{"id":"https://openalex.org/W2913181996","doi":"https://doi.org/10.1109/slt.2018.8639666","title":"Analysing The Predictions Of a CNN-Based Replay Spoofing Detection System","display_name":"Analysing The Predictions Of a CNN-Based Replay Spoofing Detection System","publication_year":2018,"publication_date":"2018-12-01","ids":{"openalex":"https://openalex.org/W2913181996","doi":"https://doi.org/10.1109/slt.2018.8639666","mag":"2913181996"},"language":"en","primary_location":{"id":"doi:10.1109/slt.2018.8639666","is_oa":false,"landing_page_url":"https://doi.org/10.1109/slt.2018.8639666","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Spoken Language Technology Workshop (SLT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://qmro.qmul.ac.uk/xmlui/bitstream/123456789/55093/1/Benetos%20Analysing%20the%20predictions%202019%20Accepted.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018585368","display_name":"Bhusan Chettri","orcid":"https://orcid.org/0000-0002-6892-7588"},"institutions":[{"id":"https://openalex.org/I166337079","display_name":"Queen Mary University of London","ror":"https://ror.org/026zzn846","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I166337079"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Bhusan Chettri","raw_affiliation_strings":["School of EECS, Queen Mary University of London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of EECS, Queen Mary University of London, United Kingdom","institution_ids":["https://openalex.org/I166337079"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112401444","display_name":"Saumitra Mishra","orcid":null},"institutions":[{"id":"https://openalex.org/I166337079","display_name":"Queen Mary University of London","ror":"https://ror.org/026zzn846","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I166337079"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Saumitra Mishra","raw_affiliation_strings":["School of EECS, Queen Mary University of London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of EECS, Queen Mary University of London, United Kingdom","institution_ids":["https://openalex.org/I166337079"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054217723","display_name":"Bob L. Sturm","orcid":"https://orcid.org/0000-0003-2549-6367"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Bob L. Sturm","raw_affiliation_strings":["School of EECS, KTH Royal Institute of Engineering, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"School of EECS, KTH Royal Institute of Engineering, Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084672392","display_name":"Emmanouil Benetos","orcid":null},"institutions":[{"id":"https://openalex.org/I166337079","display_name":"Queen Mary University of London","ror":"https://ror.org/026zzn846","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I166337079"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Emmanouil Benetos","raw_affiliation_strings":["School of EECS, Queen Mary University of London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of EECS, Queen Mary University of London, United Kingdom","institution_ids":["https://openalex.org/I166337079"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5018585368"],"corresponding_institution_ids":["https://openalex.org/I166337079"],"apc_list":null,"apc_paid":null,"fwci":2.1974,"has_fulltext":true,"cited_by_count":35,"citation_normalized_percentile":{"value":0.90891529,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"92","last_page":"97"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10860","display_name":"Speech and Audio Processing","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11309","display_name":"Music and Audio Processing","score":0.9884999990463257,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.963834285736084},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7890875339508057},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.7074836492538452},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.5577643513679504},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.49388056993484497},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.45663124322891235},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.4421709179878235},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.42595311999320984},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3539416193962097},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3502785861492157},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1896742284297943}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.963834285736084},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7890875339508057},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.7074836492538452},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.5577643513679504},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.49388056993484497},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.45663124322891235},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.4421709179878235},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.42595311999320984},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3539416193962097},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3502785861492157},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1896742284297943},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/slt.2018.8639666","is_oa":false,"landing_page_url":"https://doi.org/10.1109/slt.2018.8639666","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Spoken