.1016\/j.specom.2015.07.003"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_21_1","DOI":"10.1587\/transinf.2016EDL8106"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_22_1","DOI":"10.18178\/ijmlc.2019.9.2.778"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_23_1","DOI":"10.1016\/j.eswa.2021.115465"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_24_1","DOI":"10.1145\/3394171.3413716"},{"key":"e_1_3_2_2_25_1","volume-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan Karen","year":"2015","unstructured":"Karen Simonyan and Andrew Zisserman . Very deep convolutional networks for large-scale image recognition , 2015 . Karen Simonyan and Andrew Zisserman. Very deep convolutional networks for large-scale image recognition, 2015."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_26_1","DOI":"10.1109\/SPED.2019.8906599"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_27_1","DOI":"10.1109\/ICASSP.2018.8461368"},{"unstructured":"Kundan Kumar Rithesh Kumar Thibault de Boissiere Lucas Gestin Wei Zhen Teoh Jose Sotelo Alexandre de Br\u00e9bisson Yoshua Bengio and Aaron C Courville. Melgan: Generative adversarial networks for conditional waveform synthesis. Advances in neural information processing systems 32 2019. Kundan Kumar Rithesh Kumar Thibault de Boissiere Lucas Gestin Wei Zhen Teoh Jose Sotelo Alexandre de Br\u00e9bisson Yoshua Bengio and Aaron C Courville. Melgan: Generative adversarial networks for conditional waveform synthesis. Advances in neural information processing systems 32 2019.","key":"e_1_3_2_2_28_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_29_1","DOI":"10.1016\/j.eswa.2019.06.040"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_30_1","DOI":"10.3390\/electronics9101593"},{"key":"e_1_3_2_2_31_1","volume-title":"3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7--9, 2015, Conference Track Proceedings","author":"Simonyan Karen","year":"2015","unstructured":"Karen Simonyan and Andrew Zisserman . Very deep convolutional networks for large-scale image recognition. In Yoshua Bengio and Yann LeCun, editors , 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7--9, 2015, Conference Track Proceedings , 2015 . Karen Simonyan and Andrew Zisserman. Very deep convolutional networks for large-scale image recognition. In Yoshua Bengio and Yann LeCun, editors, 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7--9, 2015, Conference Track Proceedings, 2015."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_32_1","DOI":"10.1016\/j.asej.2010.09.005"}],"event":{"sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"acronym":"ICMR '22","name":"ICMR '22: International Conference on Multimedia Retrieval","location":"Newark NJ USA"},"container-title":["Proceedings of the 1st International Workshop on Multimedia AI against Disinformation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3512732.3533585","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,9]],"date-time":"2023-06-09T20:17:22Z","timestamp":1686341842000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3512732.3533585"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,27]]},"references-count":32,"alternative-id":["10.1145\/3512732.3533585","10.1145\/3512732"],"URL":"https:\/\/doi.org\/10.1145\/3512732.3533585","relation":{},"subject":[],"published":{"date-parts":[[2022,6,27]]},"assertion":[{"value":"2022-06-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}