{"id":"https://openalex.org/W2401839215","doi":"https://doi.org/10.21437/interspeech.2015-474","title":"Robust deep feature for spoofing detection \u2014 the SJTU system for ASVspoof 2015 challenge","display_name":"Robust deep feature for spoofing detection \u2014 the SJTU system for ASVspoof 2015 challenge","publication_year":2015,"publication_date":"2015-09-06","ids":{"openalex":"https://openalex.org/W2401839215","doi":"https://doi.org/10.21437/interspeech.2015-474","mag":"2401839215"},"language":"en","primary_location":{"id":"doi:10.21437/interspeech.2015-474","is_oa":false,"landing_page_url":"https://doi.org/10.21437/interspeech.2015-474","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Interspeech 2015","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071702566","display_name":"Nanxin Chen","orcid":"https://orcid.org/0000-0001-6698-1604"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Nanxin Chen","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100341993","display_name":"Yanmin Qian","orcid":"https://orcid.org/0000-0002-0314-3790"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yanmin Qian","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080154283","display_name":"Heinrich Dinkel","orcid":"https://orcid.org/0000-0003-4330-8980"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Heinrich Dinkel","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100427321","display_name":"Bo Chen","orcid":"https://orcid.org/0000-0002-2522-4452"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bo Chen","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5043098653","display_name":"Kai Yu","orcid":"https://orcid.org/0000-0002-7102-9826"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kai Yu","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5071702566"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":11.2175,"has_fulltext":false,"cited_by_count":70,"citation_normalized_percentile":{"value":0.9841307,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":100},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10860","display_name":"Speech and Audio Processing","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13122","display_name":"Linguistics and Cultural Studies","score":0.9610000252723694,"subfield":{"id":"https://openalex.org/subfields/1203","display_name":"Language and Linguistics"},"field":{"id":"https://openalex.org/fields/12","display_name":"Arts and Humanities"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.964683473110199},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7936853170394897},{"id":"https://openalex.org/keywords/mahalanobis-distance","display_name":"Mahalanobis distance","score":0.7298794388771057},{"id":"https://openalex.org/keywords/normalization","display_name":"Normalization (sociology)","score":0.6704230904579163},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6393933296203613},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.620045006275177},{"id":"https://openalex.org/keywords/word-error-rate","display_name":"Word error rate","score":0.5532761812210083},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.5206424593925476},{"id":"https://openalex.org/keywords/speaker-verification","display_name":"Speaker verification","score":0.5019931793212891},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4905068278312683},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.48123812675476074},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.46375802159309387},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.42810171842575073},{"id":"https://openalex.org/keywords/speaker-recognition","display_name":"Speaker recognition","score":0.37201693654060364},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.350902795791626},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10134008526802063}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.964683473110199},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7936853170394897},{"id":"https://openalex.org/C1921717","wikidata":"https://www.wikidata.org/wiki/Q1334846","display_name":"Mahalanobis distance","level":2,"score":0.7298794388771057},{"id":"https://openalex.org/C136886441","wikidata":"https://www.wikidata.org/wiki/Q926129","display_name":"Normalization (sociology)","level":2,"score":0.6704230904579163},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6393933296203613},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.620045006275177},{"id":"https://openalex.org/C40969351","wikidata":"https://www.wikidata.org/wiki/Q3516228","display_name":"Word error