{"id":"https://openalex.org/W4298397780","doi":"https://doi.org/10.1145/3552466.3554359","title":"Lessons Learned from ASVSpoof and Remaining Challenges","display_name":"Lessons Learned from ASVSpoof and Remaining Challenges","publication_year":2022,"publication_date":"2022-10-01","ids":{"openalex":"https://openalex.org/W4298397780","doi":"https://doi.org/10.1145/3552466.3554359"},"language":"en","primary_location":{"id":"doi:10.1145/3552466.3554359","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3552466.3554359","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st International Workshop on Deepfake Detection for Audio Multimedia","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007639385","display_name":"Junichi Yamagishi","orcid":"https://orcid.org/0000-0003-2752-3955"},"institutions":[{"id":"https://openalex.org/I184597095","display_name":"National Institute of Informatics","ror":"https://ror.org/04ksd4g47","country_code":"JP","type":"facility","lineage":["https://openalex.org/I1319490839","https://openalex.org/I184597095","https://openalex.org/I4210158934"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Junichi Yamagishi","raw_affiliation_strings":["National Institute of Informatics, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"National Institute of Informatics, Tokyo, Japan","institution_ids":["https://openalex.org/I184597095"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5007639385"],"corresponding_institution_ids":["https://openalex.org/I184597095"],"apc_list":null,"apc_paid":null,"fwci":0.1326,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.5327908,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10860","display_name":"Speech and Audio Processing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11309","display_name":"Music and Audio Processing","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.814303994178772},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.7908499240875244},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.5088484287261963},{"id":"https://openalex.org/keywords/speech-synthesis","display_name":"Speech synthesis","score":0.461805522441864},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.4175674319267273},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4151736795902252},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.40020623803138733},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19818857312202454},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.0782766342163086}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.814303994178772},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.7908499240875244},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.5088484287261963},{"id":"https://openalex.org/C14999030","wikidata":"https://www.wikidata.org/wiki/Q16346","display_name":"Speech synthesis","level":2,"score":0.461805522441864},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.4175674319267273},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4151736795902252},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.40020623803138733},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19818857312202454},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0782766342163086},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3552466.3554359","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3552466.3554359","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st International Workshop on Deepfake Detection for Audio Multimedia","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"display_name":"Climate action","id":"https://metadata.un.org/sdg/13"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W3206995232","https://openalex.org/W3212117663","https://openalex.org/W4221140814","https://openalex.org/W4223538748"],"related_works":["https://openalex.org/W2188559950","https://openalex.org/W2989910292","https://openalex.org/W2998478967","https://openalex.org/W3128793638","https://openalex.org/W2123299109","https://openalex.org/W2021230337","https://openalex.org/W4401097268","https://openalex.org/W2168254078","https://openalex.org/W3016138785","https://openalex.org/W127416991"],"abstract_inverted_index":{"Although":[0],"speech":[1,54,62,204,238],"technology":[2,34],"reproducing":[3],"an":[4],"individual's":[5],"voice":[6],"is":[7,29],"expected":[8],"to":[9,13,71,108,118,185,193,219,246],"bring":[10],"new":[11,203,229],"value":[12],"entertainment,":[14],"it":[15],"may":[16],"cause":[17],"security":[18],"problems":[19],"in":[20,122,199,244],"speaker":[21],"recognition":[22],"systems":[23],"if":[24],"misused.":[25],"In":[26],"addition,":[27],"there":[28],"a":[30,66,132,200],"possibility":[31],"of":[32,46,68,112,130,148,151,158,163,166,215,233,237],"this":[33,47],"being":[35,208],"used":[36],"for":[37,222],"telephone":[38],"fraud":[39],"and":[40,64,86,93,102,120,127,135,145,161,187,212],"information":[41],"manipulation.":[42],"Recognizing":[43],"the":[44,73,76,83,95,103,113,128,196,231,235],"importance":[45,129,232],"issue,":[48],"we":[49,88,98,105],"have":[50,89,106],"been":[51],"working":[52],"on":[53,75,155],"anti-spoofing":[55,224,239],"countermeasures":[56,225,240],"since":[57],"2010,":[58],"including":[59],"building":[60],"large-scale":[61],"databases":[63],"organizing":[65],"series":[67],"ASVspoof":[69],"challenges":[70,97],"evaluate":[72],"detectors":[74],"shared":[77],"database.":[78],"This":[79],"presentation":[80],"will":[81,249],"summarize":[82],"essential":[84],"findings":[85],"lessons":[87,114],"learned":[90],"recently":[91],"[1]":[92],"present":[94],"remaining":[96],"are":[99,139,183,207],"currently":[100],"facing":[101],"results":[104],"achieved":[107],"date":[109],"[2-4].":[110],"Examples":[111],"include":[115,178],"a)":[116],"sensitivity":[117],"hyper-parameters":[119],"features":[121,160,181],"deep":[123],"learning-based":[124],"countermeasure":[125,197],"models":[126,153],"designing":[131],"network":[133,168],"structure":[134],"learning":[136,150,165],"loss":[137],"that":[138,182],"stable":[140],"even":[141],"under":[142],"different":[143,156,167],"conditions,":[144],"b)":[146],"effectiveness":[147],"ensemble":[149,164],"multiple":[152],"trained":[154],"types":[157],"acoustic":[159,172],"ineffectiveness":[162],"structures":[169],"using":[170],"similar":[171],"features.":[173],"The":[174],"ongoing":[175],"research":[176],"topics":[177],"1)":[179],"front-end":[180],"robust":[184],"domain":[186],"channel":[188],"mismatches":[189],"[2],":[190],"2)":[191],"how":[192],"automatically":[194],"expand":[195],"database":[198],"situation":[201],"where":[202],"synthesis":[205],"methods":[206],"invented":[209],"regularly":[210],"[3],":[211],"3)":[213],"detection":[214],"partial":[216],"synthetic":[217],"regions":[218],"provide":[220],"evidence":[221],"XAI":[223],"[4].":[226],"Through":[227],"these":[228],"attempts,":[230],"studying":[234],"issue":[236],"from":[241],"various":[242],"angles,":[243],"addition":[245],"reducing":[247],"EERs,":[248],"be":[250],"illustrated.":[251]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
