{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T00:31:47Z","timestamp":1769560307612,"version":"3.49.0"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T00:00:00Z","timestamp":1676332800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T00:00:00Z","timestamp":1676332800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2021YFB2012400"],"award-info":[{"award-number":["2021YFB2012400"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["HIT.NSRIF.2020098"],"award-info":[{"award-number":["HIT.NSRIF.2020098"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014103","name":"Key Technology Research and Development Program of Shandong","doi-asserted-by":"publisher","award":["2017CXGC0706"],"award-info":[{"award-number":["2017CXGC0706"]}],"id":[{"id":"10.13039\/100014103","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100017548","name":"National Defense Science and Technology Innovation Fund of the Chinese Academy of Sciences","doi-asserted-by":"publisher","award":["2017QYCX14"],"award-info":[{"award-number":["2017QYCX14"]}],"id":[{"id":"10.13039\/501100017548","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s00521-023-08262-0","type":"journal-article","created":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T11:24:53Z","timestamp":1676373893000},"page":"10751-10764","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Few-shot learning in realistic settings for text CAPTCHA recognition"],"prefix":"10.1007","volume":"35","author":[{"given":"Yao","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yuliang","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Yifan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Chuhao","family":"Jin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6997-2447","authenticated-orcid":false,"given":"Guodong","family":"Xin","sequence":"additional","affiliation":[]},{"given":"Bailing","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,14]]},"reference":[{"key":"8262_CR1","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1109\/TIFS.2019.2928622","volume":"15","author":"Y Zi","year":"2019","unstructured":"Zi Y, Gao H, Cheng Z, Liu Y (2019) An end-to-end attack on text captchas. IEEE Trans Inf Forensics Secur 15:753\u2013766","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"8262_CR2","doi-asserted-by":"crossref","unstructured":"Kim D, Sample L (2019) Search prevention with captcha against web indexing: a proof of concept. In: 2019 IEEE International conference on computational science and engineering (CSE) and IEEE international conference on embedded and ubiquitous computing (EUC), pp 219\u2013224. IEEE","DOI":"10.1109\/CSE\/EUC.2019.00049"},{"key":"8262_CR3","doi-asserted-by":"publisher","first-page":"4957","DOI":"10.1007\/s00521-021-06686-0","volume":"34","author":"M Kumar","year":"2022","unstructured":"Kumar M, Jindal MK, Kumar M (2022) Design of innovative CAPTCHA for hindi language. Neural Comput Appl 34:4957\u20134992","journal-title":"Neural Comput Appl"},{"key":"8262_CR4","doi-asserted-by":"crossref","unstructured":"Mohamed M, Sachdeva N, Georgescu M, Gao S, Saxena N, Zhang C, Kumaraguru P, Van Oorschot PC, Chen W-B (2014) A three-way investigation of a game-captcha: automated attacks, relay attacks and usability. In: Proceedings of the 9th ACM symposium on information, computer and communications security, pp 195\u2013206","DOI":"10.1145\/2590296.2590298"},{"key":"8262_CR5","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1016\/j.neucom.2019.08.109","volume":"408","author":"X Xu","year":"2020","unstructured":"Xu X, Liu L, Li B (2020) A survey of captcha technologies to distinguish between human and computer. Neurocomputing 408:292\u2013307","journal-title":"Neurocomputing"},{"issue":"10","key":"8262_CR6","doi-asserted-by":"publisher","first-page":"2010","DOI":"10.3390\/app9102010","volume":"9","author":"N Yu","year":"2019","unstructured":"Yu N, Darling K (2019) A low-cost approach to crack python captchas using AI-based chosen-plaintext attack. Appl