{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T06:20:26Z","timestamp":1764570026290,"version":"3.46.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031944444"},{"type":"electronic","value":"9783031944451"}],"license":[{"start":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T00:00:00Z","timestamp":1757030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T00:00:00Z","timestamp":1757030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-94445-1_15","type":"book-chapter","created":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T17:14:08Z","timestamp":1757006048000},"page":"272-291","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SPC-GAN-Attack: Attacking Slide Puzzle CAPTCHAs by\u00a0Human-Like Sliding Trajectories Based on\u00a0Generative Adversarial Network"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-1397-0983","authenticated-orcid":false,"given":"Rui","family":"Guo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-7074-9104","authenticated-orcid":false,"given":"Ke","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-1686-6515","authenticated-orcid":false,"given":"Enbo","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-1200-5523","authenticated-orcid":false,"given":"Qianqian","family":"Qiao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-0127-5211","authenticated-orcid":false,"given":"Zhenyu","family":"Mao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1197-5906","authenticated-orcid":false,"given":"Haizhou","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,5]]},"reference":[{"issue":"2","key":"15_CR1","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/966389.966390","volume":"47","author":"L von Ahn","year":"2004","unstructured":"von Ahn, L., Blum, M., Langford, J.: Telling humans and computers apart automatically. Commun. ACM 47(2), 56\u201360 (2004)","journal-title":"Commun. ACM"},{"issue":"10","key":"15_CR2","doi-asserted-by":"publisher","first-page":"2522","DOI":"10.1109\/TIFS.2018.2821096","volume":"13","author":"M Tang","year":"2018","unstructured":"Tang, M., Gao, H., Zhang, Y., Liu, Y., Zhang, P., Wang, P.: Research on deep learning techniques in breaking text-based captchas and designing image-based captcha. IEEE Trans. Inf. Forensics Secur. 13(10), 2522\u20132537 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"7","key":"15_CR3","doi-asserted-by":"publisher","first-page":"1671","DOI":"10.1109\/TIFS.2017.2682704","volume":"12","author":"H Gao","year":"2017","unstructured":"Gao, H., Tang, M., Liu, Y., Zhang, P., Liu, X.: Research on the security of Microsoft\u2019s two-layer captcha. IEEE Trans. Inf. Forensics Secur. 12(7), 1671\u20131685 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"13","key":"15_CR4","doi-asserted-by":"publisher","first-page":"4583","DOI":"10.1007\/s11042-013-1823-z","volume":"74","author":"Q Li","year":"2015","unstructured":"Li, Q.: A computer vision attack on the ARTiFACIAL CAPTCHA. Multimedia Tools Appl. 74(13), 4583\u20134597 (2015)","journal-title":"Multimedia Tools Appl."},{"key":"15_CR5","first-page":"103711","volume":"81","author":"G Chang","year":"2024","unstructured":"Chang, G., et al.: The robustness of behavior-verification-based slider CAPTCHAs. J. Inf. Secur. Appl. 81, 103711 (2024)","journal-title":"J. Inf. Secur. Appl."},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Hern\u00e1ndez-Castro, C.J., R-Moreno, M.D., Barrero, D.F.: Using JPEG to measure image continuity and break capy and other puzzle CAPTCHAs. IEEE Internet Comput. 19(6), 46\u201353 (2015)","DOI":"10.1109\/MIC.2015.127"},{"issue":"2","key":"15_CR7","doi-asserted-by":"publisher","first-page":"118","DOI":"10.26599\/BDMA.2019.9020001","volume":"2","author":"H Weng","year":"2019","unstructured":"Weng, H., et al.: Towards understanding the security of modern image captchas and underground captcha-solving services. Big Data Min. Anal. 2(2), 118\u2013144 (2019)","journal-title":"Big Data Min. Anal."},{"issue":"3","key":"15_CR8","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/JPROC.2023.3238524","volume":"111","author":"Z Zou","year":"2023","unstructured":"Zou, Z., Chen, K., Shi, Z., Guo, Y., Ye, J.: Object detection in 20 years: a survey. Proc. IEEE 111(3), 257\u2013276 (2023)","journal-title":"Proc. IEEE"},{"issue":"6","key":"15_CR9","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1109\/TPAMI.2016.2577031","volume":"39","author":"S Ren","year":"2017","unstructured":"Ren, S., He, K., Girshick, R., Sun, J.: Faster R-CNN: towards real-time object detection with region proposal networks. IEEE Trans. Pattern Anal. Mach. Intell. 39(6), 1137\u20131149 (2017)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"2","key":"15_CR10","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1109\/TPAMI.2018.2858826","volume":"42","author":"T-Y Lin","year":"2020","unstructured":"Lin, T.-Y., Goyal, P., Girshick, R., He, K., Doll\u00e1r, P.: Focal loss for dense object detection. IEEE Trans. Pattern Anal. Mach. Intell. 42(2), 318\u2013327 (2020)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"4","key":"15_CR11","doi-asserted-by":"publisher","first-page":"3313","DOI":"10.1109\/TKDE.2021.3130191","volume":"35","author":"J Gui","year":"2023","unstructured":"Gui, J., Sun, Z., Wen, Y., Tao, D., Ye, J.: A review on generative adversarial networks: algorithms, theory, and applications. IEEE Trans. Knowl. Data Eng. 35(4), 3313\u20133332 (2023)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"6","key":"15_CR12","first-page":"2953","volume":"18","author":"P Wang","year":"2021","unstructured":"Wang, P., Gao, H., Rao, Q., Luo, S., Yuan, Z., Shi, Z.: A security analysis of captchas with large character sets. IEEE Trans. Dependable Secure Comput. 