-
1
-
-
84889044866
-
-
Baidu. https://passport.baidu.com/reg.
-
-
-
-
2
-
-
84879817757
-
-
China mobile. https://cmpay.10086.cn/.
-
China Mobile
-
-
-
4
-
-
84889038954
-
-
Sina weibo. http://weibo.com/signup/signup.php.
-
Sina Weibo
-
-
-
5
-
-
84889008668
-
-
Tencent security center
-
Tencent security center. http://aq.qq.com/cn2/findpsw/findpsw-index.
-
-
-
-
6
-
-
84889011892
-
-
Yahoo! password helper. https://edit.yahoo.com/forgot?stage= fe100&src=&intl=us&done=http://www.yahoo.com&partner=reg.
-
Yahoo! Password Helper
-
-
-
10
-
-
0016891725
-
Some variations of lee's algorithm
-
Jeffrey H Hoel. Some variations of lee's algorithm. Computers, IEEE Transactions on, 100(1):19-24, 1976.
-
(1976)
Computers, IEEE Transactions on
, vol.100
, Issue.1
, pp. 19-24
-
-
Hoel, J.H.1
-
11
-
-
0032203257
-
Gradient-based learning applied to document recognition
-
Yann LeCun, Léon Bottou, Yoshua Bengio, and Patrick Haffner. Gradient-based learning applied to document recognition. Proceedings of the IEEE, 86(11):2278-2324, 1998.
-
(1998)
Proceedings of the IEEE
, vol.86
, Issue.11
, pp. 2278-2324
-
-
LeCun, Y.1
Bottou, L.2
Bengio, Y.3
Haffner, P.4
-
12
-
-
4243538342
-
Method for selectively restricting access to computer systems
-
February 27 US Patent 6,195,698
-
Mark D Lillibridge, Martin Abadi, Krishna Bharat, and Andrei Z Broder. Method for selectively restricting access to computer systems, February 27 US Patent 6,195,698.
-
-
-
Lillibridge, M.D.1
Abadi, M.2
Bharat, K.3
Broder, A.Z.4
-
14
-
-
5044232104
-
Distortion estimation techniques in solving visual captchas
-
IEEE
-
Gabriel Moy, Nathan Jones, Curt Harkless, and Randall Potter. Distortion estimation techniques in solving visual captchas. In Computer Vision and Pattern Recognition, 2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on, volume 2, pages II-23. IEEE, 2004.
-
(2004)
Computer Vision and Pattern Recognition, 2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on
, vol.2
-
-
Moy, G.1
Jones, N.2
Harkless, C.3
Potter, R.4
-
16
-
-
84889004109
-
-
Cnn
-
M. O'Neill. Cnn. http://www.codeproject.com/Articles/16650/Neural- Network-for-Recognition-of-Handwritten-Digi.
-
-
-
O'Neill, M.1
-
17
-
-
49349108623
-
A threshold selection method from gray-level histograms
-
Nobuyuki Otsu. A threshold selection method from gray-level histograms. Automatica, 11(285-296):23-27, 1975.
-
(1975)
Automatica
, vol.11
, Issue.285-296
, pp. 23-27
-
-
Otsu, N.1
-
18
-
-
84945900998
-
Best practices for convolutional neural networks applied to visual document analysis
-
Patrice Simard, David Steinkraus, and John C Platt. Best practices for convolutional neural networks applied to visual document analysis. In ICDAR, volume 3, pages 958-962, 2003.
-
(2003)
ICDAR
, vol.3
, pp. 958-962
-
-
Simard, P.1
Steinkraus, D.2
Platt, J.C.3
-
19
-
-
84898975819
-
Using machine learning to break visual human interaction proofs hips
-
PY Simard. Using machine learning to break visual human interaction proofs (hips. Advances in neural information processing systems, 17:265-272, 2005.
-
(2005)
Advances in Neural Information Processing Systems
, vol.17
, pp. 265-272
-
-
Simard, P.Y.1
-
20
-
-
2942728016
-
Telling humans and computers apart automatically
-
Luis Von Ahn, Manuel Blum, and John Langford. Telling humans and computers apart automatically. Communications of the ACM, 47(2):56-60, 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.2
, pp. 56-60
-
-
Von Ahn, L.1
Blum, M.2
Langford, J.3
-
21
-
-
84978151067
-
Security and usability challenges of moving-object captchas: Decoding codewords in motion
-
Y Xu, G Reynaga, S Chiasson, JF Frahm, F Monrose, and PC Van Oorschot. Security and usability challenges of moving-object captchas: decoding codewords in motion. In 21st USENIX Security Symposium, 2012.
-
21st USENIX Security Symposium, 2012
-
-
Xu, Y.1
Reynaga, G.2
Chiasson, S.3
Frahm, J.F.4
Monrose, F.5
Van Oorschot, P.C.6
-
25
-
-
0021391789
-
A fast parallel algorithm for thinning digital patterns
-
TY Zhang and Ching Y. Suen. A fast parallel algorithm for thinning digital patterns. Communications of the ACM, 27(3):236-239, 1984.
-
(1984)
Communications of the ACM
, vol.27
, Issue.3
, pp. 236-239
-
-
Zhang, T.Y.1
Suen, C.Y.2
-
26
-
-
78650016133
-
Attacks and design of image recognition captchas
-
ACM
-
Bin B Zhu, Jeff Yan, Qiujie Li, Chao Yang, Jia Liu, Ning Xu, Meng Yi, and Kaiwei Cai. Attacks and design of image recognition captchas. In Proceedings of the 17th ACM conference on Computer and communications security, pages 187-200. ACM, 2010.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security
, pp. 187-200
-
-
Zhu, B.B.1
Yan, J.2
Li, Q.3
Yang, C.4
Liu, J.5
Xu, N.6
Yi, M.7
Cai, K.8
|