{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:36:38Z","timestamp":1730320598483,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T00:00:00Z","timestamp":1515974400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003398","name":"China Scholarship Council","doi-asserted-by":"publisher","award":["201806970007"],"id":[{"id":"10.13039\/501100003398","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Innovation Team Support Program of Shaanxi Province, China","award":["2018TD-O26"]},{"DOI":"10.13039\/501100011002","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672427, 61672428, 61772422"],"id":[{"id":"10.13039\/501100011002","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Royal Society International Collaboration Grant","award":["IE161012"]},{"name":"UK Engineering and Physical Sciences Research Council","award":["EP\/M01567X\/1 (SANDeRs), EP\/M015793\/1 (DIVIDEND)"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3243754","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T12:56:36Z","timestamp":1539694596000},"page":"332-348","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":88,"title":["Yet Another Text Captcha Solver"],"prefix":"10.1145","author":[{"given":"Guixin","family":"Ye","sequence":"first","affiliation":[{"name":"Northwest University, Xi'an, China"}]},{"given":"Zhanyong","family":"Tang","sequence":"additional","affiliation":[{"name":"Northwest University, Xi'an, China"}]},{"given":"Dingyi","family":"Fang","sequence":"additional","affiliation":[{"name":"Northwest University, Xi'an, China"}]},{"given":"Zhanxing","family":"Zhu","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Yansong","family":"Feng","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Pengfei","family":"Xu","sequence":"additional","affiliation":[{"name":"Northwest University, Xi'an, China"}]},{"given":"Xiaojiang","family":"Chen","sequence":"additional","affiliation":[{"name":"Northwest University, Xi'an, China"}]},{"given":"Zheng","family":"Wang","sequence":"additional","affiliation":[{"name":"Lancaster University, Lancaster, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Are you a human. https:\/\/www.areyouahuman.com\/. Are you a human. https:\/\/www.areyouahuman.com\/."},{"key":"e_1_3_2_2_2_1","unstructured":"Nucaptcha. www.nucaptcha.com\/. Nucaptcha. www.nucaptcha.com\/."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11909033_9"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1137\/040603371"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128824"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518983"},{"key":"e_1_3_2_2_7_1","unstructured":"Bursztein E. How we broke the nucaptcha video scheme and what we proposed to fix it. https:\/\/elie.net\/blog\/security\/how-we-broke-the-nucaptcha-video-scheme-and-what-we-propose-to-fix-it. Bursztein E. How we broke the nucaptcha video scheme and what we proposed to fix it. https:\/\/elie.net\/blog\/security\/how-we-broke-the-nucaptcha-video-scheme-and-what-we-propose-to-fix-it."},{"volume-title":"USENIX WOOT","year":"2014","author":"Bursztein E.","key":"e_1_3_2_2_8_1"},{"first-page":"8","volume-title":"Usenix Conference on Offensive Technologies","year":"2009","author":"Bursztein E.","key":"e_1_3_2_2_9_1"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046724"},{"volume-title":"Conference on Email & Anti-Spam","year":"2005","author":"Chellapilla K.","key":"e_1_3_2_2_11_1"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1411759.1411783"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315291"},{"key":"e_1_3_2_2_14_1","unstructured":"etal P. I. Pix2Pix: Image-to-image translation with conditional adversarial networks. https:\/\/github.com\/phillipi\/pix2pix. et al. P. I. Pix2Pix: Image-to-image translation with conditional adversarial networks. https:\/\/github.com\/phillipi\/pix2pix."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2682704"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516732"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23154"},{"volume-title":"An evolutionary study of dynamic cognitive game captchas: Automated attacks and defenses. Dissertations & Theses - Gradworks","year":"2014","author":"Gao S.","key":"e_1_3_2_2_18_1"},{"volume-title":"A generative vision model that trains with high data efficiency and breaks text-based captchas. Science","year":"2017","author":"George D.","key":"e_1_3_2_2_19_1"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2005.06.044"},{"volume-title":"International Conference on Learning Representations (ICLR)","year":"2014","author":"Goodfellow I. J.","key":"e_1_3_2_2_21_1"},{"key":"e_1_3_2_2_22_1","first-page":"2672","article-title":"Generative adversarial networks","volume":"3","author":"Goodfellow I. J.","year":"2014","journal-title":"Advances in Neural Information Processing Systems"},{"first-page":"1","volume-title":"ICML","year":"2015","author":"Goodfellow I. J.","key":"e_1_3_2_2_23_1"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526822"},{"volume-title":"Recognizing objects in adversarial cultter: Breaking a visual captcha","year":"2003","author":"Greg M.","key":"e_1_3_2_2_25_1"},{"first-page":"2980","volume-title":"Mask R-CNN. In IEEE International Conference on Computer Vision (ICCV)","year":"2017","author":"He K.","key":"e_1_3_2_2_26_1"},{"key":"e_1_3_2_2_27_1","unstructured":"He K. Zhang X. Ren S. and Sun J. Deep residual learning for image recognition. 770--778. He K. Zhang X. Ren S. and Sun J. Deep residual learning for image recognition. 770--778."