{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:20:52Z","timestamp":1743124852673,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031649479"},{"type":"electronic","value":"9783031649486"}],"license":[{"start":{"date-parts":[[2024,10,13]],"date-time":"2024-10-13T00:00:00Z","timestamp":1728777600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,13]],"date-time":"2024-10-13T00:00:00Z","timestamp":1728777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-64948-6_9","type":"book-chapter","created":{"date-parts":[[2024,10,12]],"date-time":"2024-10-12T09:02:09Z","timestamp":1728723729000},"page":"165-184","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["VRC-GraphNet: A Graph Neural Network-Based Reasoning Framework for\u00a0Attacking Visual Reasoning Captchas"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-1481-3656","authenticated-orcid":false,"given":"Botao","family":"Xu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1197-5906","authenticated-orcid":false,"given":"Haizhou","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,13]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Bursztein, E., Bethard, S., Fabry, C., Mitchell, J.C., Jurafsky, D.: How good are humans at solving CAPTCHAs? A large scale evaluation. In: Proceedings of the 31st IEEE Symposium on Security and Privacy, pp. 399\u2013413 (2010)","DOI":"10.1109\/SP.2010.31"},{"key":"9_CR2","doi-asserted-by":"publisher","first-page":"6898617","DOI":"10.1155\/2017\/6898617","volume":"2017","author":"J Chen","year":"2017","unstructured":"Chen, J., Luo, X., Guo, Y., Zhang, Y., Gong, D.: A survey on breaking technique of text-based CAPTCHA. Secur. Commun. Netw. 2017, 6898617 (2017)","journal-title":"Secur. Commun. Netw."},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Dionysiou, A., Athanasopoulos, E.: SoK: machine vs. machine\u2013a systematic classification of automated machine learning-based CAPTCHA solvers. Comput. Secur. 97, 101947 (2020)","DOI":"10.1016\/j.cose.2020.101947"},{"key":"9_CR4","unstructured":"Elson, J., Douceur, J.R., Howell, J., Saul, J.: Asirra: a CAPTCHA that exploits interest-aligned manual image categorization. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS), pp. 366\u2013374 (2007)"},{"issue":"7","key":"9_CR5","doi-asserted-by":"publisher","first-page":"1671","DOI":"10.1109\/TIFS.2017.2682704","volume":"12","author":"H Gao","year":"2017","unstructured":"Gao, H., Tang, M., Liu, Y., Zhang, P., Liu, X.: Research on the security of Microsoft\u2019s two-layer captcha. IEEE Trans. Inf. Forensics Secur. 12(7), 1671\u20131685 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Gao, H., Wang, W., Qi, J., Wang, X., Liu, X., Yan, J.: The robustness of hollow CAPTCHAs. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer & Communications Security, pp. 1075\u20131086 (2013)","DOI":"10.1145\/2508859.2516732"},{"issue":"1","key":"9_CR7","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1049\/iet-ifs.2014.0381","volume":"10","author":"H Gao","year":"2016","unstructured":"Gao, H.: Robustness of text-based completely automated public Turing test to tell computers and humans apart. IET Inf. Secur. 10(1), 45\u201352 (2016)","journal-title":"IET Inf. Secur."},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Girshick, R.: Fast R-CNN. In: Proceedings of the 15th IEEE International Conference on Computer Vision, pp. 1440\u20131448 (2015)","DOI":"10.1109\/ICCV.2015.169"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"He, K., Gkioxari, G., Doll\u00e1r, P., Girshick, R.: Mask R-CNN. In: Proceedings of the 16th IEEE International Conference on Computer Vision, pp. 2961\u20132969 (2017)","DOI":"10.1109\/ICCV.2017.322"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the 27th IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Hu, J., Shen, L., Sun, G.: Squeeze-and-excitation networks. In: Proceedings of the 29th IEEE Conference on Computer Vision and Pattern Recognition, pp. 7132\u20137141 (2018)","DOI":"10.1109\/CVPR.2018.00745"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Hu, R., Rohrbach, A., Darrell, T., Saenko, K.: Language-conditioned graph networks for relational reasoning. In: Proceedings of the 17th IEEE International Conference on Computer Vision, pp. 10294\u201310303 (2019)","DOI":"10.1109\/ICCV.2019.01039"},{"key":"9_CR13","unstructured":"Hudson, D.A., Manning, C.D.: Compositional attention networks for machine reasoning. arXiv preprint arXiv:1803.03067 (2018)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Johnson, J., et al.: Inferring and executing programs for visual reasoning. In: Proceedings of the 16th IEEE International Conference on Computer Vision, pp. 2989\u20132998 (2017)","DOI":"10.1109\/ICCV.2017.325"},{"key":"9_CR15","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.neucom.2020.11.057","volume":"443","author":"C Li","year":"2021","unstructured":"Li, C., Chen, X., Wang, H., Zhang, Y.: End-to-end attack on text-based CAPTCHAs based on cycle-consistent generative adversarial network. Neurocomputing 443, 223\u2013236 (2021)","journal-title":"Neurocomputing"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Li, L., Gan, Z., Cheng, Y., Liu, J.: Relation-aware graph attention network for visual question answering. In: Proceedings of the 17th IEEE International Conference on Computer Vision, pp. 10313\u201310322 (2019)","DOI":"10.1109\/ICCV.2019.01041"},{"key":"9_CR17","unstructured":"Li, Y., Tarlow, D., Brockschmidt, M., Zemel, R.: Gated graph sequence neural networks. arXiv preprint arXiv:1511.05493 (2015)"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Meutzner, H., Gupta, S., Kolossa, D.: Constructing secure audio captchas by exploiting differences between humans and machines. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 2335\u20132338 (2015)","DOI":"10.1145\/2702123.2702127"},{"key":"9_CR19","unstructured":"Norcliffe-Brown, W., Vafeias, S., Parisot, S.: Learning conditioned graph structures for interpretable visual question answering. In: Advances in Neural Information Processing Systems, vol. 31 (2018)"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Perez, E., Strub, F., De\u00a0Vries, H., Dumoulin, V., Courville, A.: Film: visual reasoning with a general conditioning layer. In: Proceedings of the 32nd AAAI Conference on Artificial Intelligence, no.\u00a01 (2018)","DOI":"10.1609\/aaai.v32i1.11671"},{"issue":"11","key":"9_CR21","doi-asserted-by":"publisher","first-page":"2298","DOI":"10.1109\/TPAMI.2016.2646371","volume":"39","author":"B Shi","year":"2016","unstructured":"Shi, B., Bai, X., Yao, C.: An end-to-end trainable neural network for image-based sequence recognition and its application to scene text recognition. IEEE Trans. Pattern Anal. Mach. Intell. 39(11), 2298\u20132304 (2016)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Shi, J., Zhang, H., Li, J.: Explainable and explicit visual reasoning over scene graphs. In: Proceedings of the 30th IEEE Conference on Computer Vision and Pattern Recognition, pp. 8376\u20138384 (2019)","DOI":"10.1109\/CVPR.2019.00857"},{"issue":"10","key":"9_CR23","doi-asserted-by":"publisher","first-page":"2522","DOI":"10.1109\/TIFS.2018.2821096","volume":"13","author":"M Tang","year":"2018","unstructured":"Tang, M., Gao, H., Zhang, Y., Liu, Y., Zhang, P., Wang, P.: Research on deep learning techniques in breaking text-based captchas and designing image-based captcha. IEEE Trans. Inf. Forensics Secur. 13(10), 2522\u20132537 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"9_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/3-540-39200-9_18","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2003","author":"L von Ahn","year":"2003","unstructured":"von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: using hard AI problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 294\u2013311. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-39200-9_18"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Wang, H., Zheng, F., Chen, Z., Lu, Y., Gao, J., Wei, R.: A captcha design based on visual reasoning. In: Proceedings of the 44th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1967\u20131971 (2018)","DOI":"10.1109\/ICASSP.2018.8461764"},{"issue":"9","key":"9_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3559754","volume":"55","author":"P Wang","year":"2023","unstructured":"Wang, P., Gao, H., Guo, X., Xiao, C., Qi, F., Yan, Z.: An experimental investigation of text-based CAPTCHA attacks and their robustness. ACM Comput. Surv. 55(9), 1\u201338 (2023)","journal-title":"ACM Comput. Surv."},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Wang, P., Gao, H., Xiao, C., Guo, X., Gao, Y., Zi, Y.: Extended research on the security of visual reasoning CAPTCHA. IEEE Trans. Dependable Secure Comput. (2023)","DOI":"10.1109\/TDSC.2023.3238408"},{"key":"9_CR28","unstructured":"Yi, K., Wu, J., Gan, C., Torralba, A., Kohli, P., Tenenbaum, J.: Neural-symbolic VQA: disentangling reasoning from vision and language understanding. In: Advances in Neural Information Processing Systems, vol. 31 (2018)"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Gao, H., Pei, G., Luo, S., Chang, G., Cheng, N.: A survey of research on captcha designing and breaking techniques. In: Proceedings of the 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/13th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE), pp. 75\u201384 (2019)","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00020"},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Zhao, B., et al.: Towards evaluating the security of real-world deployed image captchas. In: Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, pp. 85\u201396 (2018)","DOI":"10.1145\/3270101.3270104"},{"key":"9_CR31","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1109\/TIFS.2019.2928622","volume":"15","author":"Y Zi","year":"2019","unstructured":"Zi, Y., Gao, H., Cheng, Z., Liu, Y.: An end-to-end attack on text captchas. IEEE Trans. Inf. Forensics Secur. 15, 753\u2013766 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-64948-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,12]],"date-time":"2024-10-12T09:06:35Z","timestamp":1728723995000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-64948-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,13]]},"ISBN":["9783031649479","9783031649486"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-64948-6_9","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2024,10,13]]},"assertion":[{"value":"13 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hong Kong","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/securecomm.eai-conferences.org\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"180","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}