Language Technology Workshop (SLT)","raw_type":"proceedings-article"},{"id":"pmh:oai:qmro.qmul.ac.uk:123456789/55093","is_oa":true,"landing_page_url":"https://qmro.qmul.ac.uk/xmlui/handle/123456789/55093","pdf_url":"https://qmro.qmul.ac.uk/xmlui/bitstream/123456789/55093/1/Benetos%20Analysing%20the%20predictions%202019%20Accepted.pdf","source":{"id":"https://openalex.org/S4306400530","display_name":"Queen Mary Research Online (Queen Mary University of London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I166337079","host_organization_name":"Queen Mary University of London","host_organization_lineage":["https://openalex.org/I166337079"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Proceeding"}],"best_oa_location":{"id":"pmh:oai:qmro.qmul.ac.uk:123456789/55093","is_oa":true,"landing_page_url":"https://qmro.qmul.ac.uk/xmlui/handle/123456789/55093","pdf_url":"https://qmro.qmul.ac.uk/xmlui/bitstream/123456789/55093/1/Benetos%20Analysing%20the%20predictions%202019%20Accepted.pdf","source":{"id":"https://openalex.org/S4306400530","display_name":"Queen Mary Research Online (Queen Mary University of London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I166337079","host_organization_name":"Queen Mary University of London","host_organization_lineage":["https://openalex.org/I166337079"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Proceeding"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.7300000190734863,"display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W2913181996.pdf"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W1522301498","https://openalex.org/W1550612414","https://openalex.org/W1980581462","https://openalex.org/W2069883713","https://openalex.org/W2074619556","https://openalex.org/W2083458151","https://openalex.org/W2123299109","https://openalex.org/W2170088868","https://openalex.org/W2282821441","https://openalex.org/W2401315748","https://openalex.org/W2576165910","https://openalex.org/W2588445447","https://openalex.org/W2657631929","https://openalex.org/W2745896134","https://openalex.org/W2747024632","https://openalex.org/W2749090340","https://openalex.org/W2772984056","https://openalex.org/W2802820526","https://openalex.org/W2807325376","https://openalex.org/W2899429527","https://openalex.org/W2964121744","https://openalex.org/W6631190155","https://openalex.org/W6632908759","https://openalex.org/W6746228475"],"related_works":["https://openalex.org/W3007059209","https://openalex.org/W4220832730","https://openalex.org/W4313224733","https://openalex.org/W4312120756","https://openalex.org/W1688416049","https://openalex.org/W4288120931","https://openalex.org/W2972017669","https://openalex.org/W3005888540","https://openalex.org/W2783658022","https://openalex.org/W2836844603"],"abstract_inverted_index":{"Playing":[0],"recorded":[1],"speech":[2],"samples":[3],"of":[4,26,61,97,111,123,133],"an":[5,18],"enrolled":[6],"speaker":[7,20],"-":[8,11],"\u201creplay":[9],"attack\u201d":[10],"is":[12,115],"a":[13,62,75],"simple":[14],"approach":[15],"to":[16,29,51,127],"bypass":[17],"automatic":[19],"verification":[21],"(ASV)":[22],"system.":[23],"The":[24],"vulnerability":[25],"ASV":[27,147],"systems":[28,47,139],"such":[30],"attacks":[31],"has":[32,39],"been":[33,40],"acknowledged":[34],"and":[35,92],"studied,":[36],"but":[37],"there":[38],"no":[41],"research":[42],"into":[43],"what":[44],"spoofing":[45,64,112,137,150],"detection":[46,65,138,151],"are":[48,140],"actually":[49],"learning":[50],"discriminate.":[52],"In":[53],"this":[54],"paper,":[55],"we":[56],"analyse":[57],"the":[58,85,98,101,113,119,129,134],"local":[59],"behaviour":[60],"replay":[63],"system":[66],"based":[67],"on":[68],"convolutional":[69],"neural":[70],"networks":[71],"(CNNs)":[72],"adapted":[73],"from":[74],"state-of-the-art":[76],"CNN":[77],"(LCNN":[78],"<sub":[79],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[80,160],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">FFT</sub>":[81],")":[82],"submitted":[83],"at":[84],"ASVspoof":[86],"2017":[87],"challenge.":[88],"We":[89],"generate":[90],"temporal":[91],"spectral":[93],"explanations":[94],"for":[95],"predictions":[96],"model":[99,114],"using":[100,116],"SLIME":[102],"algorithm.":[103],"Our":[104],"findings":[105],"suggest":[106],"that":[107,136],"in":[108,118],"most":[109],"instances":[110],"information":[117],"first":[120],"400":[121],"milliseconds":[122],"each":[124],"audio":[125],"instance":[126],"make":[128],"class":[130],"prediction.":[131],"Knowledge":[132],"characteristics":[135],"exploiting":[141],"can":[142],"help":[143],"build":[144],"less":[145],"vulnerable":[146],"systems,":[148,152],"other":[149],"as":[153,155],"well":[154],"better":[156],"evaluation":[157],"databases":[158],"<sup":[159],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">1</sup>":[161],".":[162]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
