Interpreting Multi-Branch Anti-Spoofing Architectures: Correlating Internal Strategy with Empirical Performance
Authors: Ivan Viakhirev, Kirill Borodin, Mikhail Gorodnichev, Grach Mkrtchian
Published: 2026-02-14 20:15:54+00:00
Comment: Published at MDPI Mathematics (see at https://www.mdpi.com/2227-7390/14/2/381)
Journal Ref: Mathematics 14 (2026)
AI Summary
This paper introduces a framework for interpreting the internal decision dynamics of multi-branch audio anti-spoofing networks like AASIST3, moving beyond traditional input-level saliency. It models intermediate activations with covariance operators to generate spectral signatures, which then train a CatBoost meta-classifier to derive TreeSHAP-based branch attributions and confidence scores. The analysis identifies four operational archetypes and exposes a critical 'Flawed Specialization' mode where the model confidently makes incorrect predictions for certain spoofing attacks.
Abstract
Multi-branch deep neural networks like AASIST3 achieve state-of-the-art comparable performance in audio anti-spoofing, yet their internal decision dynamics remain opaque compared to traditional input-level saliency methods. While existing interpretability efforts largely focus on visualizing input artifacts, the way individual architectural branches cooperate or compete under different spoofing attacks is not well characterized. This paper develops a framework for interpreting AASIST3 at the component level. Intermediate activations from fourteen branches and global attention modules are modeled with covariance operators whose leading eigenvalues form low-dimensional spectral signatures. These signatures train a CatBoost meta-classifier to generate TreeSHAP-based branch attributions, which we convert into normalized contribution shares and confidence scores (Cb) to quantify the model's operational strategy. By analyzing 13 spoofing attacks from the ASVspoof 2019 benchmark, we identify four operational archetypes-ranging from Effective Specialization (e.g., A09, Equal Error Rate (EER) 0.04%, C=1.56) to Ineffective Consensus (e.g., A08, EER 3.14%, C=0.33). Crucially, our analysis exposes a Flawed Specialization mode where the model places high confidence in an incorrect branch, leading to severe performance degradation for attacks A17 and A18 (EER 14.26% and 28.63%, respectively). These quantitative findings link internal architectural strategy directly to empirical reliability, highlighting specific structural dependencies that standard performance metrics overlook.