Computer Science ›› 2023, Vol. 50 ›› Issue (1): 334-341.doi: 10.11896/jsjkx.211100001
• Information Security • Previous Articles Next Articles
LI Xiaoling1, WU Haotian1, ZHOU Tao1, LU Hui2
CLC Number:
[1]HAN W L,YUAN L,LI S S,et al.An Efficient Algorithm to Generate Password Sets Based on Samples[J].Chinese Journal of Computers,2017,40(5):1151-1167. [2]LIU G S,QIU W D,MENG K,et al.Password Vulnerability Assessment and Recovery Based on Ruels Mined from Large-Scale Real Data[J].Chinese Journal of Computers,2016,39(3):454-467. [3]XIE Z J,ZHANG M,LI Z H,et al.Analysis of Large-scale Real User Password Data Based on Cracking Algorithms[J].Computer Science,2020,47(11):48-54. [4]WANG D,ZOU Y K,TAO Y,et al.Password Guessing Model Based on Recurrent Neural Networks and Generative Adversa-rial Networks[J].Chinese Journal of Computers,2021,44(8):1519-1534. [5]YU L,ZHANG W,WANG J,et al.Seqgan:Sequence generative adversarial nets with policy gradient[C]//Proceedings of the AAAI Conference on Artificial Intelligence.2017,31(1),2852-2858. [6]NARAYANAN A,SHMATIKOV V.Fast dictionary attacks on passwords using time-space tradeoff[C]//Proceedings of the 12th ACM Conference on Computer and communications security.2005:364-372. [7]WEIR M,AGGARWAL S,DE MEDEIROS B,et al.Password cracking using probabilistic context-free grammars[C]//2009 30th IEEE Symposium on Security and Privacy.IEEE,2009:391-405. [8]TANSEY W.Improved models for password guessing [EB/OL].https://www.semanticscholar.org/paper/ImprovedMo-dels-for-Password-Guessing-Tansey/3451ac7f102da12e1197c681b77d368ba3b19ac9. [9]DÜRMUTH M,ANGELSTORF F,CASTELLUCCIA C,et al.OMEN:Faster password guessing using an ordered markov enumerator[C]//International Symposium on Engineering Secure Software and Systems.Cham:Springer,2015:119-132. [10]HOUSHMAND S,AGGARWAL S,FLOOD R.Next gen PCFG password cracking [J].IEEE Transactions on Information Forensics and Security,2015,10(8):1776-1791. [11]WANG D,WANG P.The emperor's new password creationpolicies[C]//European Symposium on Research in Computer Security.Cham:Springer,2015:456-477. [12]LI Y,WANG H,SUN K.A study of personal information in human-chosen passwords and its security implications[C]//IEEE INFOCOM 2016-the 35th Annual IEEE International Confe-rence on Computer Communications.IEEE,2016:1-9. [13]WANG D,ZHANG Z,WANG P,et al.Targeted online password guessing:An underestimated threat[C]//Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security.2016:1242-1254. [14]MELICHER W,UR B,SEGRETI S M,et al.Fast,lean,and accurate:Modeling password guessability using neural networks[C]//25th {USENIX} Security Symposium({USENIX} Security 16).2016:175-191. [15]XU L,GE C,QIU W,et al.Password guessing based on LSTM recurrent neural networks[C]//2017 IEEE International Conference on Computational Science and Engineering(CSE) and IEEE International Conference on Embedded and Ubiquitous Computing(EUC).IEEE,2017:785-788. [16]XIA Z Y,YI P,LIU Y,et al.GENPass:A multi-source deeplearning model for password guessing[J].IEEE Transactions on Multimedia,2019,22(5):1323-1332. [17]HITAJ B,GASTI P,ATENIESE G,et al.Passgan:A deeplearning approach for password guessing[C]//International Conference on Applied Cryptography and Network Security.Cham:Springer,2019:217-237. [18]GULRAJANI I,AHMED F,ARJOVSKY M,et al.Improvedtraining of wasserstein gans [J].arXiv:1704.00028,2017. [19]NAM S,JEON S,KIM H,et al.Recurrent gans password cra-cker for iot password security enhancement [J].Sensors,2020,20(11):3106. [20]PASQUINI D,GANGWAL A,ATENIESE G,et al.Improving password guessing