
Using Generative Adversarial Networks to Break and Protect Text Captchas 1:29
[50]
Manar Mohameda, Song Gaob, Niharika Sachdevac, Nitesh Saxena, Chengcui Zhangd, Ponnurangam Kumaraguruc,
and Paul C. Van Oorschote. 2017. On the security and usability of dynamic cognitive game CAPTCHAs. Journal of
Computer Security (2017), 1–26.
[51]
Margarita Osadchy, Julio Hernandez-Castro, Stuart Gibson, Orr Dunkelman, and Daniel Pĺęrez-Cabo. 2017. No
Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, with Applications to CAPTCHA
Generation. IEEE Transactions on Information Forensics & Security PP, 99 (2017), 1–1.
[52]
Sinno Jialin Pan and Qiang Yang. 2010. A Survey on Transfer Learning. IEEE Transactions on Knowledge & Data
Engineering 22, 10 (2010), 1345–1359.
[53]
Ishai Rosenberg, Asaf Shabtai, Lior Rokach, and Yuval Elovici. 2017. Generic Black-Box End-to-End Attack against
RNNs and Other API Calls Based Malware Classiers. arXiv (2017).
[54] Neil J. Rubenking. 2013. Are You a Human. https://www.areyouahuman.com.
[55]
Andy Schlaikjer. 2010. A Dual-Use Speech CAPTCHA: Aiding Visually Impaired Web Users while Providing Tran-
scriptions of Audio Streams. LTI (2010).
[56] NuData Security. 2010. NuCaptcha. www.nucaptcha.com.
[57]
Muhammad Shahzad, Alex X Liu, and Arjmand Samuel. 2017. Behavior based human authentication on touch screen
devices using gestures and signatures. IEEE Transactions on Mobile Computing 16, 10 (2017), 2726–2741.
[58] Chenghui Shi, Xiaogang Xu, Shouling Ji, Kai Bu, Jianhai Chen, Raheem A. Beyah, and Ting Wang. 2019. Adversarial
CAPTCHAs. CoRR abs/1901.01107 (2019). arXiv:1901.01107 http://arxiv.org/abs/1901.01107
[59]
Ashish Shrivastava, Tomas Pster, Oncel Tuzel, Joshua Susskind, Wenda Wang, and Russell Webb. 2017. Learning
from Simulated and Unsupervised Images through Adversarial Training. In The IEEE Conference on Computer Vision
and Pattern Recognition (CVPR).
[60]
Karen Simonyan and Andrew Zisserman. 2014. Very Deep Convolutional Networks for Large-Scale Image Recognition.
Computer Science (2014).
[61]
Suphannee Sivakorn, Iasonas Polakis, and Angelos D. Keromytis. 2016. I am Robot: (Deep) Learning to Break Semantic
Image CAPTCHAs. In IEEE European Symposium on Security and Privacy. 388–403.
[62]
Fabian Stark, Caner Hazirbas, Rudoplh Triebel, and Daniel Cremers. 2015. CAPTCHA Recognition with Active Deep
Learning. In German Conference on Pattern Recognition Workshop.
[63] Christian Szegedy, Wei Liu, Yangqing Jia, Pierre Sermanet, Scott Reed, Dragomir Anguelov, Dumitru Erhan, Vincent
Vanhoucke, and Andrew Rabinovich. 2015. Going deeper with convolutions. In Proceedings of the IEEE conference on
computer vision and pattern recognition. 1–9.
[64]
Christian Szegedy, Vincent Vanhoucke, Sergey Ioe, Jonathon Shlens, and Zbigniew Wojna. 2015. Rethinking the
Inception Architecture for Computer Vision. Computer Science (2015), 2818–2826.
[65]
Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus.
2013. Intriguing properties of neural networks. Computer Science (2013).
[66]
Jennifer Tam, Jirĺł Simsa, Sean Hyde, and Luis Von Ahn. 2008. Breaking Audio CAPTCHAs. In Conference on Neural
Information Processing Systems, Vancouver, British Columbia, Canada, December. 1625–1632.
[67]
Luis Von Ahn, Manuel Blum, Nicholas J Hopper, and John Langford. 2003. CAPTCHA: Using Hard AI Problems for
Security. Springer Berlin Heidelberg. 294–311 pages.
[68]
Luis Von Ahn, Manuel Blum, and John Langford. 2004. Telling humans and computers apart automatically. Communi-
cations of the Acm 47, 2 (2004), 56–60.
[69]
Cihang Xie, Zhishuai Zhang, Yuyin Zhou, Song Bai, Jianyu Wang, Zhou Ren, and Alan L. Yuille. 2019. Improving
Transferability of Adversarial Examples With Input Diversity. In The IEEE Conference on Computer Vision and Pattern
Recognition (CVPR).
[70]
Weilin Xu, Yanjun Qi, and David Evans. 2016. Automatically Evading Classiers: A Case Study on PDF Malware
Classiers. In Network and Distributed System Security Symposium.
[71]
Yi Xu, Gerardo Reynaga, Sonia Chiasson, Jan-Michael Frahm, Fabian Monrose, and Paul C Van Oorschot. 2014. Security
analysis and related usability of motion-based captchas: Decoding codewords in motion. IEEE transactions on dependable
and secure computing 11, 5 (2014), 480–493.
[72]
Je Yan and Ahmad Salah El Ahmad. 2007. Breaking Visual CAPTCHAs with Naive Pattern Recognition Algorithms.
In Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third Annual. 279–291.
[73]
Je Yan and Ahmad Salah El Ahmad. 2008. A low-cost attack on a Microsoft captcha. In ACM Conference on Computer
and Communications Security, CCS 2008, Alexandria, Virginia, Usa, October. 543–554.
[74]
Guixin Ye, Zhanyong Tang, Dingyi Fang, Zhanxing Zhu, Yansong Feng, Pengfei Xu, Xiaojiang Chen, and Zheng Wang.
2018. Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach. In Proceedings of the 2018
ACM SIGSAC Conference on Computer and Communications Security. ACM, 332–348.
[75]
Jason Yosinski, Je Clune, Yoshua Bengio, and Hod Lipson. 2014. How transferable are features in deep neural
networks?. In Advances in neural information processing systems. 3320–3328.