{"id":11371,"date":"2021-09-16T16:44:31","date_gmt":"2021-09-16T20:44:31","guid":{"rendered":"https:\/\/www.crim.ca\/?post_type=publications&#038;p=11371"},"modified":"2022-02-09T16:44:46","modified_gmt":"2022-02-09T21:44:46","slug":"investigation-on-activation-functions-for-robust-end-to-end-spoofing-attack-detection-system","status":"publish","type":"publications","link":"https:\/\/www.crim.ca\/en\/publications\/investigation-on-activation-functions-for-robust-end-to-end-spoofing-attack-detection-system\/","title":{"rendered":"Investigation on Activation Functions for Robust End-to-End Spoofing Attack Detection System"},"content":{"rendered":"<p>Kang, W., Alam, J., Fathan, A., &#8220;Investigation on Activation Functions for Robust End-to-End Spoofing Attack Detection System&#8221;, Automatic Speaker Verification and Spoofing Countermeasures Challenge (ASVspoof 2021 Workshop &#8211; a satellite workshop of INTERSPEECH 2021), September 16, 2021.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kang, W., Alam, J., Fathan, A., &#8220;Investigation on Activation Functions for Robust End-to-End Spoofing Attack Detection System&#8221;, Automatic Speaker Verification and Spoofing Countermeasures Challenge (ASVspoof 2021 Workshop &#8211; a satellite workshop of INTERSPEECH 2021), September 16, 2021.<\/p>\n","protected":false},"featured_media":14435,"parent":0,"template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"publications":[237],"class_list":["post-11371","publications","type-publications","status-publish","has-post-thumbnail","hentry","publications-conference"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.crim.ca\/en\/wp-json\/wp\/v2\/publications\/11371"}],"collection":[{"href":"https:\/\/www.crim.ca\/en\/wp-json\/wp\/v2\/publications"}],"about":[{"href":"https:\/\/www.crim.ca\/en\/wp-json\/wp\/v2\/types\/publications"}],"version-history":[{"count":1,"href":"https:\/\/www.crim.ca\/en\/wp-json\/wp\/v2\/publications\/11371\/revisions"}],"predecessor-version":[{"id":11372,"href":"https:\/\/www.crim.ca\/en\/wp-json\/wp\/v2\/publications\/11371\/revisions\/11372"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.crim.ca\/en\/wp-json\/wp\/v2\/media\/14435"}],"wp:attachment":[{"href":"https:\/\/www.crim.ca\/en\/wp-json\/wp\/v2\/media?parent=11371"}],"wp:term":[{"taxonomy":"publications","embeddable":true,"href":"https:\/\/www.crim.ca\/en\/wp-json\/wp\/v2\/publications?post=11371"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}