Sci 9(10):2010","journal-title":"Appl Sci"},{"issue":"5","key":"8262_CR7","doi-asserted-by":"publisher","first-page":"5851","DOI":"10.3934\/mbe.2019292","volume":"16","author":"J Wang","year":"2019","unstructured":"Wang J, Qin JH, Xiang XY, Tan Y, Pan N (2019) Captcha recognition based on deep convolutional neural network. Math Biosci Eng 16(5):5851\u20135861","journal-title":"Math Biosci Eng"},{"key":"8262_CR8","first-page":"265","volume":"17","author":"K Chellapilla","year":"2005","unstructured":"Chellapilla K, Simard PY (2005) Using machine learning to break visual human interaction proofs (HIPs). Adv Neural Inf Process Syst 17:265\u2013272","journal-title":"Adv Neural Inf Process Syst"},{"key":"8262_CR9","unstructured":"Goodfellow IJ, Bulatov Y, Ibarz J, Arnoud S, Shet V (2013) Multi-digit number recognition from street view imagery using deep convolutional neural networks. CoRR arxiv:1312.6082"},{"key":"8262_CR10","doi-asserted-by":"crossref","unstructured":"Mansilla L, Echeveste R, Milone DH, Ferrante E (2021) Domain generalization via gradient surgery. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp 6630\u20136638","DOI":"10.1109\/ICCV48922.2021.00656"},{"key":"8262_CR11","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.neucom.2020.11.057","volume":"433","author":"C Li","year":"2021","unstructured":"Li C, Chen X, Wang H, Wang P, Zhang Y, Wang W (2021) End-to-end attack on text-based CAPTCHAs based on cycle-consistent generative adversarial network. Neurocomputing 433:223\u2013236","journal-title":"Neurocomputing"},{"key":"8262_CR12","doi-asserted-by":"crossref","unstructured":"Ye G, Tang Z, Fang D, Zhu Z, Feng Y, Xu P, Chen X, Wang Z (2018) Yet another text captcha solver: a generative adversarial network based approach. In: Proceedings of the 2018 ACM SIGSAC conference on computer and communications security, pp 332\u2013348","DOI":"10.1145\/3243734.3243754"},{"key":"8262_CR13","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. In: Advances in neural information processing systems. Red Hook, NY Curran, pp 2672\u20132680"},{"key":"8262_CR14","unstructured":"Koch G, Zemel R, Salakhutdinov R (2015) Siamese neural networks for one-shot image recognition. In: ICML Deep learning workshop, vol 2. Lille"},{"key":"8262_CR15","doi-asserted-by":"crossref","unstructured":"Ye H-J, Hu H, Zhan D-C, Sha F (2020) Few-shot learning via embedding adaptation with set-to-set functions. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 8808\u20138817","DOI":"10.1109\/CVPR42600.2020.00883"},{"issue":"3","key":"8262_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3386252","volume":"53","author":"Y Wang","year":"2020","unstructured":"Wang Y, Yao Q, Kwok JT, Ni LM (2020) Generalizing from a few examples: a survey on few-shot learning. ACM Comput Surveys (CSUR) 53(3):1\u201334","journal-title":"ACM Comput Surveys (CSUR)"},{"key":"8262_CR17","unstructured":"Cao T, Law M, Fidler S (2019) A theoretical analysis of the number of shots in few-shot learning. arXiv preprint arXiv:1909.11722"},{"key":"8262_CR18","unstructured":"Chen W-Y, Liu Y-C, Kira Z, Wang Y-CF, Huang J-B (2019) A closer look at few-shot classification. arXiv preprint arXiv:1904.04232"},{"key":"8262_CR19","unstructured":"Snell J, Swersky K, Zemel R (2017) Prototypical networks for few-shot learning. In: Guyon, I., Luxburg, U.V., Bengio, S., Wallach, H., Fergus, R., Vishwanathan, S., Garnett, R. (eds.) Advances in Neural Information Processing Systems, vol. 30. Curran Associates, Inc,. https:\/\/proceedings.neurips.cc\/paper\/2017\/file\/cb8da6767461f2812ae4290eac7cbc42-Paper.pdf"},{"key":"8262_CR20","unstructured":"Finn C, Abbeel P, Levine S (2017) Model-agnostic meta-learning for fast adaptation of deep networks. In: International conference on machine learning, pp. 1126\u20131135. PMLR"},{"key":"8262_CR21","unstructured":"Bansal A, Garg D, Gupta A, Gupta A (2008) Breaking a visual CAPTCHA: a novel approach using HMM"},{"key":"8262_CR22","doi-asserted-by":"crossref","unstructured":"Yan