Computer Science ›› 2022, Vol. 49 ›› Issue (11A): 211100074-5.doi: 10.11896/jsjkx.211100074
• Information Security • Previous Articles Next Articles
YANG Hao, YAN Qiao
CLC Number:
[1]WANG Z,SHI P.CAPTCHA Recognition Method Based on CNN with Focal Loss[J].Complexity,2021(2):1-10. [2]GAO H C,WANG W,FAN Y,et al.The Robustness of “Connecting Characters Together” CAPTCHAs[J].Journal of Information Science and Engineering,2014,30(2):347-369. [3]VON AHN L,MAURER B,MCMILLEN C,et al.Recaptcha:Human-based character recognition via websecurity measures[J].Science,2008,321(5895):1465-1468. [4]GOODFELLOW I J,SHLENS J,SZEGEDY C.Explaining and harnessing adversarial examples[J].arXiv:1412.6572,2014. [5]KWON H,YOON H,PARK K W.Robust CAPTCHA Image Generation Enhanced with Adversarial Example Methods[J].IEICE Transactions on Information and Systems,2020,E103-D(4):879-882. [6]SU J,VARGAS D V,KOUICHI S.One pixel attack for fooling deep neural networks[J].IEEE Transactions on Evolutionary Computation,2019,23(5):828-841. [7]TANG Z Y,TIAN C X,LI J,et al.A text-based CAPTCHA re-cognition method based on conditional generative adversarial networks[J],Chinese Journal of Computers,2020,43(8):199-204. [8]CAO Y R,LU L,GONG Y H,et al.A Captcha RecognitionMethod based on Adversarial Network[J].Computer Enginee-ring and Applications,2020,56(8):199-204. [9]SHU Y,XU Y.End-to-End Captcha Recognition Using DeepCNN-RNN Network[C]//2019 IEEE 3rd Advanced Information Management,Communicates,Electronic and Automation Control Conference(IMCEC).2019:54-58. [10]SZEGEDY C,ZAREMBA W,SUTSKEVER I,et al.Intriguing properties of neural networks[C]//International Conference on Learning Representations.2014. [11]MOOSAVI-DEZFOOLI S M,FAWZI A,FAWZI O,et al.Universal adversarial perturbations[C]//2017 IEEE Conference on Computer Vision and Pattern Recognition(CVPR).2017:86-94. [12]OSADCHY M,HERNAN DE Z-CASTRO J,GIBSON S,et al.No Bot Expects the DeepCAPTCHA! Introducing Immutable AdversarialExamples,With Applications to CAPTCHA Generation[J].IEEE Transactions on Information Forensics and Secu-rity,2017,12(11):2640-2653. [13]SHEKHAR H,MOH M,MOH T.Exploring Adversaries to Defend Audio CAPTCHA[C]//2019 18th IEEE International Conference On Machine Learning And Applications(ICMLA).2019:1155-1161. [14]HITAJ D,HITAJ B,JAJODIA S,et al.Capture the Bot:Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks[J].Intelligent Systems,IEEE,2020,36(5):104-112. [15]DAS S,SUGANTHAN P N.Differential Evolution:A Survey of the State-of-the-Art[J].IEEE Transactions on Evolutionary Computation,2011,15(1):4-31. |
[1] | RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207. |
[2] | TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305. |
[3] | LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311. |
[4] | XU Yong-xin, ZHAO Jun-feng, WANG Ya-sha, XIE Bing, YANG Kai. Temporal Knowledge Graph Representation Learning [J]. Computer Science, 2022, 49(9): 162-171. |
[5] | WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293. |
[6] | HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329. |
[7] | JIANG Meng-han, LI Shao-mei, ZHENG Hong-hao, ZHANG Jian-peng. Rumor Detection Model Based on Improved Position Embedding [J]. Computer Science, 2022, 49(8): 330-335. |
[8] | SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177. |
[9] | HU Yan-yu, ZHAO Long, DONG Xiang-jun. Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification [J]. Computer Science, 2022, 49(7): 73-78. |
[10] | CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126. |
[11] | HOU Yu-tao, ABULIZI Abudukelimu, ABUDUKELIMU Halidanmu. Advances in Chinese Pre-training Models [J]. Computer Science, 2022, 49(7): 148-163. |
[12] | ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169. |
[13] | SU Dan-ning, CAO Gui-tao, WANG Yan-nan, WANG Hong, REN He. Survey of Deep Learning for Radar Emitter Identification Based on Small Sample [J]. Computer Science, 2022, 49(7): 226-235. |
[14] | ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362. |
[15] | ZHAO Lu, YUAN Li-ming, HAO Kun. Review of Multi-instance Learning Algorithms [J]. Computer Science, 2022, 49(6A): 93-99. |
|