{"id":"https://openalex.org/W4412815937","doi":"https://doi.org/10.1186/s42400-024-00346-1","title":"Evaluation framework for deepfake speech detection: a comparative study of state-of-the-art deepfake speech detectors","display_name":"Evaluation framework for deepfake speech detection: a comparative study of state-of-the-art deepfake speech detectors","publication_year":2025,"publication_date":"2025-08-01","ids":{"openalex":"https://openalex.org/W4412815937","doi":"https://doi.org/10.1186/s42400-024-00346-1"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-024-00346-1","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00346-1","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00346-1","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00346-1","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012747080","display_name":"Anton Firc","orcid":"https://orcid.org/0000-0002-4717-1910"},"institutions":[{"id":"https://openalex.org/I60587646","display_name":"Brno University of Technology","ror":"https://ror.org/03613d656","country_code":"CZ","type":"education","lineage":["https://openalex.org/I60587646"]}],"countries":["CZ"],"is_corresponding":true,"raw_author_name":"Anton Firc","raw_affiliation_strings":["Faculty of Information Technology, Brno University of Technology, Bo\u017eet\u011bchova 2, 61200, Brno, Czechia"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Brno University of Technology, Bo\u017eet\u011bchova 2, 61200, Brno, Czechia","institution_ids":["https://openalex.org/I60587646"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088145356","display_name":"Kamil Malinka","orcid":"https://orcid.org/0000-0002-9009-2193"},"institutions":[{"id":"https://openalex.org/I60587646","display_name":"Brno University of Technology","ror":"https://ror.org/03613d656","country_code":"CZ","type":"education","lineage":["https://openalex.org/I60587646"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Kamil Malinka","raw_affiliation_strings":["Faculty of Information Technology, Brno University of Technology, Bo\u017eet\u011bchova 2, 61200, Brno, Czechia"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Brno University of Technology, Bo\u017eet\u011bchova 2, 61200, Brno, Czechia","institution_ids":["https://openalex.org/I60587646"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008969416","display_name":"Petr Han\u00e1\u010dek","orcid":"https://orcid.org/0000-0001-5507-0768"},"institutions":[{"id":"https://openalex.org/I60587646","display_name":"Brno University of Technology","ror":"https://ror.org/03613d656","country_code":"CZ","type":"education","lineage":["https://openalex.org/I60587646"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Petr Han\u00e1\u010dek","raw_affiliation_strings":["Faculty of Information Technology, Brno University of Technology, Bo\u017eet\u011bchova 2, 61200, Brno, Czechia"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Brno University of Technology, Bo\u017eet\u011bchova 2, 61200, Brno, Czechia","institution_ids":["https://openalex.org/I60587646"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5012747080"],"corresponding_institution_ids":["https://openalex.org/I60587646"],"apc_list":null,"apc_paid":null,"fwci":1.4074,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.82956995,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10860","display_name":"Speech and Audio Processing","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10860","display_name":"Speech and Audio Processing","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6442495584487915},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.5532139539718628},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.4413776397705078},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.3835197687149048},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.11081725358963013},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.05571660399436951}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6442495584487915},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.5532139539718628},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.4413776397705078},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.3835197687149048},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.11081725358963013},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.05571660399436951}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-024-00346-1","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00346-1","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00346-1","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:dbf5a4e115fe488e8d5dfbbf45e2a76a","is_oa":true,"landing_page_url":"https://doaj.org/article/dbf5a4e115fe488e8d5dfbbf45e2a76a","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-24 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-024-00346-1","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00346-1","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00346-1","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4543939094","display_name":null,"funder_award_id":"VB02000060","funder_id":"https://openalex.org/F4320311333","funder_display_name":"Ministerstvo