-
1
-
-
25144499816
-
Telling Humans and Computers Apart (Automatically) or How Lazy Cryptographers do AI
-
L. von Ahn, M. Blum, and J. Langford. Telling Humans and Computers Apart (Automatically) or How Lazy Cryptographers do AI. Comm. of the ACM, 47 (2), 57-60.
-
Comm. of the ACM
, vol.47
, Issue.2
, pp. 57-60
-
-
Von Ahn, L.1
Blum, M.2
Langford, J.3
-
2
-
-
21944454184
-
Implicit Captchas
-
H. S. Baird and J.L. Bentley. Implicit Captchas. In Proceedings of the IST SPIE Document Recognition and Retrieval XII Conference, (San Jose, CA, 2005), vol. 5676.
-
Proceedings of the IST SPIE Document Recognition and Retrieval XII Conference, (San Jose, CA, 2005)
, vol.5676
-
-
Baird, H.S.1
Bentley, J.L.2
-
3
-
-
43049174575
-
Speeded-Up Robust Features (SURF)
-
Jun. 2008
-
Bay, H., Ess, A., Tuytelaars, T., and Van Gool, L. 2008. Speeded-Up Robust Features (SURF). Comput. Vis. Image Underst. 110, 3 (Jun. 2008), 346-359.
-
(2008)
Comput. Vis. Image Underst.
, vol.110
, Issue.3
, pp. 346-359
-
-
Bay, H.1
Ess, A.2
Tuytelaars, T.3
Van Gool, L.4
-
4
-
-
0040220988
-
Semantic distance in WordNet: An experimental, application - Oriented evaluation of five measures
-
Budanitsky, A., Hirst, G. Semantic distance in WordNet: An experimental, application - oriented evaluation of five measures. In Proceedings of the North American Chapter of the Association for Computational Linguistics Workshop (Pittsburgh, PA, USA, 2001), 29-34.
-
Proceedings of the North American Chapter of the Association for Computational Linguistics Workshop (Pittsburgh, PA, USA, 2001)
, pp. 29-34
-
-
Budanitsky, A.1
Hirst, G.2
-
6
-
-
33749047587
-
Image Recognition CAPTCHAs
-
M. Chew and J. D. Tygar. Image Recognition CAPTCHAs. In Proceedings of the 7th Annual Information Security Conference (Palo Alto, CA, USA, 2004), 268-279.
-
Proceedings of the 7th Annual Information Security Conference (Palo Alto, CA, USA, 2004)
, pp. 268-279
-
-
Chew, M.1
Tygar, J.D.2
-
7
-
-
78650006229
-
IMAGINATION: A robust image-based CAPTCHA generation system
-
Datta, R., Li, J., and Wang, J. Z. IMAGINATION: a robust image-based CAPTCHA generation system. In Proceedings of the 13th Annual ACM international Conference on Multimedia (Hilton, Singapore, 2005), 331-334.
-
Proceedings of the 13th Annual ACM International Conference on Multimedia (Hilton, Singapore, 2005)
, pp. 331-334
-
-
Datta, R.1
Li J2
Wang, J.Z.3
-
8
-
-
69749128717
-
Exploiting the Human-Machine Gap in Image Recognition for Designing CAPTCHAs
-
Datta, R., Li, J., and Wang, J. Z. Exploiting the Human-Machine Gap in Image Recognition for Designing CAPTCHAs. IEEE Transactions on Information Forensics and Security, 4 (3), 504-518.
-
IEEE Transactions on Information Forensics and Security
, vol.4
, Issue.3
, pp. 504-518
-
-
Datta, R.1
Li, J.2
Wang, J.Z.3
-
9
-
-
77952329367
-
Asirra: A CAPTCHA that exploits interest-aligned manual image categorization
-
Elson, J., Douceur, J.R., Howell, J., and Saul, J. Asirra: a CAPTCHA that exploits interest-aligned manual image categorization. In Proceedings of the 14th ACM Conference on Computer and Communications Security (Alexandria, Virginia, USA, 2007), 366-374.
