1 |
Chellapilla, K., & Simard, P. Y. "Using machine learning to break visual human interaction proofs (HIPs)," In NIPS, pp. 265-272, Dec. 2004.
|
2 |
Xu, Y., Reynaga, G., Chiasson, S., Frahm, J. M., Monrose, F., & Van Oorschot, P. C. "Security analysis and related usability of motion-based captchas: Decoding codewords in motion," IEEE transactions on dependable and secure computing, 11(5), pp. 480-493, Sep. 2014.
DOI
|
3 |
Elson, J., Douceur, J. R., Howell, J., & Saul, J. "Asirra: a CAPTCHA that exploits interest-aligned manual image categorization," In ACM Conference on Computer and Communications Security, Vol. 7, pp. 366-374, Oct. 2007.
|
4 |
Golle, P. "Machine learning attacks against the Asirra CAPTCHA," In Proceedings of the 15th ACM conference on Computer and communications security, ACM, pp. 535-542, Oct. 2008.
|
5 |
Gao, S., Mohamed, M., Saxena, N., & Zhang, C. "Emerging image game CAPTCHAs for resisting automated and human-solver relay attacks." In Proceedings of the 31st Annual Computer Security Applications Conference, ACM, pp. 11-20, Dec. 2015.
|
6 |
Qiujie, L., Yaobin, M., & Zhiquan, W. "A survey of CAPTCHA technology," Journal of Computer Research and Development, Vol.49, no.3, pp. 469-480, Mar. 2012.
|
7 |
Ross, S. A., Halderman, J. A., & Finkelstein, A. "Sketcha: a CAPTCHA based on Line Drawings of 3D Models," In Proceedings of the 19th international conference on World wide web, ACM, pp. 821-830, Apr. 2010.
|
8 |
Nguyen, V. D., Chow, Y. W., & Susilo, W. "On the security of text-based 3D CAPTCHAs," Computers & Security, Vol.45, pp. 84-99, Sep. 2014.
DOI
|
9 |
Mitra, N. J., Chu, H. K., Lee, T. Y., Wolf, L., Yeshurun, H., & Cohen-Or, D. "Emerging images," In ACM Transactions on Graphics (TOG), ACM, Vol. 28, No. 5, pp. 163, Dec. 2009.
|
10 |
Mohamed, M., Sachdeva, N., Georgescu, M., Gao, S., Saxena, N., Zhang, C., ... & Chen, W. B. "Three-way dissection of a game-captcha: Automated attacks, relay attacks, and usability," arXiv preprint arXiv:1310.1540, Oct. 2013.
|
11 |
Yang, C. H., Kuo, Y. M., & Chu, H. K. "Synthesizing Emerging Images from Photographs," In Proceedings of the 2016 ACM on Multimedia Conference, ACM, pp. 660-664, Oct. 2016.
|
12 |
Quarter, Akamai Releases Third. "'State of the Internet Report." 2015.
|
13 |
Yan, J., & El Ahmad, A. S. "A Low-cost Attack on a Microsoft CAPTCH," In Proceedings of the 15th ACM conference on Computer and communications security, ACM. pp. 543-554, Oct. 2008.
|
14 |
Von Ahn, L., Blum, M., Hopper, N. J., & Langford, J. "CAPTCHA: Using hard AI problems for security," In International Conference on the Theory and Applications of Cryptographic Techniques, Springer Berlin Heidelberg, pp. 294-311, May. 2003.
|
15 |
Mori, G., & Malik, J. "Recognizing objects in adversarial clutter: Breaking a visual CAPTCHA," In Computer Vision and Pattern Recognition, 2003. Proceedings. 2003 IEEE Computer Society Conference, IEEE. Vol. 1, pp. I-I, Jun. 2003.
|
16 |
Moy, G., Jones, N., Harkless, C., & Potter, R. "Distortion estimation techniques in solving visual CAPTCHAs," In Computer Vision and Pattern Recognition, 2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on Vol. 2, IEEE, pp. II-II, Jun. 2004.
|
17 |
Bansal, Abhay, et al. "BREAKING A VISUAL CAPTCHA: A NOVEL APPROACH USING HMM."
|