<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="reviewer-report"        dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>yyu jinas</journal-id>
            <journal-title-group>
                                                                                    <journal-title>Yüzüncü Yıl Üniversitesi Fen Bilimleri Enstitüsü Dergisi</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">1300-5413</issn>
                                        <issn pub-type="epub">2667-467X</issn>
                                                                                            <publisher>
                    <publisher-name>Van Yuzuncu Yıl University</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.53433/yyufbed.1358880</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Information Security Management</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Bilgi Güvenliği Yönetimi</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <trans-title-group xml:lang="en">
                                    <trans-title>A Review of Deepfake Audio Manipulation Detection Systems</trans-title>
                                </trans-title-group>
                                                                                                                                                                                                <article-title>Derin Sahte Ses Manipülasyonu Tespit Sistemleri Üzerine Bir Derleme</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-8828-5674</contrib-id>
                                                                <name>
                                    <surname>Tahaoglu</surname>
                                    <given-names>Gul</given-names>
                                </name>
                                                                    <aff>KARADENIZ TECHNICAL UNIVERSITY</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-2402-8265</contrib-id>
                                                                <name>
                                    <surname>Kılıç</surname>
                                    <given-names>Muhammed</given-names>
                                </name>
                                                                    <aff>KARADENİZ TEKNİK ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0001-7451-0634</contrib-id>
                                                                <name>
                                    <surname>Üstübioğlu</surname>
                                    <given-names>Beste</given-names>
                                </name>
                                                                    <aff>KARADENİZ TEKNİK ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0001-5729-6613</contrib-id>
                                                                <name>
                                    <surname>Ulutaş</surname>
                                    <given-names>Güzin</given-names>
                                </name>
                                                                    <aff>KARADENİZ TEKNİK ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20240430">
                    <day>04</day>
                    <month>30</month>
                    <year>2024</year>
                </pub-date>
                                        <volume>29</volume>
                                        <issue>1</issue>
                                        <fpage>353</fpage>
                                        <lpage>402</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20230912">
                        <day>09</day>
                        <month>12</month>
                        <year>2023</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20240215">
                        <day>02</day>
                        <month>15</month>
                        <year>2024</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 1995, Yuzuncu Yil University Journal of the Institute of Natural and Applied Sciences</copyright-statement>
                    <copyright-year>1995</copyright-year>
                    <copyright-holder>Yuzuncu Yil University Journal of the Institute of Natural and Applied Sciences</copyright-holder>
                </permissions>
            
                                                                                                <trans-abstract xml:lang="en">
