
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Automatic speaker verification systems and spoof detection techniques: review and analysis
Aakshi Mittal, Mohit Dua
International Journal of Speech Technology (2021) Vol. 25, Iss. 1, pp. 105-134
Closed Access | Times Cited: 36
Aakshi Mittal, Mohit Dua
International Journal of Speech Technology (2021) Vol. 25, Iss. 1, pp. 105-134
Closed Access | Times Cited: 36
Showing 1-25 of 36 citing articles:
Data augmentation and hybrid feature amalgamation to detect audio deep fake attacks
Nidhi Chakravarty, Mohit Dua
Physica Scripta (2023) Vol. 98, Iss. 9, pp. 096001-096001
Closed Access | Times Cited: 22
Nidhi Chakravarty, Mohit Dua
Physica Scripta (2023) Vol. 98, Iss. 9, pp. 096001-096001
Closed Access | Times Cited: 22
An improved feature extraction for Hindi language audio impersonation attack detection
Nidhi Chakravarty, Mohit Dua
Multimedia Tools and Applications (2024) Vol. 83, Iss. 25, pp. 66565-66590
Closed Access | Times Cited: 6
Nidhi Chakravarty, Mohit Dua
Multimedia Tools and Applications (2024) Vol. 83, Iss. 25, pp. 66565-66590
Closed Access | Times Cited: 6
Employing Discrete Fractional Wavelet Transform for Text-Dependent Speaker Verification
Sina Ketabi, saeid rashidi, Ali Fallah
(2025)
Closed Access
Sina Ketabi, saeid rashidi, Ali Fallah
(2025)
Closed Access
A hybrid noise robust model for multireplay attack detection in Automatic speaker verification systems
Mohit Dua, Ambika Sadhu, Anisha Jindal, et al.
Biomedical Signal Processing and Control (2022) Vol. 74, pp. 103517-103517
Closed Access | Times Cited: 22
Mohit Dua, Ambika Sadhu, Anisha Jindal, et al.
Biomedical Signal Processing and Control (2022) Vol. 74, pp. 103517-103517
Closed Access | Times Cited: 22
Research on percussion-based bolt looseness monitoring under noise interference and insufficient samples
Pengtao Liu, Xiaopeng Wang, Yongquan Wang, et al.
Mechanical Systems and Signal Processing (2023) Vol. 208, pp. 111013-111013
Closed Access | Times Cited: 11
Pengtao Liu, Xiaopeng Wang, Yongquan Wang, et al.
Mechanical Systems and Signal Processing (2023) Vol. 208, pp. 111013-111013
Closed Access | Times Cited: 11
Research on a percussion-based bolt looseness identification method based on phase feature and convolutional neural network
Pengtao Liu, Xiaopeng Wang, Tianning Chen, et al.
Smart Materials and Structures (2023) Vol. 32, Iss. 3, pp. 035010-035010
Closed Access | Times Cited: 8
Pengtao Liu, Xiaopeng Wang, Tianning Chen, et al.
Smart Materials and Structures (2023) Vol. 32, Iss. 3, pp. 035010-035010
Closed Access | Times Cited: 8
Multi-order Replay Attack Detection Using Enhanced Feature Extraction and Deep Learning Classification
Sanil Joshi, Mohit Dua
Lecture notes in networks and systems (2023), pp. 739-745
Closed Access | Times Cited: 8
Sanil Joshi, Mohit Dua
Lecture notes in networks and systems (2023), pp. 739-745
Closed Access | Times Cited: 8
EDL-Det: A Robust TTS Synthesis Detector Using VGG19-Based YAMNet and Ensemble Learning Block
Rabbia Mahum, Aun Irtaza, Ali Javed
IEEE Access (2023) Vol. 11, pp. 134701-134716
Open Access | Times Cited: 8
Rabbia Mahum, Aun Irtaza, Ali Javed
IEEE Access (2023) Vol. 11, pp. 134701-134716
Open Access | Times Cited: 8
An Initial Investigation of Neural Replay Simulator for Over-The-Air Adversarial Perturbations to Automatic Speaker Verification
Jiaqi Li, Li Wang, Liumeng Xue, et al.
ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2024), pp. 4635-4639
Open Access | Times Cited: 2
Jiaqi Li, Li Wang, Liumeng Xue, et al.
ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2024), pp. 4635-4639
Open Access | Times Cited: 2
LSTM-GTCC based Approach for Audio Spoof Detection
Sanil Joshi, Mohit Dua
2022 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COM-IT-CON) (2022)
Closed Access | Times Cited: 12
Sanil Joshi, Mohit Dua
2022 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COM-IT-CON) (2022)
Closed Access | Times Cited: 12
Text-dependent speaker verification using discrete wavelet transform based on linear prediction coding
Sina Ketabi, Saeid Rashidi, Ali Fallah
Biomedical Signal Processing and Control (2023) Vol. 86, pp. 105218-105218
Open Access | Times Cited: 4
Sina Ketabi, Saeid Rashidi, Ali Fallah
Biomedical Signal Processing and Control (2023) Vol. 86, pp. 105218-105218
Open Access | Times Cited: 4
Maximum Gaussianality training for deep speaker vector normalization
Yunqi Cai, Lantian Li, Andrew Abel, et al.