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.1989.118638"},{"volume-title":"Side-channel attack on labeling captchas. Computer Science","year":"2009","author":"Hernandezcastro C. J.","key":"e_1_3_2_2_29_1"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.112"},{"volume-title":"Image-to-image translation with conditional adversarial networks. arxiv","year":"2016","author":"Isola P.","key":"e_1_3_2_2_31_1"},{"key":"e_1_3_2_2_32_1","unstructured":"J W. Strong captcha guidelines v1. 2. J W. Strong captcha guidelines v1. 2."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567061"},{"volume-title":"Adam: A method for stochastic optimization. Computer Science","year":"2014","author":"Kingma D. P.","key":"e_1_3_2_2_34_1"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2016.23013"},{"first-page":"3514","volume-title":"International Joint Conference on Neural Networks","year":"2017","author":"Le T. A.","key":"e_1_3_2_2_36_1"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49409-8_7"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_2_39_1","unstructured":"Li J. Monroe W. Shi T. Jean S. Ritter A. and Jurafsky D. Adversarial learning for neural dialogue generation. Li J. Monroe W. Shi T. Jean S. Ritter A. and Jurafsky D. Adversarial learning for neural dialogue generation."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2014.16"},{"volume-title":"Distributional smoothing by virtual adversarial examples. arXiv","year":"2015","author":"Miyato T.","key":"e_1_3_2_2_41_1"},{"volume-title":"Playing atari with deep reinforcement learning. arXiv","year":"2013","author":"Mnih V.","key":"e_1_3_2_2_42_1"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590298"},{"key":"e_1_3_2_2_44_1","first-page":"1","article-title":"On the security and usability of dynamic cognitive game captchas","author":"Mohameda M.","year":"2017","journal-title":"Journal of Computer Security ("},{"first-page":"146","volume-title":"International Workshop on Languages and Compilers for Parallel Computing","year":"2014","author":"Ogilvie W. F.","key":"e_1_3_2_2_45_1"},{"first-page":"245","volume-title":"Proceedings of the 2017 International Symposium on Code Generation and Optimization (2017), CGO '17","author":"Ogilvie W. F.","key":"e_1_3_2_2_46_1"},{"key":"e_1_3_2_2_47_1","first-page":"1","article-title":"No bot expects the deepcaptcha! introducing immutable adversarial examples, with applications to captcha generation","volume":"99","author":"Osadchy M.","year":"2017","journal-title":"IEEE Transactions on Information Forensics & Security PP"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"volume-title":"Generic black-box end-to-end attack against rnns and other api calls based malware classifiers. arXiv","year":"2017","author":"Rosenberg I.","key":"e_1_3_2_2_49_1"},{"volume-title":"A dual-use speech captcha: Aiding visually impaired web users while providing transcriptions of audio streams. LTI","year":"2010","author":"Schlaikjer A.","key":"e_1_3_2_2_50_1"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2635643"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.241"},{"volume-title":"Very deep convolutional networks for large-scale image recognition. Computer Science","year":"2014","author":"Simonyan K.","key":"e_1_3_2_2_53_1"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.37"},{"volume-title":"German Conference on Pattern Recognition Workshop","year":"2015","author":"Stark F.","key":"e_1_3_2_2_55_1"},{"volume-title":"Rethinking the inception architecture for computer vision. Computer Science","year":"2015","author":"Szegedy C.","key":"e_1_3_2_2_56_1"},{"volume-title":"Intriguing properties of neural networks. Computer Science","year":"2013","author":"Szegedy C.","key":"e_1_3_2_2_57_1"},{"first-page":"1625","volume-title":"Conference on Neural Information Processing Systems","year":"2008","author":"Tam J.","key":"e_1_3_2_2_58_1"},{"volume-title":"CAPTCHA: Using Hard AI Problems for Security","year":"2003","author":"Von Ahn L.","key":"e_1_3_2_2_59_1"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/966389.966390"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23115"},{"volume-title":"Security analysis and related usability of motion-based captchas: Decoding codewords in motion","year":"2014","author":"Xu Y.","key":"e_1_3_2_2_62_1"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.47"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455839"},{"first-page":"3320","volume-title":"How transferable are features in deep neural networks? In Advances in neural information processing systems","year":"2014","author":"Yosinski J.","key":"e_1_3_2_2_65_1"},{"key":"e_1_3_2_2_66_1","unstructured":"Yu L. Zhang W. Wang J. and Yu Y. Seqgan: Sequence generative adversarial nets with policy gradient. Yu L. Zhang W. Wang J. and Yu Y. Seqgan: Sequence generative adversarial nets with policy gradient."},{"volume-title":"Unpaired image-to-image translation using cycle-consistent adversarial networks. arXiv preprint arXiv:1703.10593","year":"2017","author":"Zhu J.-Y.","key":"e_1_3_2_2_67_1"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Toronto Canada","acronym":"CCS '18"},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243754","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T05:49:22Z","timestamp":1673329762000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243754"}},"subtitle":["A Generative Adversarial Network Based Approach"],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":67,"alternative-id":["10.1145\/3243734.3243754","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3243754","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}