{"id":"https://openalex.org/W4410192325","doi":"https://doi.org/10.1145/3696673.3723086","title":"Forensic Investigation of Synthetic Voice Spoofing Detection in Social App","display_name":"Forensic Investigation of Synthetic Voice Spoofing Detection in Social App","publication_year":2025,"publication_date":"2025-04-24","ids":{"openalex":"https://openalex.org/W4410192325","doi":"https://doi.org/10.1145/3696673.3723086"},"language":"en","primary_location":{"id":"doi:10.1145/3696673.3723086","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3696673.3723086","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3696673.3723086","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM Southeast Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3696673.3723086","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5117476881","display_name":"Inioluwa Kola-Adelakin","orcid":null},"institutions":[{"id":"https://openalex.org/I8248082","display_name":"Florida Agricultural and Mechanical University","ror":"https://ror.org/00c4wc133","country_code":"US","type":"education","lineage":["https://openalex.org/I8248082"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Inioluwa Kola-Adelakin","raw_affiliation_strings":["Department of Computer&amp; Info Sciences, Florida A&amp;M University, Tallahassee, FL, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer&amp; Info Sciences, Florida A&amp;M University, Tallahassee, FL, USA","institution_ids":["https://openalex.org/I8248082"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062391953","display_name":"Maryam Taeb","orcid":"https://orcid.org/0000-0001-9950-1953"},"institutions":[{"id":"https://openalex.org/I83683471","display_name":"University of West Florida","ror":"https://ror.org/002w4zy91","country_code":"US","type":"education","lineage":["https://openalex.org/I83683471"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Maryam Taeb","raw_affiliation_strings":["Department of Cybersecurity and Information Technology, University of West Florida, Pensacola, FL, USA"],"affiliations":[{"raw_affiliation_string":"Department of Cybersecurity and Information Technology, University of West Florida, Pensacola, FL, USA","institution_ids":["https://openalex.org/I83683471"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009634429","display_name":"Hongmei Chi","orcid":"https://orcid.org/0000-0003-4610-6479"},"institutions":[{"id":"https://openalex.org/I8248082","display_name":"Florida Agricultural and Mechanical University","ror":"https://ror.org/00c4wc133","country_code":"US","type":"education","lineage":["https://openalex.org/I8248082"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hongmei Chi","raw_affiliation_strings":["Department of Computer and Information Sciences, Florida A&amp;M University, Tallahassee, FL, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, Florida A&amp;M University, Tallahassee, FL, USA","institution_ids":["https://openalex.org/I8248082"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5117476881"],"corresponding_institution_ids":["https://openalex.org/I8248082"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13581229,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"263","last_page":"268"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9830999970436096,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9667999744415283,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.7357942461967468},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.685340166091919},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.4975314438343048},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35102686285972595},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3360401391983032}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.7357942461967468},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.685340166091919},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.4975314438343048},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35102686285972595},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3360401391983032}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3696673.3723086","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3696673.3723086","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3696673.3723086","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM Southeast Conference","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3696673.3723086","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3696673.3723086","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3696673.3723086","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM Southeast Conference","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Gender equality","score":0.5699999928474426,"id":"https://metadata.un.org/sdg/5"}],"awards":[{"id":"https://openalex.org/G1446759831","display_name":null,"funder_award_id":"H98230-21-1-0326","funder_id":"https://openalex.org/F4320311089","funder_display_name":"National Security Agency"},{"id":"https://openalex.org/G7845798442","display_name":null,"funder_award_id":"H98230","funder_id":"https://openalex.org/F4320311089","funder_display_name":"National Security Agency"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320311089","display_name":"National Security Agency","ror":"https://ror.org/0047bvr32"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4410192325.pdf","grobid_xml":"https://content.openalex.org/works/W4410192325.grobid-xml"},"referenced_works_count":11,"referenced_works":["https://openalex.org/W3097681707","https://openalex.org/W3209972423","https://openalex.org/W4284976142","https://openalex.org/W4311599471","https://openalex.org/W4312743281","https://openalex.org/W4385189362","https://openalex.org/W4385255575","https://openalex.org/W4387328378","https://openalex.org/W4391929940","https://openalex.org/W4394989230","https://openalex.org/W4406363368"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2188559950","https://openalex.org/W2998478967","https://openalex.org/W2989910292","https://openalex.org/W2123299109","https://openalex.org/W3128793638","https://openalex.org/W2021230337","https://openalex.org/W4388934690"],"abstract_inverted_index":{"With":[0],"the":[1,7,57,99,106,110,129,145,155,164],"rapid":[2],"growth":[3],"of":[4,9,59,119,124,135,140,152,161],"social":[5,42,64],"applications,":[6],"misuse":[8],"synthetic":[10,60,171],"voice":[11,61],"generation":[12],"technologies":[13],"poses":[14],"a":[15,31,53,69,75,81,116,132,174],"significant":[16],"security":[17],"threat.":[18],"Voice":[19],"spoofing,":[20],"where":[21],"artificial":[22],"voices":[23],"are":[24,95],"generated":[25],"to":[26,51,101],"impersonate":[27],"real":[28,169],"individuals,":[29],"is":[30],"growing":[32],"concern":[33],"in":[34,80,167,180],"various":[35],"domains,":[36],"including":[37,144],"online":[38],"communication,":[39],"authentication,":[40],"and":[41,121,126,137,154],"media":[43],"interactions.":[44],"This":[45,66],"paper":[46],"uses":[47],"deep":[48],"learning":[49],"techniques":[50],"present":[52],"forensic":[54],"investigation":[55],"into":[56],"detection":[58],"spoofing":[62],"within":[63],"apps.":[65],"study":[67],"integrates":[68],"Convolutional":[70,77],"Neural":[71],"Network":[72,78],"(CNN)":[73],"with":[74,148,158],"Temporal":[76],"(TCN)":[79],"hybrid":[82],"architecture.":[83],"A":[84],"lightweight":[85],"MobileNet":[86],"CNN":[87],"first":[88],"extracts":[89],"spatial":[90],"features":[91],"from":[92,170],"Mel-Spectrograms,":[93],"which":[94],"then":[96],"analyzed":[97],"by":[98],"TCN":[100],"capture":[102],"sequential":[103],"patterns.":[104],"Using":[105],"fake-or-real":[107],"(FoR)":[108],"dataset,":[109,112],"for-norm":[111],"this":[113],"model":[114,130],"achieved":[115,131],"training":[117,133],"precision":[118,134,151],"99.89%":[120],"validation":[122,138],"accuracy":[123,139],"99.79%":[125,136],"for-rerec":[127],"dataset":[128],"94.22%.":[141],"Evaluation":[142],"metrics,":[143],"precision-recall":[146],"curve":[147,157],"an":[149,159],"average":[150],"99%":[153],"ROC":[156],"AUC":[160],"99%,":[162],"underscore":[163],"model's":[165],"robustness":[166],"distinguishing":[168],"audio,":[172],"offering":[173],"reliable":[175],"solution":[176],"for":[177],"real-time":[178],"deployment":[179],"resource-constrained":[181],"environments.":[182]},"counts_by_year":[],"updated_date":"2026-03-15T09:29:46.208133","created_date":"2025-10-10T00:00:00"}