via representation learning[C]//2021 IEEE Symposium on Security and Privacy(SP).IEEE,2021:1382-1399. [21]MNIH V,KAVUKCUOGLU K,SILVER D,et al.Human-level control through deep reinforcement learning [J].Nature,2015,518(7540):529-533. [22]SILVER D,LEVER G,HEESS N,et al.Deterministic policygradient algorithms[C]//International Conference on Machine Learning.PMLR,2014:387-395. [23]KONDA V R,TSITSIKLIS J N.Actor-critic algorithms[C]//Advances in Neural Information Processing Systems.2000:1008-1014. [24]LILLICRAP T P,HUNT J J,PRITZEL A,et al.Continuouscontrol with deep reinforcement learning [J].arXiv:1509.02971,2015. [25]MNIH V,BADIA A P,MIRZA M,et al.Asynchronous methodsfor deep reinforcement learning[C]//International Conference on Machine Learning.PMLR,2016:1928-1937. [26]YANG S M,SHAN Z,DING Y,et al.Survey of Research on Deep Reinforcement Learning[J].Computer Engineering,2021,47(12):19-29. [27]LIN K,LI D,HE X,et al.Adversarial ranking for language ge-neration [J].arXiv:1705.11001,2017. [28]FEDUS W,GOODFELLOW I,DAI A M.Maskgan:better text generation via filling in the_ [J].arXiv:1801.07736,2018. [29]ZHANG X,LECUN Y.Text understanding from scratch [J].arXiv:1502.01710,2015. |
[1] | CAI Xiao, CEHN Zhihua, SHENG Bin. SPT:Swin Pyramid Transformer for Object Detection of Remote Sensing [J]. Computer Science, 2023, 50(1): 105-113. |
[2] | WANG Bin, LIANG Yudong, LIU Zhe, ZHANG Chao, LI Deyu. Study on Unsupervised Image Dehazing and Low-light Image Enhancement Algorithms Based on Luminance Adjustment [J]. Computer Science, 2023, 50(1): 123-130. |
[3] | LI Xuehui, ZHANG Yongjun, SHI Dianxi, XU Huachi, SHI Yanyan. AFTM:Anchor-free Object Tracking Method with Attention Features [J]. Computer Science, 2023, 50(1): 138-146. |
[4] | SUN Kaili, LUO Xudong , Michael Y.LUO. Survey of Applications of Pretrained Language Models [J]. Computer Science, 2023, 50(1): 176-184. |
[5] | HUANG Yuzhou, WANG Lisong, QIN Xiaolin. Bi-level Path Planning Method for Unmanned Vehicle Based on Deep Reinforcement Learning [J]. Computer Science, 2023, 50(1): 194-204. |
[6] | ZHENG Cheng, MEI Liang, ZHAO Yiyan, ZHANG Suhang. Text Classification Method Based on Bidirectional Attention and Gated Graph Convolutional Networks [J]. Computer Science, 2023, 50(1): 221-228. |
[7] | RONG Huan, QIAN Minfeng, MA Tinghuai, SUN Shengjie. Novel Class Reasoning Model Towards Covered Area in Given Image Based on InformedKnowledge Graph Reasoning and Multi-agent Collaboration [J]. Computer Science, 2023, 50(1): 243-252. |
[8] | ZHANG Qiyang, CHEN Xiliang, ZHANG Qiao. Sparse Reward Exploration Method Based on Trajectory Perception [J]. Computer Science, 2023, 50(1): 262-269. |
[9] | WEI Nan, WEI Xianglin, FAN Jianhua, XUE Yu, HU Yongyang. Backdoor Attack Against Deep Reinforcement Learning-based Spectrum Access Model [J]. Computer Science, 2023, 50(1): 351-361. |
[10] | ZHANG Jia, DONG Shou-bin. Cross-domain Recommendation Based on Review Aspect-level User Preference Transfer [J]. Computer Science, 2022, 49(9): 41-47. |
[11] | XU Yong-xin, ZHAO Jun-feng, WANG Ya-sha, XIE Bing, YANG Kai. Temporal Knowledge Graph Representation Learning [J]. Computer Science, 2022, 49(9): 162-171. |
[12] | RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207. |
[13] | LIU Xing-guang, ZHOU Li, LIU Yan, ZHANG Xiao-ying, TAN Xiang, WEI Ji-bo. Construction and Distribution Method of REM Based on Edge Intelligence [J]. Computer Science, 2022, 49(9): 236-241. |
[14] | TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305. |
[15] | SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177. |
|