J, El Ahmad AS (2007) Breaking visual captchas with naive pattern recognition algorithms. In: Twenty-third annual computer security applications conference (ACSAC 2007), pp 279\u2013291. IEEE","DOI":"10.1109\/ACSAC.2007.47"},{"key":"8262_CR23","doi-asserted-by":"crossref","unstructured":"Yan J, El Ahmad AS (2008) A low-cost attack on a microsoft captcha. In: Proceedings of the 15th ACM conference on computer and communications security, pp 543\u2013554","DOI":"10.1145\/1455770.1455839"},{"issue":"7","key":"8262_CR24","doi-asserted-by":"publisher","first-page":"1671","DOI":"10.1109\/TIFS.2017.2682704","volume":"12","author":"H Gao","year":"2017","unstructured":"Gao H, Tang M, Liu Y, Zhang P, Liu X (2017) Research on the security of microsoft\u2019s two-layer captcha. IEEE Trans Inf Forensics Secur 12(7):1671\u20131685","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"sup1","key":"8262_CR25","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1080\/02564602.2018.1520152","volume":"35","author":"J Chen","year":"2018","unstructured":"Chen J, Luo X, Hu J, Ye D, Gong D (2018) An attack on hollow captcha using accurate filling and nonredundant merging. IETE Tech Rev 35(sup1):106\u2013118","journal-title":"IETE Tech Rev"},{"key":"8262_CR26","first-page":"404","volume-title":"Iberian conference on pattern recognition and image analysis","author":"DD Ferreira","year":"2019","unstructured":"Ferreira DD, Leira L, Mihaylova P, Georgieva P (2019) Breaking text-based captcha with sparse convolutional neural networks. Iberian conference on pattern recognition and image analysis. Springer, Cham, pp 404\u2013415"},{"key":"8262_CR27","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6641329","author":"Z Wang","year":"2021","unstructured":"Wang Z, Shi P (2021) Captcha recognition method based on CNN with focal loss. Complexity. https:\/\/doi.org\/10.1155\/2021\/6641329","journal-title":"Complexity"},{"key":"8262_CR28","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.ins.2020.12.063","volume":"555","author":"J Liu","year":"2021","unstructured":"Liu J, Zhang Z, Yang G (2021) Cross-class generative network for zero-shot learning. Inf Sci 555:147\u2013163","journal-title":"Inf Sci"},{"key":"8262_CR29","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.ins.2021.07.040","volume":"578","author":"Y Wang","year":"2021","unstructured":"Wang Y, Wei Y, Zhang M, Liu Y, Wang B (2021) Make complex captchas simple: a fast text captcha solver based on a small number of samples. Inf Sci 578:181\u2013194","journal-title":"Inf Sci"},{"key":"8262_CR30","doi-asserted-by":"crossref","unstructured":"Alfassy A, Karlinsky L, Aides A, Shtok J, Harary S, Feris R, Giryes R, Bronstein AM (2019) Laso: Label-set operations networks for multi-label few-shot learning. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 6548\u20136557","DOI":"10.1109\/CVPR.2019.00671"},{"key":"8262_CR31","doi-asserted-by":"crossref","unstructured":"Chu W-H, Li Y-J, Chang J-C, Wang Y-CF (2019) Spot and learn: a maximum-entropy patch sampler for few-shot image classification. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 6251\u20136260","DOI":"10.1109\/CVPR.2019.00641"},{"key":"8262_CR32","doi-asserted-by":"crossref","unstructured":"Schonfeld E, Ebrahimi S, Sinha S, Darrell T, Akata Z (2019) Generalized zero-and few-shot learning via aligned variational autoencoders. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 8247\u20138255","DOI":"10.1109\/CVPR.2019.00844"},{"key":"8262_CR33","doi-asserted-by":"crossref","unstructured":"Li A, Luo T, Lu Z, Xiang T, Wang L (2019) Large-scale few-shot learning: Knowledge transfer with class hierarchy. