{"id":"https://openalex.org/W3006210468","doi":"https://doi.org/10.21437/interspeech.2020-86","title":"Multi-Task Siamese Neural Network for Improving Replay Attack Detection","display_name":"Multi-Task Siamese Neural Network for Improving Replay Attack Detection","publication_year":2020,"publication_date":"2020-10-25","ids":{"openalex":"https://openalex.org/W3006210468","doi":"https://doi.org/10.21437/interspeech.2020-86","mag":"3006210468"},"language":"en","primary_location":{"id":"doi:10.21437/interspeech.2020-86","is_oa":false,"landing_page_url":"https://doi.org/10.21437/interspeech.2020-86","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Interspeech 2020","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025097230","display_name":"Patrick von Platen","orcid":null},"institutions":[{"id":"https://openalex.org/I887968799","display_name":"RWTH Aachen University","ror":"https://ror.org/04xfq0f34","country_code":"DE","type":"education","lineage":["https://openalex.org/I887968799"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Patrick von Platen","raw_affiliation_strings":["RWTH Aachen University"],"affiliations":[{"raw_affiliation_string":"RWTH Aachen University","institution_ids":["https://openalex.org/I887968799"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072705483","display_name":"Fei Tao","orcid":"https://orcid.org/0000-0002-9020-0633"},"institutions":[{"id":"https://openalex.org/I887968799","display_name":"RWTH Aachen University","ror":"https://ror.org/04xfq0f34","country_code":"DE","type":"education","lineage":["https://openalex.org/I887968799"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Fei Tao","raw_affiliation_strings":["RWTH Aachen University"],"affiliations":[{"raw_affiliation_string":"RWTH Aachen University","institution_ids":["https://openalex.org/I887968799"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087941479","display_name":"G\u00f6khan T\u00fcr","orcid":null},"institutions":[{"id":"https://openalex.org/I887968799","display_name":"RWTH Aachen University","ror":"https://ror.org/04xfq0f34","country_code":"DE","type":"education","lineage":["https://openalex.org/I887968799"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Gokhan Tur","raw_affiliation_strings":["RWTH Aachen University"],"affiliations":[{"raw_affiliation_string":"RWTH Aachen University","institution_ids":["https://openalex.org/I887968799"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5025097230"],"corresponding_institution_ids":["https://openalex.org/I887968799"],"apc_list":null,"apc_paid":null,"fwci":0.6167,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.69539092,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1076","last_page":"1080"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7995136976242065},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.720117449760437},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5548475980758667},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.47991570830345154},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3923404812812805},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2747635841369629},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.061628639698028564}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7995136976242065},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.720117449760437},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5548475980758667},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.47991570830345154},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3923404812812805},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2747635841369629},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.061628639698028564},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.21437/interspeech.2020-86","is_oa":false,"landing_page_url":"https://doi.org/10.21437/interspeech.2020-86","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Interspeech 2020","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities","score":0.6899999976158142}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W78159342","https://openalex.org/W2021354639","https://openalex.org/W2034365297","https://openalex.org/W2127589108","https://openalex.org/W2145212718","https://openalex.org/W2170088868","https://openalex.org/W2171590421","https://openalex.org/W2176804518","https://openalex.org/W2194775991","https://openalex.org/W2242427765","https://openalex.org/W2295634712","https://openalex.org/W2302255633","https://openalex.org/W2520774990","https://openalex.org/W2745896134","https://openalex.org/W2749090340","https://openalex.org/W2884561390","https://openalex.org/W2889361425","https://openalex.org/W2913340405","https://openalex.org/W2922258480","https://openalex.org/W2931856967","https://openalex.org/W2935837859","https://openalex.org/W2936697195","https://openalex.org/W2936802426","https://openalex.org/W2940760475","https://openalex.org/W2963351448","https://openalex.org/W2965025649","https://openalex.org/W2970759645","https://openalex.org/W2972465261","https://openalex.org/W2972563643","https://openalex.org/W2972811785","https://openalex.org/W2972884023","https://openalex.org/W2973164265","https://openalex.org/W2973181078","https://openalex.org/W3091905774"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W4402327032","https://openalex.org/W2473956133"],"abstract_inverted_index":{"Automatic":[0],"speaker":[1],"verification":[2],"systems":[3,23,57],"are":[4],"vulnerable":[5],"to":[6,104],"audio":[7],"replay":[8],"attacks":[9],"which":[10],"bypass":[11],"security":[12],"by":[13,94,109,124],"replaying":[14],"recordings":[15],"of":[16,55,67,84,148],"authorized":[17],"speakers.Replay":[18],"attack":[19],"detection":[20,22,86],"(RA)":[21],"built":[24],"upon":[25],"Residual":[26],"Neural":[27,113],"Networks":[28,114],"(ResNet)s":[29],"have":[30,78],"yielded":[31],"astonishing":[32],"results":[33],"on":[34,79],"the":[35,53,65,80,95,105,122,133],"public":[36],"benchmark":[37],"ASVspoof":[38],"2019":[39],"Physical":[40],"Access":[41],"challenge.With":[42],"most":[43],"teams":[44],"using":[45,111],"fine-tuned":[46],"feature":[47,69],"extraction":[48],"pipelines":[49],"and":[50,82,101,136],"model":[51],"architectures,":[52],"generalizability":[54,81],"such":[56],"remains":[58],"questionable":[59],"though.In":[60],"this":[61],"work,":[62],"we":[63],"analyse":[64],"effect":[66],"discriminative":[68],"learning":[70,74],"in":[71],"a":[72,89],"multi-task":[73],"(MTL)":[75],"setting":[76],"can":[77,116],"discriminability":[83],"RA":[85],"systems.We":[87],"use":[88],"popular":[90],"ResNet":[91],"architecture":[92,107,135],"optimized":[93,108],"cross-entropy":[96],"criterion":[97],"as":[98],"our":[99],"baseline":[100,123],"compare":[102],"it":[103],"same":[106],"MTL":[110],"Siamese":[112],"(SNN).It":[115],"be":[117],"shown":[118],"that":[119,138],"SNN":[120,139],"outperform":[121],"relative":[125,149],"26.8%":[126],"Equal":[127],"Error":[128],"Rate":[129],"(EER).We":[130],"further":[131],"enhance":[132],"model's":[134],"demonstrate":[137],"with":[140],"additional":[141],"reconstruction":[142],"loss":[143],"yield":[144],"another":[145],"significant":[146],"improvement":[147],"13.8":[150],"%":[151],"EER.":[152]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