                            <p>Besides facilitating access to audio content on the Internet, developments in deep learning methods have made it possible to produce deep fake audio. Automatic Speaker Verification systems considered a security step to authenticate the speaker, are vulnerable to deep spoofing attacks. It is crucial for today&#039;s age that expert systems can detect such frauds. Deep fake audio spoofing is carried out to produce audio files in the content by cloning the speaker&#039;s voice that is planned to be changed as if he said something he did not say. Various methods are proposed in the literature to detect this type of forgery. There are free-access datasets used in performance evaluation in studies in the literature, and it is possible to use them in result comparison. The planned research aims to reduce or eliminate the noise that may exist in the audio file of the system by passing the preprocessing stage of the audio signal received as input. This paper examines the methods and datasets in the literature, and the advantages and disadvantages of the methods on these datasets are emphasized.</p></trans-abstract>
                                                                                                                                    <abstract><p>Gerçek kişilerin konuşmalarını içeren dijital ses dosyalarının kullanılması ile gerçekleştirilen derin sahte ses manipülasyonu, sesi taklit edilecek kişinin sesini klonlayarak kişinin söylemediği bir şeyi söylemiş gibi içerikte ses dosyalarını oluşturan bir sahtecilik türüdür. Konuşmacının kimliğini doğrulamak için güvenlik adımı olarak kabul edilen Otomatik Konuşmacı Doğrulama Sistemlerinin derin sahte ses sahtecilikleri saldırılarına karşı savunmasızlığı söz konusudur. Ayrıca mahkemelerde karar merciini etkileyecek delil olarak sunulan ses dosyalarının orijinal olup olmadığı kontrolü önemli bir ihtiyaç haline gelmiştir. Bu tür sahteciliklerin uzman sistemler tarafından tespit edilebilmesi günümüz çağı için oldukça önem arz etmektedir. Bu sahtecilik türündeki saldırıların tespit edilebilmesi için literatürde çeşitli yöntemler önerilmiştir. Literatürdeki çalışmalarda performans değerlendirmesinde kullanılan ücretsiz erişimli veri setleri de mevcut olup sonuç kıyaslamasında kullanabilmesi mümkündür. Bu çalışmada literatürdeki yöntemler ve verisetleri incelenmiş, yöntemlerin bu verisetleri üzerindeki performans değerlendirmeleri, avantaj ve dezavantajları vurgulanmıştır.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Derin sahte ses manipülasyonu</kwd>
                                                    <kwd>  Derin sahte ses tespiti</kwd>
                                                    <kwd>  Ses doğrulama</kwd>
                                            </kwd-group>
                            
                                                <kwd-group xml:lang="en">
                                                    <kwd>Audio authentication</kwd>
                                                    <kwd>  Deep fake audio manipulation</kwd>
                                                    <kwd>  Deep fake audio detection</kwd>
                                            </kwd-group>
                                                                                                                                    <funding-group specific-use="FundRef">
                    <award-group>
                                                    <funding-source>
                                <named-content content-type="funder_name">Türkiye Bilimsel ve Teknolojik Araştırma Kurumu (TÜBİTAK)</named-content>
                            </funding-source>
                                                                            <award-id>122E013</award-id>
                                            </award-group>
                </funding-group>
                                </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">Abdzadeh, P., &amp; Veisi, H. (2023). A comparison of CQT spectrogram with STFT-based acoustic features in Deep Learning-based synthetic speech detection. Journal of AI and Data Mining, 11(1), 119-129. doi:10.22044/jadm.2022.12373.2382</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">Alluri, K. N. R. K., &amp; Vuppala, A. K. (2019, September). IIIT-H spoofing countermeasures for automatic speaker verification spoofing and countermeasures challeng. Interspeech 2019, Graz, Austria. doi:10.21437/Interspeech.2019-1623</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">Alzantot, M., Wang, Z., &amp; Srivastava, M. B. (2019, September). Deep residual neural networks for audio spoofing detection. Interspeech 2019, Graz, Austria. doi:10.21437/Interspeech.2019-3174</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">Balamurali, B. T., Lin, K. W. E., Lui, S., Chen, J. M., &amp; Herremans, D. (2019). Toward robust audio spoofing detection: a detailed comparison of traditional and learned features. IEEE Access, 7, 84229-84241. doi:10.1109/ACCESS.2019.2923806</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">Borrelli, C., Bestagini, P., Antonacci, F., Sarti, A., &amp; Tubaro, S. (2021). Synthetic speech detection through short-term and long-term prediction traces. EURASIP Journal on Information Security, 2021, 2. doi:10.1186/s13635-021-00116-3</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">Cai, W., Wu, H., Cai, D., &amp; Li, M. (2019, September). The DKU replay detection system for the ASVspoof 2019 challenge: on data augmentation, feature representation, classification, and fusion. Interspeech 2019, Graz, Austria. doi:10.21437/Interspeech.2019-1230</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">Chen, T., Kumar, A., Nagarsheth, P., Sivaraman, G., &amp; Khoury, E. (2020, November). Generalization of audio deepfake detection.  