{"id":"https://openalex.org/W2977461304","doi":"https://doi.org/10.1007/978-3-030-31456-9_55","title":"The GMM and I-Vector Systems Based on Spoofing Algorithms for Speaker Spoofing Detection","display_name":"The GMM and I-Vector Systems Based on Spoofing Algorithms for Speaker Spoofing Detection","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2977461304","doi":"https://doi.org/10.1007/978-3-030-31456-9_55","mag":"2977461304"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-31456-9_55","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-31456-9_55","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009718960","display_name":"Hui Tang","orcid":"https://orcid.org/0000-0003-2155-5235"},"institutions":[{"id":"https://openalex.org/I53592917","display_name":"Jiangxi Normal University","ror":"https://ror.org/05nkgk822","country_code":"CN","type":"education","lineage":["https://openalex.org/I53592917"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hui Tang","raw_affiliation_strings":["School of Computer and Information Engineering, Jiangxi Normal University, Nanchang, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Engineering, Jiangxi Normal University, Nanchang, China","institution_ids":["https://openalex.org/I53592917"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069470708","display_name":"Zhenchun Lei","orcid":"https://orcid.org/0000-0001-5846-7402"},"institutions":[{"id":"https://openalex.org/I53592917","display_name":"Jiangxi Normal University","ror":"https://ror.org/05nkgk822","country_code":"CN","type":"education","lineage":["https://openalex.org/I53592917"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenchun Lei","raw_affiliation_strings":["School of Computer and Information Engineering, Jiangxi Normal University, Nanchang, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Engineering, Jiangxi Normal University, Nanchang, China","institution_ids":["https://openalex.org/I53592917"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106402352","display_name":"Zhongying Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I53592917","display_name":"Jiangxi Normal University","ror":"https://ror.org/05nkgk822","country_code":"CN","type":"education","lineage":["https://openalex.org/I53592917"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhongying Huang","raw_affiliation_strings":["School of Computer and Information Engineering, Jiangxi Normal University, Nanchang, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Engineering, Jiangxi Normal University, Nanchang, China","institution_ids":["https://openalex.org/I53592917"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078935780","display_name":"Hailin Gan","orcid":null},"institutions":[{"id":"https://openalex.org/I53592917","display_name":"Jiangxi Normal University","ror":"https://ror.org/05nkgk822","country_code":"CN","type":"education","lineage":["https://openalex.org/I53592917"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hailin Gan","raw_affiliation_strings":["School of Computer and Information Engineering, Jiangxi Normal University, Nanchang, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Engineering, Jiangxi Normal University, Nanchang, China","institution_ids":["https://openalex.org/I53592917"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101571269","display_name":"Kun Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I147230869","display_name":"China Shipbuilding Industry Corporation (China)","ror":"https://ror.org/0410k9915","country_code":"CN","type":"company","lineage":["https://openalex.org/I147230869"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kun Yu","raw_affiliation_strings":["China Ship Development and Design Center, China Shipbuilding Industry Corporation, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"China Ship Development and Design Center, China Shipbuilding Industry Corporation, Wuhan, China","institution_ids":["https://openalex.org/I147230869"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112123070","display_name":"Yingen Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I53592917","display_name":"Jiangxi Normal University","ror":"https://ror.org/05nkgk822","country_code":"CN","type":"education","lineage":["https://openalex.org/I53592917"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yingen Yang","raw_affiliation_strings":["School of Computer and Information Engineering, Jiangxi Normal University, Nanchang, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Engineering, Jiangxi Normal University, Nanchang, China","institution_ids":["https://openalex.org/I53592917"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5009718960"],"corresponding_institution_ids":["https://openalex.org/I53592917"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.2756,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.5822093,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":null,"issue":null,"first_page":"502","last_page":"510"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10860","display_name":"Speech and Audio Processing","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13289","display_name":"Infant Health and Development","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/3611","display_name":"Pharmacy"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.9116778373718262},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8445017337799072},{"id":"https://openalex.org/keywords/speaker-verification","display_name":"Speaker verification","score":0.7669501900672913},{"id":"https://openalex.org/keywords/speaker-recognition","display_name":"Speaker recognition","score":0.5661307573318481},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.5329505205154419},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.438669890165329},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.40532782673835754},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.38026461005210876},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.0846744179725647}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.9116778373718262},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8445017337799072},{"id":"https://openalex.org/C2982762665","wikidata":"https://www.wikidata.org/wiki/Q1145189","display_name":"Speaker verification","level":3,"score":0.7669501900672913},{"id":"https://openalex.org/C133892786","wikidata":"https://www.wikidata.org/wiki/Q1145189","display_name":"Speaker recognition","level":2,"score":0.5661307573318481},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.5329505205154419},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.438669890165329},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.40532782673835754},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.38026461005210876},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0846744179725647}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-31456-9_55","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-31456-9_55","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","score":0.6399999856948853,"id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W282499614","https://openalex.org/W1916834241","https://openalex.org/W1969876212","https://openalex.org/W2041823554","https://openalex.org/W2123299109","https://openalex.org/W2128466129","https://openalex.org/W2150769028","https://openalex.org/W2168265087","https://openalex.org/W2294013337","https://openalex.org/W2295518531","https://openalex.org/W2295634712","https://openalex.org/W2303197844","https://openalex.org/W2395750323","https://openalex.org/W2401839215","https://openalex.org/W2406845569","https://openalex.org/W2588445447","https://openalex.org/W2612435500","https://openalex.org/W2661849603","https://openalex.org/W2733416080","https://openalex.org/W2799053639","https://openalex.org/W2854103257","https://openalex.org/W2901479908","https://openalex.org/W2921982339","https://openalex.org/W2955054437","https://openalex.org/W2962940899","https://openalex.org/W2963035245","https://openalex.org/W2963138647","https://openalex.org/W2963508548","https://openalex.org/W3143522270"],"related_works":["https://openalex.org/W4294437891","https://openalex.org/W4226389478","https://openalex.org/W2790784932","https://openalex.org/W4297792928","https://openalex.org/W3113108043","https://openalex.org/W4221161333","https://openalex.org/W2061278248","https://openalex.org/W4298202768","https://openalex.org/W1516392727","https://openalex.org/W2140022733"],"abstract_inverted_index":null,"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