Pattern Recognition (2023) Vol. 145, pp. 109977-109977
Open Access | Times Cited: 4
Yunqi Cai, Lantian Li, Andrew Abel, et al.
Pattern Recognition (2023) Vol. 145, pp. 109977-109977
Open Access | Times Cited: 4
Audio Stream Analysis for Deep Fake Threat Identification
Karol Jędrasiak
Civitas et Lex (2024) Vol. 41, Iss. 1, pp. 21-35
Open Access | Times Cited: 1
Karol Jędrasiak
Civitas et Lex (2024) Vol. 41, Iss. 1, pp. 21-35
Open Access | Times Cited: 1
Noise Robust Audio Spoof Detection Using Hybrid Feature Extraction and LCNN
Sanil Joshi, Mohit Dua
SN Computer Science (2024) Vol. 5, Iss. 4
Closed Access | Times Cited: 1
Sanil Joshi, Mohit Dua
SN Computer Science (2024) Vol. 5, Iss. 4
Closed Access | Times Cited: 1
A blended framework for audio spoof detection with sequential models and bags of auditory bites
Misaj Sharafudeen, S. S. Vinod Chandra, J. Andrew, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1
Misaj Sharafudeen, S. S. Vinod Chandra, J. Andrew, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1
Noise robust automatic speaker verification systems: review and analysis
Sanil Joshi, Mohit Dua
Telecommunication Systems (2024)
Closed Access | Times Cited: 1
Sanil Joshi, Mohit Dua
Telecommunication Systems (2024)
Closed Access | Times Cited: 1
TMS: Temporal multi-scale in time-delay neural network for speaker verification
Ruiteng Zhang, Jianguo Wei, Xugang Lu, et al.
Applied Intelligence (2023) Vol. 53, Iss. 22, pp. 26497-26517
Closed Access | Times Cited: 3
Ruiteng Zhang, Jianguo Wei, Xugang Lu, et al.
Applied Intelligence (2023) Vol. 53, Iss. 22, pp. 26497-26517
Closed Access | Times Cited: 3
A Hybrid Classification Approach For Artificial Speech Detection
Choon Beng Tan, Mohd Hanafi Ahmad Hijazi, Puteri N. E. Nohuddin
2022 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET) (2023), pp. 236-240
Closed Access | Times Cited: 3
Choon Beng Tan, Mohd Hanafi Ahmad Hijazi, Puteri N. E. Nohuddin
2022 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET) (2023), pp. 236-240
Closed Access | Times Cited: 3
SDI: A tool for speech differentiation in user identification
Muhammad Abdul Basit, Chanjuan Liu, Enyu Zhao
Expert Systems with Applications (2023) Vol. 243, pp. 122866-122866
Closed Access | Times Cited: 2
Muhammad Abdul Basit, Chanjuan Liu, Enyu Zhao
Expert Systems with Applications (2023) Vol. 243, pp. 122866-122866
Closed Access | Times Cited: 2
Multi Tasking Synthetic Speech Detection on Indian Languages
A R Ambili, Rajesh Cherian Roy
(2022), pp. 1-6
Closed Access | Times Cited: 3
A R Ambili, Rajesh Cherian Roy
(2022), pp. 1-6
Closed Access | Times Cited: 3
Backend Ensemble for Speaker Verification and Spoofing Countermeasure
Li Zhang, Yue Li, Huan Zhao, et al.
Interspeech 2022 (2022), pp. 4381-4385
Open Access | Times Cited: 3
Li Zhang, Yue Li, Huan Zhao, et al.
Interspeech 2022 (2022), pp. 4381-4385
Open Access | Times Cited: 3
Empirical Comparison between Deep and Classical Classifiers for Speaker Verification in Emotional Talking Environments
Ali Bou Nassif, Ismail Shahin, Mohammed Lataifeh, et al.
Information (2022) Vol. 13, Iss. 10, pp. 456-456
Open Access | Times Cited: 3
Ali Bou Nassif, Ismail Shahin, Mohammed Lataifeh, et al.
Information (2022) Vol. 13, Iss. 10, pp. 456-456
Open Access | Times Cited: 3
Enhancing cross-domain transferability of black-box adversarial attacks on speaker recognition systems using linearized backpropagation
Umang Patel, Shruti Bhilare, Avik Hati
Pattern Analysis and Applications (2024) Vol. 27, Iss. 2
Closed Access
Umang Patel, Shruti Bhilare, Avik Hati
Pattern Analysis and Applications (2024) Vol. 27, Iss. 2
Closed Access
A voice spoofing Detection Model based on Dilated Residual Attentional Feature-fusion Net with Enhanced Feature Extraction
Wenxuan Xu, Xiao Zou, Dong Hu, et al.
(2024), pp. 135-139
Closed Access
Wenxuan Xu, Xiao Zou, Dong Hu, et al.
(2024), pp. 135-139
Closed Access
A Quest for Formant-Based Compact Nonuniform Trapezoidal Filter Banks for Speech Processing with VGG16
Cevahir Parlak, Yusuf Altun
Circuits Systems and Signal Processing (2024) Vol. 43, Iss. 11, pp. 7309-7338
Closed Access
Cevahir Parlak, Yusuf Altun
Circuits Systems and Signal Processing (2024) Vol. 43, Iss. 11, pp. 7309-7338
Closed Access