-
Proceedings of the 14th ACM Conference on Computer and Communications Security (Alexandria, Virginia, USA, 2007)
, pp. 366-374
-
-
Elson, J.1
Douceur, J.R.2
Howell, J.3
Saul, J.4
-
10
-
-
69749092477
-
Machine learning attacks against the Asirra CAPTCHA
-
Golle, P. 2008. Machine learning attacks against the Asirra CAPTCHA. In Proceedings of the 15th ACM Conference on Computer and Communications Security (Alexandria, Virginia, USA, 2008), 535-542.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security (Alexandria, Virginia, USA, 2008)
, pp. 535-542
-
-
Golle, P.1
-
11
-
-
78650028938
-
What's up CAPTCHA?: A CAPTCHA based on image orientation
-
Gossweiler, R., Kamvar, M., and Baluja, S. 2009. What's up CAPTCHA?: a CAPTCHA based on image orientation. In Proceedings of the 18th international Conference on World Wide Web (Madrid, Spain, 2009), 841-850
-
(2009)
Proceedings of the 18th International Conference on World Wide Web (Madrid, Spain, 2009)
, pp. 841-850
-
-
Gossweiler, R.1
Kamvar, M.2
Baluja, S.3
-
12
-
-
3042535216
-
Distinctive Image Features from Scale-Invariant Keypoints
-
Nov. 2004
-
Lowe, D. G. 2004. Distinctive Image Features from Scale-Invariant Keypoints. Int. J. Comput. Vision 60, 2 (Nov. 2004), 91-110.
-
(2004)
Int. J. Comput. Vision
, vol.60
, Issue.2
, pp. 91-110
-
-
Lowe, D.G.1
-
14
-
-
34248833974
-
Wordnet: A lexical database for English
-
G. A. Miller. 1990. Wordnet: a lexical database for English. International Journal of Lexicography, 3 (4), 235-244.
-
(1990)
International Journal of Lexicography
, vol.3
, Issue.4
, pp. 235-244
-
-
Miller, G.A.1
-
15
-
-
5044232104
-
Distortion Estimation Techniques in Solving Visual CAPTCHAs
-
Moy, G., Jones, N., Harkless, C., and Potter, R. Distortion Estimation Techniques in Solving Visual CAPTCHAs. In IEEE CVPR, (Washington, D.C., USA, 2004), Vol. 2, 23-28.
-
IEEE CVPR, (Washington, D.C., USA, 2004)
, vol.2
, pp. 23-28
-
-
Moy, G.1
Jones, N.2
Harkless, C.3
Potter, R.4
-
16
-
-
0004220095
-
-
IEEE Computer Society Press, Los Alamitos, CA
-
Wolberg, G. Digital Image Warping. IEEE Computer Society Press, Los Alamitos, CA, 1990.
-
(1990)
Digital Image Warping
-
-
Wolberg, G.1
-
17
-
-
66249097513
-
A low-cost attack on a Microsoft captcha
-
Yan, J. and El Ahmad, A. S. 2008. A low-cost attack on a Microsoft captcha. In Proceedings of the 15th ACM Conference on Computer and Communications Security (Alexandria, Virginia, USA, 2008), 543-554.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security (Alexandria, Virginia, USA, 2008)
, pp. 543-554
-
-
Yan, J.1
El Ahmad, A.S.2
-
18
-
-
65449133250
-
Usability of CAPTCHAs or usability issues in CAPTCHA design
-
Yan, J. and El Ahmad, A. S. 2008. Usability of CAPTCHAs or usability issues in CAPTCHA design. In Proceedings of the 4th Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, 2008), Vol. 337, 44-52
-
(2008)
Proceedings of the 4th Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, 2008)
, vol.337
, pp. 44-52
-
-
Yan, J.1
El Ahmad, A.S.2
|