{"id":"https://openalex.org/W2918379550","doi":"https://doi.org/10.1109/tencon.2018.8650091","title":"Towards Development of Smart and Reliable Voice Based Personal Assistants","display_name":"Towards Development of Smart and Reliable Voice Based Personal Assistants","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2918379550","doi":"https://doi.org/10.1109/tencon.2018.8650091","mag":"2918379550"},"language":"en","primary_location":{"id":"doi:10.1109/tencon.2018.8650091","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon.2018.8650091","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"TENCON 2018 - 2018 IEEE Region 10 Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085358193","display_name":"Sapan H. Mankad","orcid":"https://orcid.org/0000-0002-1499-0725"},"institutions":[{"id":"https://openalex.org/I165831266","display_name":"Nirma University","ror":"https://ror.org/05qkq7x38","country_code":"IN","type":"education","lineage":["https://openalex.org/I165831266"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sapan H Mankad","raw_affiliation_strings":["Institute of Technology, Nirma University, Ahmedabad, India"],"affiliations":[{"raw_affiliation_string":"Institute of Technology, Nirma University, Ahmedabad, India","institution_ids":["https://openalex.org/I165831266"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053382066","display_name":"Viramya Shah","orcid":null},"institutions":[{"id":"https://openalex.org/I165831266","display_name":"Nirma University","ror":"https://ror.org/05qkq7x38","country_code":"IN","type":"education","lineage":["https://openalex.org/I165831266"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Viramya Shah","raw_affiliation_strings":["Institute of Technology, Nirma University, Ahmedabad, India"],"affiliations":[{"raw_affiliation_string":"Institute of Technology, Nirma University, Ahmedabad, India","institution_ids":["https://openalex.org/I165831266"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008473098","display_name":"Sanjay Garg","orcid":"https://orcid.org/0000-0002-2279-9373"},"institutions":[{"id":"https://openalex.org/I165831266","display_name":"Nirma University","ror":"https://ror.org/05qkq7x38","country_code":"IN","type":"education","lineage":["https://openalex.org/I165831266"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sanjay Garg","raw_affiliation_strings":["Institute of Technology, Nirma University, Ahmedabad, India"],"affiliations":[{"raw_affiliation_string":"Institute of Technology, Nirma University, Ahmedabad, India","institution_ids":["https://openalex.org/I165831266"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5085358193"],"corresponding_institution_ids":["https://openalex.org/I165831266"],"apc_list":null,"apc_paid":null,"fwci":0.4887,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.74537665,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"abs 1706 2101","issue":null,"first_page":"2473","last_page":"2478"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10860","display_name":"Speech and Audio Processing","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11309","display_name":"Music and Audio Processing","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8626525402069092},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.7650644183158875},{"id":"https://openalex.org/keywords/personalization","display_name":"Personalization","score":0.5293042659759521},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.5012907981872559},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4917495548725128},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.4737192988395691},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.46656695008277893},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4490979313850403},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.42559894919395447},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.40996596217155457},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29805123805999756}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8626525402069092},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.7650644183158875},{"id":"https://openalex.org/C183003079","wikidata":"https://www.wikidata.org/wiki/Q1000371","display_name":"Personalization","level":2,"score":0.5293042659759521},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.5012907981872559},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4917495548725128},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.4737192988395691},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.46656695008277893},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4490979313850403},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.42559894919395447},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.40996596217155457},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29805123805999756},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tencon.2018.8650091","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon.2018.8650091","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"TENCON 