{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{-“日期部分”:[[2024,8,9]],“日期时间”:“2024-08-09T23:11:52Z”,“时间戳”:1723245112576},“引用计数”:46,“发布者”:“IEEE”,“内容域”:{“域”:[],“交叉标记限制”:false},”短容器时间“:[]”,“published-print”:{“日期部分”:[[2017,5]]},“DOI”:“10.1109\/ijcnn.2017.7966294”,“type”:“procesdings-article”,“created”:{“date-parts”:[[2017,7,10]],“date-time”:“2017-07-10T21:41:30Z”,“timestamp”:1499722890000},“source”:”Crossref“,”is-referenced-by-count“:11,”title“:[”关于使用深度递归神经网络检测音频欺骗攻击“],”前缀“:”10.1109“,“author”:[{“given”:“”,“family”:“Scardapane”,“sequence”:“first”,“affiliation”:[]},{“given”:“Lucas”,“failment”:“Stoffl”,“serquence”:“additional”,“filiation“:[]{”given“:”Florian“,”family“:”Rohrbein“,”sequence“:”additional“263”,“reference”:[{“key”:“ref39”,“first page”:“2951”,“article-title”:“机器学习算法的实用贝叶斯优化”,“author”:“snoek”,“year”:“2012”,“journal-title“:“Advances in neural information processing systems”},{“key”:”ref38“,“first-page”:“281”,“article-title”:“Random search for hyper-parameter optimization”,“volume”:,“journal-title”:“journal of Machine Learning Research”},{“key”:“ref33”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/TMM.2010/2098858”}年份”:“2012”,“journal-title”:“IEEE Transactions on Pattern Analysis and Machine Intelligence”},{“key”:“ref31”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/ICASSP.2015.7178810”}:“保护自动说话人识别系统免受人工信号攻击的欺骗对策”,“作者”:“alegre”,“年份”:“2012”,“新闻标题”:“Interspeech 2012”},{“key”:“ref37”,“author”:“zaremba”,“year”:“2014”,“journal-title”:“递归神经网络正则化”},“article-title”:“辍学:防止神经网络过度拟合的简单方法”,“volume”:“15”,“author”:“srivastava”,“year”:“2014”,“journal-title:“journal of Machine Learning Research”},{“key”:”ref35“,”author“:”kingma“,”year“:”2014“,“journal-title”:“LSTM A Search Space Odyssey”},{“key”:“ref10”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/ICASP.2014.6853887”}“首页”:“2180”,“article-title”:“使用因子化i-vectors自适应深层神经网络声学模型”,“author”:“karanasou”,“year”:“2014”,“journal-title“:”Proc INTERSPEECH 2014“},{“key”:“ref12”,“doi-asserted-by”:“publisher”,”doi“:”10.1109\/LSP.2015.2420092:“Asvspoof 2015:第一个自动说话人验证欺骗和对策挑战”,“author”:“wu”,“year”:“2015”,“journal-title”:“Proceedings of Interspeech 2015”},{“key”:“ref14”,“first page”:《1310》,“article-title》:“On the diffility of training returnal neural networks”,“volume”:第28页,“author”:“pascanu”,《year》:“2013”,“journal-ttitle”:“2013年机器学习内部会议(ICML)进程”},{“key”:“ref15”,“doi-asserted-by”:“publisher”,“doi”:“10.1162\/neco.1997.9.8.1735”}.2400218“},{“key”:“ref18”,“author”:“pascanu”,“年份”:“2013年”,“新闻标题”:“如何构建深层递归神经网络”},{“key”:“ref19”,“doi-asserted-by”:“publisher”,“doi”:“10.1109”,《美国科学图书馆》2013.6707742“},“key“:”ref28“,”doi-assert-by“:”publisher“,”doi“:”10.1109:“自动说话人验证的欺骗和对策”,“作者”:“evans”,“年份”:“2013”,“期刊标题”:“Interspeech 2013”},{“key”:“ref27”,“首页”:“653”,“文章标题”:“基于说话人空间张量表示的一对多语音转换”,“作者”:“saito”,“年份”:“2011”,“期刊标题”:“Interspeech 