The Speaker and Language Recognition Workshop (Odyssey 2020), Tokyo, Japan. doi:10.21437/Odyssey.2020-19</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">Chen, Z., Xie, Z., Zhang, W., &amp; Xu, X. (2017, August). ResNet and model fusion for automatic spoofing detection. Interspeech 2017, Stockholm, Sweeden. doi:10.21437/Interspeech.2017-1085</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">Cheng, X., Xu, M., &amp; Zheng, T. F. (2019, March). Replay detection using CQT-based modified group delay feature and ResNeWt network in ASVspoof 2019. 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Lanzhou, China. doi:10.1109/APSIPAASC47483.2019.9023158</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">Chettri, B., Stoller, D., Morfi, V., Ramírez, M. A. M., Benetos, E., Sturm, B. L. (2019, September). Ensemble models for spoofing detection in automatic speaker verification. Interspeech 2019, Graz, Austria. doi:10.21437/Interspeech.2019-2505</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">Chintha, A., Thai, B., Sohrawardi, S. J., Bhatt, K., Hickerson, A., Wright, M., &amp; Ptucha, R. (2020). Recurrent convolutional structures for audio spoof and video deepfake detection. Journal of Selected Topics in Signal Processing, 14(5), 1024-1037. doi:10.1109/JSTSP.2020.2999185</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">Dua, M., Jain, C., &amp; Kumar, S. (2022). LSTM and CNN based ensemble approach for spoof detection task in automatic speaker verification systems. Journal of Ambient Intelligence and Humanized Computing, 13, 1985-2000. doi:10.1007/s12652-021-02960-0</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">Font, R., Espín, J. M., &amp; Cano, M. J. (2017, August). Experimental analysis of features for replay attack detection — results on the ASVspoof 2017 challenge. Interspeech 2017, Stockholm, Sweeden. doi:10.21437/Interspeech.2017-450</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">Gunendradasan, T., Wickramasinghe, B., Le, N. P., Ambikairajah, E., &amp; Epps, J. (2018, September). Detection of replay-spoofing attacks using frequency modulation features.  Interspeech 2018, Hyderabad, India. doi:10.21437/Interspeech.2018-1473</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">Hua, G., Teoh, A. B. J., &amp; Zhang, H. (2021). Towards end-to-end synthetic speech detection. IEEE Signal Processing Letters, 28, 1265-1269. doi:10.1109/LSP.2021.3089437</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">Jiang, Z., Zhu, H., Peng, L., Ding, W., &amp; Ren, Y. (2020, October). Self-supervised spoofing audio detection scheme. Interspeech 2020, Shangai, China. doi:10.21437/Interspeech.2020-1760</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">Kinnunen, T., Delgado, H., Evans, N., Lee, K.A., Vestman, V., Nautsch, A., …, &amp; Reynolds, D. A. (2020). t-DCF: a detection cost function for the tandem assessment of spoofing countermeasures and automatic speaker verification. IEEE/ACM Transactions on Audio, Speech, and Language Processing, 28, 2195-2210 2020.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">Korshunov, P., Marcel, S., Muckenhirn, H., Gonçalves, A. R., Souza Mello, A. G., Velloso, V. R. P., …, &amp; Sahidullah, M. (2016, September). Overview of BTAS 2016 speaker anti-spoofing competition. 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), Niagara Falls, NY, USA. doi:10.1109/BTAS.2016.7791200</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">Kwak, Y., Kwag, S., Lee, J., Jeon, Y., Hwang, J., Choi, H.J., …, &amp; Yoon, J. W. (2023). Voice spoofing detection through residual network, max feature map, and depthwise separable convolution. IEEE Access, 11, 49140-49152. doi:10.1109/ACCESS.2023.3275790</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">Lai, CI, Chen, N., Villalba, J., &amp; Dehak, N. (2019, September). ASSERT: Anti-spoofing with squeeze-excitation and residual networks. Interspeech 2019, Graz, Austria. doi:10.21437/Interspeech.2019-1794</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">Lavrentyeva, G., Novoselov, S., Malykh, E., Kozlov, A., Kudashev, O., &amp; Shchemelinin, V. (2017, August). Audio