{"id":"https://openalex.org/W2956804760","doi":"https://doi.org/10.1109/icc.2019.8761244","title":"Spoofing Attacks on Speaker Verification Systems Based Generated Voice using Genetic Algorithm","display_name":"Spoofing Attacks on Speaker Verification Systems Based Generated Voice using Genetic Algorithm","publication_year":2019,"publication_date":"2019-05-01","ids":{"openalex":"https://openalex.org/W2956804760","doi":"https://doi.org/10.1109/icc.2019.8761244","mag":"2956804760"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2019.8761244","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2019.8761244","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100350266","display_name":"Qi Li","orcid":"https://orcid.org/0000-0003-1720-2664"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qi Li","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi\u2019an, China","School of Cyber Engineering, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021292791","display_name":"Hui Zhu","orcid":"https://orcid.org/0000-0002-5853-633X"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Zhu","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi\u2019an, China","School of Cyber Engineering, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068420460","display_name":"Ziling Zhang","orcid":"https://orcid.org/0009-0005-3971-6182"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ziling Zhang","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi\u2019an, China","School of Cyber Engineering, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070447777","display_name":"Rongxing Lu","orcid":"https://orcid.org/0000-0001-5720-0941"},"institutions":[{"id":"https://openalex.org/I106938459","display_name":"University of New Brunswick","ror":"https://ror.org/05nkf0n29","country_code":"CA","type":"education","lineage":["https://openalex.org/I106938459"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Rongxing Lu","raw_affiliation_strings":["Faculty of Computer Science, University of New Brunswick, New Brunswick, Canada"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, University of New Brunswick, New Brunswick, Canada","institution_ids":["https://openalex.org/I106938459"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101864760","display_name":"Fengwei Wang","orcid":"https://orcid.org/0000-0002-6886-8258"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fengwei Wang","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi\u2019an, China","School of Cyber Engineering, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100423976","display_name":"Hui Li","orcid":"https://orcid.org/0000-0003-3139-2898"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Li","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi\u2019an, China","School of Cyber Engineering, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100350266"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":0.5787,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.75461587,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11309","display_name":"Music and Audio Processing","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10860","display_name":"Speech and Audio Processing","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.8962053656578064},{"id":"https://openalex.org/keywords/speaker-verification","display_name":"Speaker verification","score":0.8391500115394592},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8348778486251831},{"id":"https://openalex.org/keywords/genetic-algorithm","display_name":"Genetic algorithm","score":0.6725112795829773},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.668475866317749},{"id":"https://openalex.org/keywords/speaker-recognition","display_name":"Speaker recognition","score":0.6291217803955078},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.46438491344451904},{"id":"https://openalex.org/keywords/population","display_name":"Population","score":0.4400537610054016},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3788638710975647},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.33256757259368896},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2794930338859558},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.16945511102676392},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.12615042924880981},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10729613900184631}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.8962053656578064},{"id":"https://openalex.org/C2982762665","wikidata":"https://www.wikidata.org/wiki/Q1145189","display_name":"Speaker verification","level":3,"score":0.8391500115394592},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8348778486251831},{"id":"https://openalex.org/C8880873","wikidata":"https://www.wikidata.org/wiki/Q187787","display_name":"Genetic algorithm","level":2,"score":0.6725112795829773},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.668475866317749},{"id":"https://openalex.org/C133892786","wikidata":"https://www.wikidata.org/wiki/Q1145189","display_name":"Speaker recognition","level":2,"score":0.6291217803955078},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.46438491344451904},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.4400537610054016},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3788638710975647},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.33256757259368896},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2794930338859558},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.16945511102676392},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.12615042924880981},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10729613900184631},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2019.8761244","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2019.8761244","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1996950552","https://openalex.org/W2005308782","https://openalex.org/W2039057510","https://openalex.org/W2061533153","https://openalex.org/W2064463502","https://openalex.org/W2077740952","https://openalex.org/W2102300661","https://openalex.org/W2123299109","https://openalex.org/W2150769028","https://openalex.org/W2288303032","https://openalex.org/W2408592790","https://openalex.org/W2519091744","https://openalex.org/W2600150053","https://openalex.org/W2602887606","https://openalex.org/W2612434969","https://openalex.org/W2654195758","https://openalex.org/W2746471976","https://openalex.org/W2783113218","https://openalex.org/W2791874343","https://openalex.org/W2808706139","https://openalex.org/W2949382160","https://openalex.org/W2964301649","https://openalex.org/W6660130284","https://openalex.org/W6675098511","https://openalex.org/W6696015502","https://openalex.org/W6737575990","https://openalex.org/W6752888775"],"related_works":["https://openalex.org/W4294437891","https://openalex.org/W4226389478","https://openalex.org/W4297792928","https://openalex.org/W4221161333","https://openalex.org/W3113108043","https://openalex.org/W2061278248","https://openalex.org/W4298202768","https://openalex.org/W1914348842","https://openalex.org/W2331222812","https://openalex.org/W2294013337"],"abstract_inverted_index":{"Speaker":[0],"verification":[1,24,58,98],"has":[2],"played":[3],"a":[4],"significant":[5],"role":[6],"in":[7,18],"authentication":[8],"with":[9,111],"the":[10,28,43,83,122],"booming":[11],"development":[12],"of":[13,47,85],"smartphones":[14],"and":[15,45,120],"intelligent":[16],"terminals":[17],"recent":[19],"years.":[20],"However,":[21],"most":[22],"speaker":[23,57,97,123],"systems":[25,59],"directly":[26],"store":[27],"users":[29,119],"original":[30],"voiceprint":[31,48,113],"template":[32,49,114],"data":[33,50,115],"(or":[34],"called":[35],"acoustic":[36],"features).":[37],"In":[38],"this":[39],"paper,":[40],"we":[41],"reveal":[42],"insecurity":[44],"sensitiveness":[46],"by":[51],"carrying":[52],"out":[53],"spoofing":[54],"attacks":[55],"on":[56,68,94],"using":[60],"genetic":[61,70,73,77],"algorithm.":[62],"Meanwhile,":[63],"multiple":[64,75],"generation":[65,87],"models":[66,88],"based":[67],"different":[69],"algorithms":[71],"(standard":[72],"algorithm,":[74],"population":[76],"algorithm)":[78],"are":[79,89],"proposed,":[80],"but":[81],"also":[82],"effects":[84],"these":[86],"compared.":[90],"Moreover,":[91],"experimental":[92],"results":[93],"state-of-the-art":[95],"text-independent":[96],"techniques":[99],"(such":[100],"as":[101],"i-vector,":[102],"GMM-UBM)":[103],"clearly":[104],"demonstrate":[105],"that":[106],"our":[107],"generated":[108],"attack":[109],"voice":[110],"leaked":[112],"can":[116],"completely":[117],"imitate":[118],"pass":[121],"verification.":[124]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
