2021
DOI: 10.1007/s13369-021-06297-w
|View full text |Cite
|
Sign up to set email alerts
|

A Deep Learning Framework for Audio Deepfake Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(16 citation statements)
references
References 32 publications
0
16
0
Order By: Relevance
“…Some ML models require more complex pre-processing phase, so in these cases DL models are a better choice. Khochare et al ( 2022 ) used different Ml and DL methods on a new dataset called FOR (Reimao and Tzerpos, 2019 ). Machine learning models, such as Support Vector Machine, Random Forest, and K-Nearest Neighbors, could not achieve very high metrics, and the best of them stopped at 0.67 accuracy.…”
Section: Deepfake Categoriesmentioning
confidence: 99%
See 2 more Smart Citations
“…Some ML models require more complex pre-processing phase, so in these cases DL models are a better choice. Khochare et al ( 2022 ) used different Ml and DL methods on a new dataset called FOR (Reimao and Tzerpos, 2019 ). Machine learning models, such as Support Vector Machine, Random Forest, and K-Nearest Neighbors, could not achieve very high metrics, and the best of them stopped at 0.67 accuracy.…”
Section: Deepfake Categoriesmentioning
confidence: 99%
“…It is also improved to reduce EER metric as well as solve the generalization problem (Chen T. et al, 2020 ). Some also used temporal types of neural networks, namely Temporal Convolutional Networks (TCN) and achieved great results (Khochare et al, 2022 ). TCN has outperformed multi-layer perception in audio spoof detection (Tian et al, 2016 ).…”
Section: Deepfake Categoriesmentioning
confidence: 99%
See 1 more Smart Citation
“…Bartusiak et al used normalized gray-scale spectrograms of audio signal for synthetic speech detection using a CNN and a convolution transformer [114,156,157]. While in [158], the authors trained a temporal CNN and a spatial transform network using melspectrograms. For synthetic audio detection, these image-based methods outperformed feature-based methods including the ones using features related to energy, bandwidth, frequency, and short-term transform features such as MFCCs.…”
Section: Image-based Approachesmentioning
confidence: 99%
“…Malicious/Selfish nodes introduce variously attacks such as Packet-Flooding [8], [9], [18], [19], Packet-Drooping (there are various categories of Packet-Dropping attacks. Such as, some misbehavior nodes drop all packets, or few misbehavior nodes drop selective packets, not all ) [9], [20], and Fake-Packet attacks (FPA) [21]- [25] to overuse limited resources of networks. Moreover, this would lead to nodes unavailability, high PacketLossRatio (PLR), low PacketDeliveryRatio (PDR), and fake-packets in the network, which further degrade network performance (Due to resources consumption).…”
Section: Introductionmentioning
confidence: 99%