Vnitra \u010cesk\u00e9 Republiky"},{"id":"https://openalex.org/G4954493761","display_name":null,"funder_award_id":"FIT-S-23-8151","funder_id":"https://openalex.org/F4320322748","funder_display_name":"Vysok\u00e9 U\u010den\u00ed Technick\u00e9 v Brn\u011b"},{"id":"https://openalex.org/G6728435477","display_name":null,"funder_award_id":"FIT-S-23-8151","funder_id":"https://openalex.org/F4320336543","funder_display_name":"Fakulta Informa\u010dn\u00edch Technologi\u00ed, Vysok\u00e9 U\u010den\u00ed Technick\u00e9 v Brn\u011b"}],"funders":[{"id":"https://openalex.org/F4320311333","display_name":"Ministerstvo Vnitra \u010cesk\u00e9 Republiky","ror":"https://ror.org/05w1nn565"},{"id":"https://openalex.org/F4320322748","display_name":"Vysok\u00e9 U\u010den\u00ed Technick\u00e9 v Brn\u011b","ror":"https://ror.org/03613d656"},{"id":"https://openalex.org/F4320336543","display_name":"Fakulta Informa\u010dn\u00edch Technologi\u00ed, Vysok\u00e9 U\u010den\u00ed Technick\u00e9 v Brn\u011b","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4412815937.pdf","grobid_xml":"https://content.openalex.org/works/W4412815937.grobid-xml"},"referenced_works_count":48,"referenced_works":["https://openalex.org/W1583837637","https://openalex.org/W2102003408","https://openalex.org/W2143597468","https://openalex.org/W2295634712","https://openalex.org/W2532494225","https://openalex.org/W2889329491","https://openalex.org/W2963300588","https://openalex.org/W2964301388","https://openalex.org/W2989571531","https://openalex.org/W3026777299","https://openalex.org/W3030437843","https://openalex.org/W3095410713","https://openalex.org/W3096513071","https://openalex.org/W3118639295","https://openalex.org/W3126967250","https://openalex.org/W3127781933","https://openalex.org/W3135809943","https://openalex.org/W3158663310","https://openalex.org/W3197358873","https://openalex.org/W3199131409","https://openalex.org/W3200167423","https://openalex.org/W3201197228","https://openalex.org/W4205695807","https://openalex.org/W4225420087","https://openalex.org/W4225904138","https://openalex.org/W4226148876","https://openalex.org/W4229013341","https://openalex.org/W4296069136","https://openalex.org/W4297841787","https://openalex.org/W4298394324","https://openalex.org/W4352978532","https://openalex.org/W4362574774","https://openalex.org/W4385823506","https://openalex.org/W4387969869","https://openalex.org/W4389777316","https://openalex.org/W4389897623","https://openalex.org/W4398186462","https://openalex.org/W4402037602","https://openalex.org/W4402215313","https://openalex.org/W4403954787","https://openalex.org/W4403955261","https://openalex.org/W4403955716","https://openalex.org/W4403955778","https://openalex.org/W4403955819","https://openalex.org/W4403956201","https://openalex.org/W4403956292","https://openalex.org/W4405272334","https://openalex.org/W6926033348"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2366906938"],"abstract_inverted_index":{"Abstract":[0],"The":[1,25],"proliferation":[2],"of":[3,28,33,49,93,128,163],"deepfake":[4,85,100,138],"speech":[5,86,101,139],"poses":[6],"a":[7,76],"significant":[8],"threat":[9],"to":[10,20,63,96,134,148],"cybersecurity,":[11],"from":[12],"manipulating":[13],"political":[14],"speeches":[15],"and":[16,66,78,83,106,114],"impersonating":[17],"public":[18],"figures":[19],"spoofing":[21],"voice":[22],"biometric":[23],"systems.":[24],"increasing":[26],"sophistication":[27],"adversaries":[29],"increases":[30],"the":[31,47,50,91,116,121,126,150,161],"necessity":[32],"deploying":[34],"adaptive":[35],"detection":[36],"methods.":[37],"Moreover,":[38],"real-world":[39],"incidents":[40],"such":[41],"as":[42,130],"fraudulent":[43],"financial":[44],"transactions":[45],"highlight":[46],"severity":[48],"problem.":[51],"Although":[52],"numerous":[53],"detectors":[54,102,132],"have":[55,144],"been":[56,145],"developed,":[57],"their":[58],"evaluation":[59],"remains":[60],"difficult":[61],"due":[62],"different":[64],"methodologies":[65],"benchmark":[67],"datasets,":[68],"making":[69],"direct":[70],"comparisons":[71],"impossible.":[72],"This":[73],"study":[74],"presents":[75],"general":[77],"detailed":[79],"framework":[80,95],"for":[81,159],"evaluating":[82],"comparing":[84],"detectors.":[87,165],"We":[88,109,123],"further":[89],"demonstrate":[90],"use":[92],"this":[94],"evaluate":[97],"40":[98],"state-of-the-art":[99],"under":[103],"various":[104],"conditions":[105],"data":[107],"samples.":[108],"objectively":[110],"compare":[111],"these":[112],"methods":[113],"identify":[115],"key":[117],"attributes":[118],"influencing":[119],"performance":[120],"most.":[122],"also":[124],"stress":[125],"issue":[127],"generalisation,":[129],"current":[131],"struggle":[133],"detect":[135],"previously":[136],"unseen":[137],"samples":[140,142],"or":[141],"that":[143],"modified.":[146],"Finally,":[147],"strengthen":[149],"defence":[151],"against":[152],"synthetic":[153],"audio":[154],"content,":[155],"we":[156],"provide":[157],"recommendations":[158],"improving":[160],"robustness":[162],"future":[164]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