2011”},{“key”:“ref3”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/TASL.2013.2272524”},{“key”:“ref6”,“doi-asserted-by”:”publisher“,”doi“:”10.1006\/dspr.1999.0361“},}“key:”ref29“,”first page“:”2053“,”article-title“:”人工冒名顶替者语音转换对错误接受率的影响”,“author”:“bonatre”,“year”:“2007”,“journal-title”:“Interspeech 2007”“},{”键“:“ref5”,“doi断言者”:“publisher”,“doi”:“10.1016\/j.specom.2014.0.10.005”},{“key”:“ref8”,“doi断言者”:“publisher”,“doi”:“10.1109\/TASL.2010.2064307”},{“key”:“ref7”,“doi断言者”:“publisher”,“doi”:“10.1109\/LSP.2006.870086”},{“key”:“ref2”,“doi断言者”:“publisher”,“doi”:“10.1007 \/978-1-4471-6524-8_7“},{”key“:”ref9“,”doi断言“:“publisher”,“DOI”:“10.1109\/MSP.2012.2205597”},{“key”:“ref1”,“DOI-asserted-by”:“publicher”,“DI:”10.1109\/JPROC.2006.886017“},}“key:”ref46“,”author“:”oord“,”year“:”2016“,”journal-title“:”WaveNet A Generative Model for Raw Audio“}109\/ICASSP.2013.6638947“},{“键”:“参考45”,“首页”:“2072”,“article-title”:“针对2015年自动说话人验证欺骗的crim系统开发及应对挑战”,“author”:“alam”,“year”:“2015”,“journal-title:“Proceedings of Interspeech 2015”},{“key”:“ref22”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/TASLP.2015.2468583”}:“10.1109\/ICASSP.2015.7178826”},{“key”:“ref42”,“doi-asserted-by”:“publisher”,“doi”:“10.109\/ICASSP.2016.7472724”}、{“密钥”:“ref24”,“doi-assertd-by”:“publisher”,“DI:”10.1109\/ICASSP.1992.225953:“结合mel倒谱、耳蜗滤波器倒谱和瞬时频率特征的证据来检测自然与假冒语音”,“author”:“patel”,“year”:“2015”,“journal-title”:“Proceedings of Interspeech 2015”},{“key”:“ref23”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/ICASSP.2007.3669696962”},“article-title”:“使用高维幅度和相位特征的欺骗语音检测:用于asvspoof 2015挑战的ntu方法”,“author”:“xiao”,“year”:“2015”,“journal-title“:“Proceedings of Interspeech 2015”},{“key”:“ref26”,“doi-asserted-by”:“publisher”,”doi“:”10.1109\/TASL.2007.907344,“article-title”:“用于欺骗检测的强大深度功能-用于asvspoof 2015挑战的sjtu系统”,“author”:“chen”,“year”:“2015”,“journal-title:“Proceedings of Interspeech 2015”},{“key”:“ref25”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/TASL.2008.2006647”}],“event”:{“name”:“2017年国际神经网络联合会议(IJCNN)”,“location”:“Anchorage,AK,USA”,“start”:{“date-parts”:[[2017,5,14]]},“end”:{-“date-parts”:[[2017,5,19]]}},”container-title“:[”2017年神经网络国际联合会议(IJCNN)“],“original-title”:[],“link”:[{“URL”:“http://\xplorestaging.ieee.org\/ielx7\/795841\/7966294.pdf?arnumber=7966294“,”内容类型“:”未指定“,“content-version”:“vor”,“intended-application”:“similarity-checking”}],“deposed”:{“date-parts”:[[2024,6,25]],“date-time”:“2024-06-25T10:26:22Z”,“timestamp”:1719311182000},“score”:1,“resource”:{primary“URL”:“http://ieeexplore.iee.org\/document\/7966294\/”}},”subtitle“:[],“shorttitle”:[],“已发布”:{“日期部分”:[[2017,5]]},“references-count”:46,“URL”:“http://\/dx.doi.org\/10.109\/ijcnn.2017.7966294”,“relation”:{},“subject”:[],“published”:{“date-parts”:[[2017,5]]}}}