rate","level":2,"score":0.5532761812210083},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.5206424593925476},{"id":"https://openalex.org/C2982762665","wikidata":"https://www.wikidata.org/wiki/Q1145189","display_name":"Speaker verification","level":3,"score":0.5019931793212891},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4905068278312683},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.48123812675476074},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.46375802159309387},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.42810171842575073},{"id":"https://openalex.org/C133892786","wikidata":"https://www.wikidata.org/wiki/Q1145189","display_name":"Speaker recognition","level":2,"score":0.37201693654060364},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.350902795791626},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10134008526802063},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C19165224","wikidata":"https://www.wikidata.org/wiki/Q23404","display_name":"Anthropology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.21437/interspeech.2015-474","is_oa":false,"landing_page_url":"https://doi.org/10.21437/interspeech.2015-474","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Interspeech 2015","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5600000023841858,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1490120479","https://openalex.org/W1507099578","https://openalex.org/W2041942569","https://openalex.org/W2061278248","https://openalex.org/W2064364374","https://openalex.org/W2072473772","https://openalex.org/W2101261946","https://openalex.org/W2112606109","https://openalex.org/W2114376863","https://openalex.org/W2117544888","https://openalex.org/W2121415728","https://openalex.org/W2123299109","https://openalex.org/W2133233779","https://openalex.org/W2136879537","https://openalex.org/W2137310491","https://openalex.org/W2138878452","https://openalex.org/W2143076824","https://openalex.org/W2147145909","https://openalex.org/W2150769028","https://openalex.org/W2150962366","https://openalex.org/W2160815625","https://openalex.org/W2293903156","https://openalex.org/W2405506115","https://openalex.org/W2405641138","https://openalex.org/W2548055032"],"related_works":["https://openalex.org/W4294437891","https://openalex.org/W4226389478","https://openalex.org/W2790784932","https://openalex.org/W4297792928","https://openalex.org/W3113108043","https://openalex.org/W4221161333","https://openalex.org/W2061278248","https://openalex.org/W4298202768","https://openalex.org/W1914348842","https://openalex.org/W2588453814"],"abstract_inverted_index":{"Recently":[0],"there":[1],"have":[2],"been":[3],"wide":[4],"interests":[5],"in":[6,46,127],"speaker":[7,28,141],"verification":[8,29],"for":[9,63,78],"various":[10],"applications.":[11],"Although":[12],"the":[13,26,40,47,60,64,79,84,89,100,105,123,128],"reported":[14],"equal":[15],"error":[16],"rate":[17],"(EER)":[18],"is":[19,76],"relatively":[20],"low,":[21],"many":[22],"evidences":[23],"show":[24],"that":[25],"present":[27],"technologies":[30],"can":[31],"be":[32],"susceptible":[33],"to":[34,82,98],"malicious":[35],"spoofing":[36,61,80,118,130],"attacks.":[37],"Inspired":[38],"by":[39],"great":[41],"success":[42],"of":[43],"deep":[44,51,107],"learning":[45,108,149],"automatic":[48],"speech":[49],"recognition,":[50],"neural":[52],"network":[53],"(DNN)":[54],"based":[55,73,109],"approaches":[56],"are":[57,96],"developed":[58],"on":[59,117],"detection":[62,81,119,131],"first":[65,129],"time.":[66],"In":[67],"this":[68],"paper,":[69],"a":[70],"novel":[71],"DNN":[72],"robust":[74],"representation":[75],"proposed":[77],"extract":[83],"representative":[85],"spoofing-vector":[86],"(s-vector).":[87],"Then":[88],"mahalanobis":[90],"distance":[91],"and":[92,121],"appropriate":[93],"normalization":[94],"methods":[95],"investigated":[97],"get":[99],"best":[101],"system":[102],"performance.":[103],"Using":[104],"designed":[106],"strategy,":[110],"our":[111],"team":[112],"obtained":[113],"an":[114],"impressive":[115],"result":[116],"task,":[120],"achieved":[122],"3":[124],"rd":[125],"position":[126],"challenge":[132],"evaluation,":[133],"i.e.":[134],"ASVspoof":[135],"2015":[136],"Challenge.":[137],"Index":[138],"Terms:":[139],"Automatic":[140],"verification,":[142],"Spoofing":[143,146],"attack,":[144],"Anti-Spoofing,":[145],"detection,":[147],"Deep":[148]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":12},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":18},{"year":2016,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