replay attack detection with deep learning frameworks. Interspeech 2017, Stockholm, Sweden. doi:10.21437/Interspeech.2017-360</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">Mewada, H., Al-Asad, J. F., Almalki, F. A., Khan, A. H., Almujally, N. A., El-Nakla, S., &amp; Naith, Q. (2023). Gaussian-filtered high-frequency-feature trained optimized BiLSTM network for spoofed-speech classification. Sensors, 23, 6637. doi:10.3390/s23146637</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">Nagarsheth, P., Khoury, E., Patil, K., &amp; Garland, M. (2017, August). Replay attack detection using DNN for channel discrimination. Interspeech 2017, Stockholm, Sweden. doi:10.21437/Interspeech.2017-1377</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">Nautsch, A., Wang, X., Evans, N., Kinnunen, T. H., Vestman, V., Todisco, M., …, &amp; Lee, K. A. (2021).  ASVspoof 2019: Spoofing countermeasures for the detection of synthesized, converted and replayed speech. IEEE Transactions on Biometrics, Behavior, and Identity Science, 3(2), 252-265. doi:10.1109/TBIOM.2021.3059479</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">Patel, T. B., &amp; Patil, H. A. (2015, September). Combining evidences from mel cepstral, cochlear filter cepstral and instantaneous frequency features for detection of natural vs. spoofed speech. Interspeech 2015, Dresden, Germany. doi:10.21437/Interspeech.2015-467</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">Paul, D., Sahidullah, M., &amp; Saha, G. (2017, March). Generalization of spoofing countermeasures: A case study with ASVspoof 2015 and BTAS 2016 corpora. 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, LA, USA. doi:10.1109/ICASSP.2017.7952516</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">Qian, Y., Chen, N., &amp; Yu, K. (2016). Deep features for automatic spoofing detection. Speech Communication, 85, 43-52. doi:10.1016/j.specom.2016.10.007</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">Rahul, T. P., Aravind, P. R., Ranjith, C., Usamath, N., &amp; Paramparambath, N. (2020). Audio spoofing verification using deep convolutional neural networks by transfer learning. ArXiv, abs/2008.03464,2020. doi:10.48550/arXiv.2008.03464</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">Reimao, R., &amp; Tzerpos, V. (2019, October). FoR: A dataset for synthetic speech detection. 2019 International Conference on Speech Technology and Human-Computer Dialogue (SpeD), Timisoara, Romania. doi:10.1109/SPED.2019.8906599</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">Suthokumar, G., Sethu, V., Wijenayake, C., &amp; Ambikairajah, E. (2018, September). Modulation dynamic features for the detection of replay attacks. Interspeech 2018, Hyderabad, India. doi:10.21437/Interspeech.2018-1846</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">Sriskandaraja, K., Sethu, V., Ambikairajah, E., &amp; Li, H. (2017). Front-end for antispoofing countermeasures in speaker verification: Scattering spectral decomposition. IEEE Journal of Selected Topics in Signal Processing, 11(4), 632-643. doi:10.1109/JSTSP.2016.2647202</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">Sriskandaraja, K., Sethu, V., &amp; Ambikairajah, E. (2018, September). Deep siamese architecture based replay detection for secure voice biometric. Interspeech 2018, Hyderabad, India. doi:10.21437/Interspeech.2018-1819</mixed-citation>
                    </ref>
                                    <ref id="ref33">
                        <label>33</label>
                        <mixed-citation publication-type="journal">Tak, H., Patino, J., Todisco, M., Nautsch, A., Evans, N., &amp; Larcher, A. (2021, June). End-to-End anti-spoofing with RawNet2. ICASSP 2021- 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Toronto, ON, Canada. doi:10.1109/ICASSP39728.2021.9414234</mixed-citation>
                    </ref>
                                    <ref id="ref34">
                        <label>34</label>
                        <mixed-citation publication-type="journal">Tan, C. B., Hijazi, M. H. A., &amp; Nohuddin, P. N. E. (2023, September). A hybrid classification approach for artificial speech detection. 2023 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET), Kota Kinabalu, Malaysia. doi:10.1109/IICAIET59451.2023.10291764</mixed-citation>
                    </ref>
                                    <ref id="ref35">
                        <label>35</label>
                        <mixed-citation publication-type="journal">Xiao, X., Tian, X., Du, S., Xu, H., Siong, C. E., &amp; Li, H. (2015, September). Spoofing speech detection using high dimensional magnitude and phase features: the NTU approach for ASVspoof 2015 challenge. Interspeech 2015, Dresden, Germany. doi:10.21437/Interspeech.2015-465</mixed-citation>