2018 - 2018 IEEE Region 10 Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W2114376863","https://openalex.org/W2143486266","https://openalex.org/W2143873470","https://openalex.org/W2148154194","https://openalex.org/W2295634712","https://openalex.org/W2602887606","https://openalex.org/W2608268309","https://openalex.org/W2745896134","https://openalex.org/W2749187657","https://openalex.org/W2753883666","https://openalex.org/W2759701035","https://openalex.org/W2781774342","https://openalex.org/W2782121884","https://openalex.org/W2783658022","https://openalex.org/W2785354100","https://openalex.org/W2785659390","https://openalex.org/W2786443036","https://openalex.org/W2963907370","https://openalex.org/W6697322189","https://openalex.org/W6739114201","https://openalex.org/W6747831536","https://openalex.org/W6748110329"],"related_works":["https://openalex.org/W2188559950","https://openalex.org/W2989910292","https://openalex.org/W2998478967","https://openalex.org/W3128793638","https://openalex.org/W2607818178","https://openalex.org/W2123299109","https://openalex.org/W2021230337","https://openalex.org/W3153057489","https://openalex.org/W2895823926","https://openalex.org/W2281508611"],"abstract_inverted_index":{"Due":[0],"to":[1,20,35,59,67,73,126,140,153,158,162,197],"advent":[2],"of":[3,8,32,80,160,184,204],"Machine":[4],"Learning":[5],"and":[6,13,70,123,174,195],"Internet":[7,31],"Things,":[9],"communication":[10],"between":[11],"humans":[12],"machines":[14],"has":[15],"increased":[16],"substantially.":[17],"This":[18],"leads":[19,34],"need":[21],"for":[22,172,178,199],"efficient":[23],"software":[24,61],"that":[25,84],"can":[26,55,85],"enable":[27],"machine-to-human":[28],"interaction":[29],"seamlessly.":[30],"Things":[33],"automation":[36],"as":[37,66],"it":[38],"is":[39,106],"aimed":[40],"at":[41],"frequent":[42],"data":[43],"collection":[44],"without":[45],"continuous":[46],"human":[47],"intervention.":[48],"Moreover,":[49],"there":[50,111],"are":[51,112,150,193],"many":[52],"tasks":[53],"which":[54],"easily":[56],"be":[57],"delegated":[58],"automated":[60],"programs":[62],"(i.e.":[63],"agents)":[64],"so":[65],"provide":[68],"flexibility":[69],"ubiquitous":[71],"service":[72],"users.":[74],"This,":[75],"in":[76,144],"turn,":[77],"requires":[78],"development":[79],"semantic-enabled,":[81],"intelligent":[82],"agents":[83,125],"also":[86],"capture":[87],"implicit":[88],"context-specific":[89],"details":[90],"from":[91],"the":[92,101,107],"user":[93],"queries":[94],"on":[95,120],"World":[96],"Wide":[97],"Web":[98],"(WWW).":[99],"Querying":[100],"WWW":[102],"using":[103,182,189],"voice":[104,133,145],"commands":[105],"current":[108],"trend.":[109],"However,":[110],"some":[113],"issues.":[114],"In":[115],"this":[116],"work,":[117],"we":[118],"focus":[119],"building":[121],"smart":[122],"reliable":[124],"overcome":[127],"a":[128],"big":[129],"challenge":[130],"faced":[131],"by":[132],"based":[134],"personal":[135],"assistants.":[136],"We":[137,166],"have":[138,167],"attempted":[139],"address":[141],"security":[142],"issues":[143],"biometrics":[146],"systems.":[147],"These":[148],"systems":[149],"most":[151],"susceptible":[152],"\"playback":[154],"spoofing":[155,180],"attacks\"":[156],"due":[157],"availability":[159],"smartphones":[161],"any":[163],"end":[164],"user.":[165],"used":[168],"ASVspoof":[169],"2017":[170],"dataset":[171],"implementation":[173],"presented":[175],"our":[176],"findings":[177],"replay":[179],"detection":[181],"fusion":[183],"short-term":[185],"spectral":[186],"features.":[187,207],"Results":[188],"inverse":[190],"MFCC":[191],"features":[192],"promising":[194],"point":[196],"directions":[198],"further":[200],"research":[201],"with":[202],"use":[203],"these":[205],"potential":[206]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
