Attacks and defenses in user authentication systems: A survey
X Wang, Z Yan, R Zhang, P Zhang - Journal of Network and Computer …, 2021 - Elsevier
User authentication systems (in short authentication systems) have wide utilization in our
daily life. Unfortunately, existing authentication systems are prone to various attacks while …
daily life. Unfortunately, existing authentication systems are prone to various attacks while …
Bot or human? detecting chatgpt imposters with a single question
Large language models like ChatGPT have recently demonstrated impressive capabilities in
natural language understanding and generation, enabling various applications including …
natural language understanding and generation, enabling various applications including …
[PDF][PDF] Captcha and its techniques: a review
K Kaur, S Behal - International Journal of Computer Science and …, 2014 - researchgate.net
Captcha (Completely Automated public Turing test to tell Computers and Humans Apart)
system is used to verify whether a user is human or computer program. It's also known as …
system is used to verify whether a user is human or computer program. It's also known as …
Is image-based CAPTCHA secure against attacks based on machine learning? An experimental study
FH Alqahtani, FA Alsulaiman - Computers & Security, 2020 - Elsevier
The completely automated public Turing test to tell computers and humans apart
(CAPTCHA) is among the most common methods of authentication used by websites and …
(CAPTCHA) is among the most common methods of authentication used by websites and …
Balancing usability and security in a video CAPTCHA
KA Kluever, R Zanibbi - Proceedings of the 5th Symposium on Usable …, 2009 - dl.acm.org
We present a technique for using content-based video labeling as a CAPTCHA task. Our
CAPTCHAs are generated from YouTube videos, which contain labels (tags) supplied by the …
CAPTCHAs are generated from YouTube videos, which contain labels (tags) supplied by the …
FaceDCAPTCHA: Face detection based color image CAPTCHA
With data theft and computer break-ins becoming increasingly common, there is a great
need for secondary authentication to reduce automated attacks while posing a minimal …
need for secondary authentication to reduce automated attacks while posing a minimal …
[PDF][PDF] A review of bot protection using CAPTCHA for web security
BS Saini, A Bala - IOSR Journal of Computer Engineering, 2013 - vinimaya.wordpress.com
Today several daily activities such as communication, education, E-commerce,
Entertainment and tasks are carried out by using the internet. To perform such web activities …
Entertainment and tasks are carried out by using the internet. To perform such web activities …
[图书][B] The robustness of Google CAPTCHA's
AS El Ahmad, J Yan, M Tayara - 2011 - prof-jeffyan.github.io
We report a novel attack on two CAPTCHAs that have been widely deployed on the Internet,
one being Google's home design and the other acquired by Google (ie reCAPTCHA). With a …
one being Google's home design and the other acquired by Google (ie reCAPTCHA). With a …
Automating the bypass of image-based CAPTCHA and assessing security
CAPTCHA also known as Completely Automated Public Turing test to tell Computers and
Humans Apart is implemented on many websites all round the world to control and limit the …
Humans Apart is implemented on many websites all round the world to control and limit the …