{"id":"https://openalex.org/W4415432646","doi":"https://doi.org/10.21437/interspeech.2025-2618","title":"Evaluating Parameter Sharing for Spoofing-Aware Speaker Verification: A Case Study on the ASVspoof 5 Dataset","display_name":"Evaluating Parameter Sharing for Spoofing-Aware Speaker Verification: A Case Study on the ASVspoof 5 Dataset","publication_year":2025,"publication_date":"2025-08-17","ids":{"openalex":"https://openalex.org/W4415432646","doi":"https://doi.org/10.21437/interspeech.2025-2618"},"language":"en","primary_location":{"id":"doi:10.21437/interspeech.2025-2618","is_oa":false,"landing_page_url":"https://doi.org/10.21437/interspeech.2025-2618","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Interspeech 2025","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071634784","display_name":"Aykut B\u00fcker","orcid":"https://orcid.org/0000-0002-6404-1499"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Aykut B\u00fcker","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100257872","display_name":"O\u011fuzhan Kurnaz","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"O\u011fuzhan Kurnaz","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077081838","display_name":"\u015eule Bekiryaz\u0131c\u0131","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"\u015eule Bekiryaz\u0131c\u0131","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107643214","display_name":"Selim Can Demirta\u015f","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Selim Can Demirta\u015f","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5076100840","display_name":"Cemal Hanil\u00e7i","orcid":"https://orcid.org/0000-0002-9174-0367"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Cemal Hanil\u00e7i","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5071634784"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16630305,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"4573","last_page":"4577"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10860","display_name":"Speech and Audio Processing","score":0.9807000160217285,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/speaker-verification","display_name":"Speaker verification","score":0.7125999927520752},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.649399995803833},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.5139999985694885},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.505299985408783},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.4456999897956848},{"id":"https://openalex.org/keywords/baseline","display_name":"Baseline (sea)","score":0.4244000017642975},{"id":"https://openalex.org/keywords/task-analysis","display_name":"Task analysis","score":0.41530001163482666},{"id":"https://openalex.org/keywords/speaker-recognition","display_name":"Speaker recognition","score":0.37610000371932983}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8029999732971191},{"id":"https://openalex.org/C2982762665","wikidata":"https://www.wikidata.org/wiki/Q1145189","display_name":"Speaker verification","level":3,"score":0.7125999927520752},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.6722000241279602},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.649399995803833},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.5139999985694885},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.505299985408783},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.4456999897956848},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.4244000017642975},{"id":"https://openalex.org/C175154964","wikidata":"https://www.wikidata.org/wiki/Q380077","display_name":"Task analysis","level":3,"score":0.41530001163482666},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3912999927997589},{"id":"https://openalex.org/C133892786","wikidata":"https://www.wikidata.org/wiki/Q1145189","display_name":"Speaker recognition","level":2,"score":0.37610000371932983},{"id":"https://openalex.org/C161765866","wikidata":"https://www.wikidata.org/wiki/Q184748","display_name":"Codec","level":2,"score":0.36730000376701355},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.34880000352859497},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.29649999737739563},{"id":"https://openalex.org/C61328038","wikidata":"https://www.wikidata.org/wiki/Q3358061","display_name":"Speech processing","level":2,"score":0.2775000035762787},{"id":"https://openalex.org/C134652429","wikidata":"https://www.wikidata.org/wiki/Q1052698","display_name":"Jitter","level":2,"score":0.26989999413490295},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.2547000050544739},{"id":"https://openalex.org/C204201278","wikidata":"https://www.wikidata.org/wiki/Q1332614","display_name":"Voice activity detection","level":3,"score":0.251800000667572},{"id":"https://openalex.org/C18555067","wikidata":"https://www.wikidata.org/wiki/Q8375051","display_name":"Joint (building)","level":2,"score":0.25130000710487366}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.21437/interspeech.2025-2618","is_oa":false,"landing_page_url":"https://doi.org/10.21437/interspeech.2025-2618","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Interspeech 2025","raw_type":"proceedings-article"},{"id":"pmh:7fb5beeb-2642-4e92-b1ec-b34acf5d50ee","is_oa":false,"landing_page_url":"https://avesis.uludag.edu.tr/publication/details/7fb5beeb-2642-4e92-b1ec-b34acf5d50ee/oai","pdf_url":null,"source":{"id":"https://openalex.org/S7407055210","display_name":"Bursa Uludag University - AVESIS","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Spoofing-aware":[0],"speaker":[1,27],"verification":[2,28],"(SASV)":[3],"is":[4],"an":[5],"important":[6],"but":[7],"challenging":[8],"task":[9],"and":[10,30,77,124],"has":[11],"been":[12],"a":[13,86,107],"primary":[14],"focus":[15],"of":[16,40,49,89],"the":[17,38,47,62,82,92],"recently":[18],"organized":[19],"ASVspoof":[20,63],"5":[21,64],"challenge.":[22],"As":[23],"SASV":[24,59,132],"integrates":[25],"automatic":[26],"(ASV)":[29],"countermeasure":[31],"(CM)":[32],"systems,":[33],"its":[34],"performance":[35,60,72,109],"depends":[36],"on":[37,58,91],"effectiveness":[39],"each":[41],"system.":[42],"This":[43],"study":[44],"systematically":[45],"examines":[46],"impact":[48],"different":[50],"parameter-sharing":[51],"(PS)":[52],"strategies,":[53],"which":[54,95],"facilitate":[55],"joint":[56],"optimization,":[57],"using":[61],"dataset.":[65],"Experimental":[66],"results":[67],"indicate":[68],"that":[69,114],"PS":[70,105,115],"enhances":[71],"for":[73,102],"specific":[74],"attack":[75],"types":[76],"codec":[78],"conditions.":[79],"For":[80],"example,":[81],"baseline":[83],"system":[84],"achieves":[85],"min":[87],"a-DCF":[88],"0.329":[90],"A26":[93],"attack,":[94],"improves":[96],"to":[97,127],"0.233":[98],"with":[99],"PS.":[100],"Similarly,":[101],"AMR-compressed":[103],"signals,":[104],"yields":[106],"14.09%":[108],"gain.":[110],"These":[111],"observations":[112],"show":[113],"techniques":[116],"are":[117],"effective":[118],"in":[119,131],"mitigating":[120],"certain":[121],"spoofing":[122],"attacks":[123],"improving":[125],"robustness":[126],"degraded":[128],"audio":[129],"conditions":[130],"systems.":[133]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-24T00:00:00"}
