-
1
-
-
0024641383
-
Spokenword recognition using dynamic features analysed by two-dimensional cepstrum
-
IET
-
Y. Ariki, S. Mizuta, M. Nagata, and T. Sakai. Spokenword recognition using dynamic features analysed by two-dimensional cepstrum. In Communications, Speech and Vision, IEE Proceedings I, volume 136, pages 133-140. IET, 2005.
-
(2005)
Communications, Speech and Vision, IEE Proceedings I
, vol.136
, pp. 133-140
-
-
Ariki, Y.1
Mizuta, S.2
Nagata, M.3
Sakai, T.4
-
4
-
-
77955194191
-
How good are humans at solving CAPTCHAs? A large scale evaluation
-
2010 IEEE Symposium on IEEE
-
E. Bursztein, S. Bethard, C. Fabry, J. Mitchell, and D. Jurafsky. How good are humans at solving CAPTCHAs? a large scale evaluation. In Security and Privacy (SP), 2010 IEEE Symposium on, pages 399-413. IEEE, 2010.
-
(2010)
Security and Privacy (SP)
, pp. 399-413
-
-
Bursztein, E.1
Bethard, S.2
Fabry, C.3
Mitchell, J.4
Jurafsky, D.5
-
6
-
-
0017542202
-
The cepstrum: A guide to processing
-
D. Childers, D. Skinner, and R. Kemerait. The cepstrum: A guide to processing. Proceedings of the IEEE, 65(10):1428 - 1443, 1977.
-
(1977)
Proceedings of the IEEE
, vol.65
, Issue.10
, pp. 1428-1443
-
-
Childers, D.1
Skinner, D.2
Kemerait, R.3
-
8
-
-
69749092477
-
Machine learning attacks against the asirra captcha
-
P. Golle. Machine learning attacks against the asirra captcha. In ACM CCS 2008, 2008.
-
(2008)
ACM CCS 2008
-
-
Golle, P.1
-
10
-
-
33646074517
-
Compact representation of speech using 2-d cepstrum - An application to slovak digits recognition
-
V. Matousek, P. Mautner, and T. P. Pavelka, editors, TSD Springer
-
R. Jarina, M. Kuba, and M. Paralic. Compact representation of speech using 2-d cepstrum - an application to slovak digits recognition. In V. Matousek, P. Mautner, and T. Pavelka, editors, TSD, volume 3658 of Lecture Notes in Computer Science, pages 342-347. Springer, 2005.
-
(2005)
Volume 3658 of Lecture Notes in Computer Science
, pp. 342-347
-
-
Jarina, R.1
Kuba, M.2
Paralic, M.3
-
12
-
-
65449132236
-
Designing human friendly human interaction proofs
-
ACM, editor
-
P. S. K Chellapilla, K Larson and M. Czerwinski. Designing human friendly human interaction proofs. In ACM, editor, CHI05, 2005.
-
(2005)
CHI05
-
-
Chellapilla, P.S.K.1
Larson, K.2
Czerwinski, M.3
-
13
-
-
0019636227
-
Spectrum analysis: A modern perspective
-
S.L.
-
S. Kay and J. Marple, S.L. Spectrum analysis: A modern perspective. Proceedings of the IEEE, 69(11):1380 - 1419, 1981.
-
(1981)
Proceedings of the IEEE
, vol.69
, Issue.11
, pp. 1380-1419
-
-
Kay, S.1
Marple, J.2
-
14
-
-
85009227802
-
Localized spectro-temporal features for automatic speech recognition
-
M. Kleinschmidt. Localized spectro-temporal features for automatic speech recognition. In Proc. Eurospeech, pages 2573-2576, 2003.
-
(2003)
Proc. Eurospeech
, pp. 2573-2576
-
-
Kleinschmidt, M.1
-
20
-
-
0026938336
-
Study of the two-dimensional cepstrum approach for speech recognition
-
DOI 10.1016/0885-2308(92)90029-4
-
H. Pai and H. Wang. A study of the two-dimensional cepstrum approach for speech recognition. Computer Speech & Language, 6(4):361-375, 1992. (Pubitemid 23581614)
-
(1992)
Computer Speech and Language
, vol.6
, Issue.4
, pp. 361-375
-
-
Pai Hsiao-Fen1
Wang Hsiao-Chuan2
-
21
-
-
85177680984
-
Notes on regularized least squares: Multiclass classification
-
H. Paskov and L. Rosasco. Notes on Regularized Least Squares: Multiclass Classification. Technical report, MIT, 2011.
-
(2011)
Technical Report, MIT
-
-
Paskov, H.1
Rosasco, L.2
-
24
-
-
85177688821
-
-
Shadowserver. Conficker. http://www.shadowserver.org/wiki/pmwiki.php/ Stats/Conficker, 2010.
-
(2010)
Conficker
-
-
-
26
-
-
77955711266
-
Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony
-
Y. Soupionis and D. Gritzalis. Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony. Computers & Security, 29(5):603-618, 2010.
-
(2010)
Computers & Security
, vol.29
, Issue.5
, pp. 603-618
-
-
Soupionis, Y.1
Gritzalis, D.2
-
27
-
-
84858760886
-
Breaking audio captchas
-
J. Tam, J. Simsa, S. Hyde, and L. Von Ahn. Breaking audio captchas. Advances in Neural Information Processing Systems, 1(4), 2008.
-
(2008)
Advances in Neural Information Processing Systems
, vol.1
, Issue.4
-
-
Tam, J.1
Simsa, J.2
Hyde, S.3
Von Ahn, L.4
-
28
-
-
12244282921
-
Captcha: Using hard ai problems for security
-
Sringer, editor
-
L. von Ahn, M. Blum, N. J. Hopper, and J. Langford. Captcha: Using hard ai problems for security. In Sringer, editor, Eurocrypt, 2003.
-
(2003)
Eurocrypt
-
-
Von Ahn, L.1
Blum, M.2
Hopper, N.J.3
Langford, J.4
-
29
-
-
77955205653
-
A low-cost attack on a microsoft captcha
-
J. Yan and A. S. E. Ahmad. A low-cost attack on a microsoft captcha. Ex confidential draft http://homepages.cs.ncl.ac.uk/jeff.yan/msndraft.pdf, 2008.
-
(2008)
Ex Confidential Draft
-
-
Yan, J.1
Ahmad, A.S.E.2
-
30
-
-
66249097513
-
A low-cost attack on a microsoft captcha
-
CCS '08 New York, NY, USA ACM
-
J. Yan and A. S. El Ahmad. A low-cost attack on a microsoft captcha. In Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pages 543-554, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 543-554
-
-
Yan, J.1
El Ahmad, A.S.2
|