Defend Data Poisoning Attacks on Voice Authentication | IEEE Journals & Magazine | IEEE Xplore