                    </ref>
                                    <ref id="ref36">
                        <label>36</label>
                        <mixed-citation publication-type="journal">Wu, Z., Kinnunen, T., Evans, N., Yamagishi, J., Hanilçi, C., Sahidullah, M., &amp; Sizov, A. (2015, September). ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge. Interspeech 2015, Dresden, Germany. doi:10.21437/Interspeech.2015-462</mixed-citation>
                    </ref>
                                    <ref id="ref37">
                        <label>37</label>
                        <mixed-citation publication-type="journal">Wu, Z., Yamagishi, J., Kinnunen, T., Hanilçi, C., Sahidullah, M., Sizov, ..., &amp; Delgado, H. (2017). ASVspoof: the automatic speaker verification spoofing and countermeasures challenge. IEEE Journal of Selected Topics in Signal Processing, 11(4), 588-604. doi:10.1109/JSTSP.2017.2671435</mixed-citation>
                    </ref>
                                    <ref id="ref38">
                        <label>38</label>
                        <mixed-citation publication-type="journal">Witkowski, M., Kacprzak, S., Żelasko, P., Kowalczyk, K., &amp; Gałka, J. (2017, August). Audio replay attack detection using high-frequency features. Interspeech 2017, Stockholm, Sweden. doi:10.21437/Interspeech.2017-776</mixed-citation>
                    </ref>
                                    <ref id="ref39">
                        <label>39</label>
                        <mixed-citation publication-type="journal">Wang, L., Yoshida, Y., Kawakami, Y., &amp; Nakagawa, S. (2015, September). Relative phase information for detecting human speech and spoofed speech. Interspeech 2015, Dresden, Germany. doi:10.21437/Interspeech.2015-473</mixed-citation>
                    </ref>
                                    <ref id="ref40">
                        <label>40</label>
                        <mixed-citation publication-type="journal">Yamagishi, J., Wang, X., Todisco, M., Sahidullah, M., Patino, J., Nautsch, A., …, &amp; Delgado H. (2021, September). ASVspoof 2021: accelerating progress in spoofed and deepfake speech detection. 2021 Edition of the Automatic Speaker Verification and Spoofing Countermeasures Challenge, France. doi:10.21437/ASVSPOOF.2021-8</mixed-citation>
                    </ref>
                                    <ref id="ref41">
                        <label>41</label>
                        <mixed-citation publication-type="journal">Yang, J., You, C., &amp; He, Q. (2018, September). Feature with complementarity of statistics and principal information for spoofing detection. Interspeech 2018, Hyderabad, India. doi:10.21437/Interspeech.2018-1693</mixed-citation>
                    </ref>
                                    <ref id="ref42">
                        <label>42</label>
                        <mixed-citation publication-type="journal">Yu, H., Tan, Z. H., Zhang, Y., Ma, Z., Guo, J. (2017). DNN filter bank cepstral coefficients for spoofing detection. IEEE Access, 5, 4779-4787. doi:10.1109/ACCESS.2017.2687041</mixed-citation>
                    </ref>
                                    <ref id="ref43">
                        <label>43</label>
                        <mixed-citation publication-type="journal">Zarish, A., Javed, A., &amp; Khalid, M. (2022). AEXANet: An end-to-end deep learning based voice anti-spoofing system. Workshop on Artificial Intelligence for Multimedia Forensics and Disinformation Detection (AI4MFDD).</mixed-citation>
                    </ref>
                                    <ref id="ref44">
                        <label>44</label>
                        <mixed-citation publication-type="journal">Zhang, Y., Jiang, F., &amp; Duan, Z. (2021). One-class learning towards synthetic voice spoofing detection. IEEE Signal Processing Letters, 28, 937-941. https://doi.org/10.1109/LSP.2021.3076358</mixed-citation>
                    </ref>
                                    <ref id="ref45">
                        <label>45</label>
                        <mixed-citation publication-type="journal">Zhang, Z., Yi, X., &amp; Zhao, X. (2021, June). Fake speech detection using residual network with transformer encoder. Proceedings of the 2021 ACM workshop on information hiding and multimedia security, Belgium. doi:10.1145/3437880.3460408</mixed-citation>
                    </ref>
                                    <ref id="ref46">
                        <label>46</label>
                        <mixed-citation publication-type="journal">Zhang, J., Tu, G., Liu, S., &amp; Cai, Z. (2023). Audio anti-spoofing based on audio feature fusion. Algorithms, 16, 317. doi:10.3390/a16070317</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