18(6), 2953\u20132968 (2021)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Li, C., Chen, X., Wang, H., Zhang, Y.: End-to-end attack on text-based CAPTCHAs based on cycle-consistent generative adversarial network. Neurocomputing 433, 223\u2013236 (2021)","DOI":"10.1016\/j.neucom.2020.11.057"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Gao, H., Wang, W., Qi, J., Wang, X., Liu, X., Yan, J.: The robustness of hollow CAPTCHAs. In: Proceeding of the 20th ACM SIGSAC Conference on Computer and Communications Security (CCS 2013), Berlin, Germany, Novermber 4\u20138, pp. 1075\u20131086 (2013)","DOI":"10.1145\/2508859.2516732"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Gao, H., Lei, L., Zhou, X., Li, J., Liu, X.: The robustness of face-based CAPTCHAs. In: Proceeding of 15th IEEE International Conference on Computer and Information Technology (CIT 2015), Livepool, UK, October 26\u201328, pp. 2248\u20132255 (2015)","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.332"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Golle, P.: Machine learning attacks against the asirra CAPTCHA. In: Proceeding of 15th ACM Conference on Computer and Communications Security (CCS 2008), Alexandria, Virginia, USA, October 27\u201331, pp. 535\u2013542 (2008)","DOI":"10.1145\/1455770.1455838"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Sivakorn, S., Polakis, I., Keromytis, A.D.: I am robot: (deep) learning to break semantic image CAPTCHAs. In: Proceeding of 1st IEEE European Symposium on Security and Privacy (EuroS and P 2016), Saarbruecken, Germany, March 21\u201324, pp. 388\u2013403 (2016)","DOI":"10.1109\/EuroSP.2016.37"},{"key":"15_CR18","unstructured":"Lin, R., Huang, S.Y., Bell, G.B., Lee, Y.K.: A new CAPTCHA interface design for mobile devices. In: Proceeding of 12th Australasian User Interface Conference (AUIC 2011), Perth, Australia, January 17\u201320, pp. 3\u20138 (2011)"},{"key":"15_CR19","doi-asserted-by":"publisher","unstructured":"Wu, D., Qiu, J., Huang, H., Yin, L., Gu, Z., Tian, Z.: Resnet-based slide puzzle captcha automatic response system. In: Sun, X., Wang, J., Bertino, E. (eds.) ICAIS 2020. CCIS, vol. 1254, pp. 140\u2013153. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-8101-4_14","DOI":"10.1007\/978-981-15-8101-4_14"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"He, K., Gkioxari, G., Doll\u00e1r, P., Girshick, R.: Mask R-CNN. In: Proceeding of 16th IEEE International Conference on Computer Vision (ICCV 2017), Venice, Italy, October 22\u201329, pp. 2980\u20132988 (2017)","DOI":"10.1109\/ICCV.2017.322"},{"key":"15_CR21","doi-asserted-by":"publisher","unstructured":"Liu, W., et al.: SSD: single shot multibox detector. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9905, pp. 21\u201337. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46448-0_2","DOI":"10.1007\/978-3-319-46448-0_2"},{"key":"15_CR22","doi-asserted-by":"publisher","unstructured":"Carion, N., Massa, F., Synnaeve, G., Usunier, N., Kirillov, A., Zagoruyko, S.: End-to-end object detection with transformers. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12346, pp. 213\u2013229. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58452-8_13","DOI":"10.1007\/978-3-030-58452-8_13"},{"key":"15_CR23","unstructured":"Goodfellow, I.J., et al.: Generative adversarial nets. In: Proceeding of 27th International Conference on Neural Information Processing Systems (NIPS 2014), Montreal, Canada, December 8\u201313, pp. 2672\u20132680 (2014)"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Zhao, B., et al.: Towards evaluating the security of real-world deployed image CAPTCHAs. In: Proceeding of 11th ACM Workshop on Artificial Intelligence and Security (AISec 2018), Toronto, Canada, October 15\u201319, pp. 85\u201396 (2018)","DOI":"10.1145\/3270101.3270104"},{"key":"15_CR25","doi-asserted-by":"publisher","unstructured":"Chellapilla, K., Larson, K., Simard, P.Y., Czerwinski, M.: Building segmentation based human-friendly human interaction proofs (HIPs). In: Baird, H.S., Lopresti, D.P. (eds.) HIP 2005. LNCS, vol. 3517, pp. 1\u201326. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11427896_1","DOI":"10.1007\/11427896_1"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Basulto-Lantsova, A., Padilla-Medina, J.A., Perez-Pinal, F.J., Barranco-Gutierrez, A.I.: Performance comparative of OpenCV template matching method on jetson TX2 and jetson nano developer kits. In: Proceeding of 10th Annual Computing and Communication Workshop and Conference (CCWC 2020), Las Vegas, NV, USA, January 6\u20138, pp. 812\u2013816 (2020)","DOI":"10.1109\/CCWC47524.2020.9031166"},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Rahamneh, S., Sawalha, L.: Efficient OpenCL accelerators for canny edge detection algorithm on a CPU-FPGA platform. In: Proceeding of 14th International Conference on ReConFigurable Computing and FPGAs (ReConFig 2019), Cancun, Mexico, December 9\u201311, pp. 1\u20135 (2019)","DOI":"10.1109\/ReConFig48160.2019.8994769"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-94445-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T06:16:45Z","timestamp":1764569805000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-94445-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,5]]},"ISBN":["9783031944444","9783031944451"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-94445-1_15","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2025,9,5]]},"assertion":[{"value":"5 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/securecomm.eai-conferences.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}