Abstract
Speech network analysis and anomaly detection based on the FSS model is analyzed in this research. Aiming at the problem of parallel detection and processing of massive data in distributed intrusion detection, a data segmentation algorithm based on capability and load is proposed. The algorithm evaluates the capabilities and actual load of the nodes, weighs the actual state of each node and the data distribution relationship in the cluster, and allocates more data to be processed to nodes with strong data processing capabilities and light loads. High-order statistics are used to describe the intrusion characteristics of persistent attacks in the link layer of the speech sensor networks, and vector quantitative decomposition is used to analyze the fusion characteristics of advanced persistent intrusion symbols in mobile terminals. Different terminals are estimated based on the machine learning algorithms, and the FSS model is integrated to achieve the comprehensive analysis of the speech analytic models. The experiment compared with the state-of-the-art methods have proven the efficiency of the framework. The detection accuracy is higher than the latest methodologies.
Similar content being viewed by others
Change history
24 October 2022
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s10772-022-09997-2
References
Anchalia, U., Reddy, K.P., Modi, A., Neelam, K., Prasad, D. & Nath, V. (2019). Study and design of biometric security systems: fingerprint and speech technology. In Proceedings of the third international conference on microelectronics, computing and communication systems (pp. 577–584). Springer, Singapore.
Deka, A., Sarmah, P., Samudravijaya, K. & Prasanna, S.R.M. (2019). Development of assamese text-to-speech system using deep neural network. In 2019 National Conference on Communications (NCC) (pp. 1–5). IEEE.
Deng, X., Li, Y., Weng, J., & Zhang, J. (2019). Feature selection for text classification: A review. Multimedia Tools and Applications, 78(3), 3797–3816.
Ekberg, S., Danby, S., Theobald, M., Fisher, B., & Wyeth, P. (2019). Using physical objects with young children in ‘face-to-face’and telehealth speech and language therapy. Disability and Rehabilitation, 41(14), 1664–1675.
Faizin, B., Ramdhani, M.A., Gunawan, W., & Gojali, D. (2018). Speech acts analysis in Whatsapp status updates. In International Conference on Media and Communication Studies (ICOMACS 2018). Atlantis Press.
Kim, J. B. & Kweon, H. J. (2019). The analysis on commercial and open source software speech recognition technology. In International Conference on Computational Science/Intelligence & Applied Informatics (pp. 1–15). Springer, Cham.
King, S. O. (2019). How electrical engineering and computer engineering departments are preparing undergraduate students for the new big data, machine learning, and AI paradigm: A three-model overview. In 2019 IEEE Global Engineering Education Conference (EDUCON) (pp. 352–356). IEEE.
Li, D., Cai, Z., Deng, L., Yao, X., & Wang, H. H. (2019). Information security model of block chain based on intrusion sensing in the IoT environment. Cluster Computing, 22(1), 451–468.
Madhavaraj, A. & Ramakrishnan, A. G. (2019). Scattering transform inspired filterbank learning from raw speech for better acoustic modeling. In TENCON 2019–2019 IEEE Region 10 Conference (TENCON) (pp. 1154–1158). IEEE.
Muckenhirn, H., Doss, M .M., & Marcell, S. (2018). Towards directly modeling raw speech signal for speaker verification using CNNs. In: 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (pp. 4884–4888). IEEE.
Muhammad, K., Hamza, R., Ahmad, J., Lloret, J., Wang, H., & Baik, S. W. (2018). Secure surveillance framework for IoT systems using probabilistic image encryption. IEEE Transactions on Industrial Informatics, 14(8), 3679–3689.
Mukherjee, H., Obaidullah, S. M., Santosh, K. C., Phadikar, S., & Roy, K. (2020). A lazy learning-based language identification from speech using MFCC-2 features. International Journal of Machine Learning and Cybernetics, 11(1), 1–14.
Nautsch, A., Jiménez, A., Treiber, A., Kolberg, J., Jasserand, C., Kindt, E., et al. (2019). Preserving privacy in speaker and speech characterisation. Computer Speech & Language, 58, 441–480.
Peng, H., Bao, M., Li, J., Bhuiyan, M. Z. A., Liu, Y., He, Y., et al. (2018). Incremental term representation learning for social network analysis. Future Generation Computer Systems, 86, 1503–1512.
Plageras, A. P., Psannis, K. E., Stergiou, C., Wang, H., & Gupta, B. B. (2018). Efficient IoT-based sensor BIG Data collection-processing and analysis in smart buildings. Future Generation Computer Systems, 82, 349–357.
Ren, J., Chen, G., Li, X., & Mao, K. (2019). Striped-texture image segmentation with application to multimedia security. Multimedia Tools and Applications, 78(19), 26965–26978.
Sailunaz, K., Dhaliwal, M., Rokne, J., & Alhajj, R. (2018). Emotion detection from text and speech: A survey. Social Network Analysis and Mining, 8(1), 28.
Savchenko, A. V., & Savchenko, V. V. (2019). A method for measuring the pitch frequency of speech signals for the systems of acoustic speech analysis. Measurement Techniques, 62(3), 282–288.
Shadiev, R., Sun, A., & Huang, Y. M. (2019). A study of the facilitation of cross-cultural understanding and intercultural sensitivity using speech-enabled language translation technology. British Journal of Educational Technology, 50(3), 1415–1433.
Ting, W. (2019). An acoustic recognition model for english speech based on improved HMM algorithm. In 2019 11th international conference on measuring technology and mechatronics automation (ICMTMA) (pp. 729–732). IEEE.
Vilas, A. F., Redondo, R. P. D., Crockett, K., Owda, M., & Evans, L. (2019). Twitter permeability to financial events: An experiment towards a model for sensing irregularities. Multimedia Tools and Applications, 78(7), 9217–9245.
Wang, X., Lorenzo-Trueba, J., Takaki, S., Juvela, L., & Yamagishi, J. (2018). A comparison of recent waveform generation and acoustic modeling methods for neural-network-based speech synthesis. In 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (pp. 4804–4808). IEEE.
Wu, J., Hua, Y., Yang, S., Qin, H., & Qin, H. (2019). Speech enhancement using generative adversarial network by distilling knowledge from statistical method. Applied Sciences, 9(16), 3396.
Yoshimura, T., Hashimoto, K., Oura, K., Nankaku, Y., & Tokuda, K. (2019). Speaker-dependent Wavenet-based Delay-free Adpcm Speech Coding. In ICASSP 2019–2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (pp. 7145–7149). IEEE.
Zheng, Y., Li, Y., Wen, Z., Liu, B., & Tao, J. (2018). Investigating deep neural network adaptation for generating exclamatory and interrogative speech in mandarin. Journal of Signal Processing Systems, 90(7), 1039–1052.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s10772-022-09997-2
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Yan, X. RETRACTED ARTICLE: Speech network analysis and anomaly detection based on FSS model. Int J Speech Technol 24, 67–76 (2021). https://doi.org/10.1007/s10772-020-09731-w
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10772-020-09731-w