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 7212\u20137220","DOI":"10.1109\/CVPR.2019.00738"},{"key":"8262_CR34","unstructured":"Schwartz E, Karlinsky L, Feris R, Giryes R, Bronstein AM (2019) Baby steps towards few-shot learning with multiple semantics. arXiv preprint arXiv:1906.01905"},{"key":"8262_CR35","unstructured":"Vinyals O, Blundell C, Lillicrap T, kavukcuoglu k, Wierstra D (2016) Matching networks for one shot learning. In: Lee, D., Sugiyama, M., Luxburg, U., Guyon, I., Garnett, R. (eds.) Advances in Neural Information Processing Systems, vol 29. Curran Associates, Inc,. https:\/\/proceedings.neurips.cc\/paper\/2016\/file\/90e1357833654983612fb05e3ec9148c-Paper.pdf"},{"key":"8262_CR36","doi-asserted-by":"crossref","unstructured":"Sung F, Yang Y, Zhang L, Xiang T, Torr PH, Hospedales TM (2018) Learning to compare: relation network for few-shot learning. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1199\u20131208","DOI":"10.1109\/CVPR.2018.00131"},{"key":"8262_CR37","doi-asserted-by":"crossref","unstructured":"Lifchitz Y, Avrithis Y, Picard S, Bursuc, A (2019) Dense classification and implanting for few-shot learning. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 9258\u20139267","DOI":"10.1109\/CVPR.2019.00948"},{"key":"8262_CR38","doi-asserted-by":"crossref","unstructured":"Li W, Wang L, Xu J, Huo J, Gao Y, Luo J (2019) Revisiting local descriptor based image-to-class measure for few-shot learning. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 7260\u20137268","DOI":"10.1109\/CVPR.2019.00743"},{"key":"8262_CR39","doi-asserted-by":"publisher","first-page":"13529","DOI":"10.1007\/s00521-022-07160-1","volume":"34","author":"S Mahmud","year":"2022","unstructured":"Mahmud S, Lim KH (2022) One-step model agnostic meta-learning using two-phase switching optimization strategy. Neural Comput Appl 34:13529\u201313537","journal-title":"Neural Comput Appl"},{"key":"8262_CR40","doi-asserted-by":"crossref","unstructured":"Wertheimer D, Hariharan B (2019) Few-shot learning with localization in realistic settings. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 6558\u20136567","DOI":"10.1109\/CVPR.2019.00672"},{"key":"8262_CR41","unstructured":"Ochal M, Patacchiola M, Storkey A, Vazquez J, Wang S (2021) Few-shot learning with class imbalance. arXiv preprint arXiv:2101.02523"},{"key":"8262_CR42","unstructured":"Triantafillou E, Zhu T, Dumoulin V, Lamblin P, Evci U, Xu K, Goroshin R, Gelada C, Swersky K, Manzagol P-A, et al (2019) Meta-dataset: a dataset of datasets for learning to learn from few examples. arXiv preprint arXiv:1903.03096"},{"key":"8262_CR43","doi-asserted-by":"crossref","unstructured":"Guan J, Liu J, Sun J, Feng P, Shuai T, Wang W (2020) Meta metric learning for highly imbalanced aerial scene classification. In: ICASSP 2020-2020 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 4047\u20134051. IEEE","DOI":"10.1109\/ICASSP40776.2020.9052900"},{"key":"8262_CR44","unstructured":"Chen X, Dai H, Li Y, Gao X, Song L (2020) Learning to stop while learning to predict. In: International conference on machine learning, pp 1520\u20131530. PMLR"},{"key":"8262_CR45","first-page":"124","volume-title":"European conference on computer vision","author":"Y Guo","year":"2020","unstructured":"Guo Y, Codella NC, Karlinsky L, Codella JV, Smith JR, Saenko K, Rosing T, Feris R (2020) A broader study of cross-domain few-shot learning. European conference on computer vision. Springer, Cham, pp 124\u2013141"},{"key":"8262_CR46","unstructured":"Tseng H-Y, Lee H-Y, Huang J-B, Yang M-H (2020) Cross-domain few-shot classification via learned feature-wise transformation. arXiv preprint arXiv:2001.08735"},{"issue":"6","key":"8262_CR47","doi-asserted-by":"publisher","first-page":"4733","DOI":"10.1007\/s00521-021-06627-x","volume":"34","author":"L Sa","year":"2022","unstructured":"Sa L, Yu C, Ma X, Zhao X, Xie T (2022) Attentive fine-grained recognition for cross-domain few-shot classification. Neural Comput Appl 34(6):4733\u20134746","journal-title":"Neural Comput Appl"},{"issue":"2","key":"8262_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3378446","volume":"23","author":"G Ye","year":"2020","unstructured":"Ye G, Tang Z, Fang D, Zhu Z, Feng Y, Xu P, Chen X, Han J, Wang Z (2020) Using generative adversarial networks to break and protect text captchas. ACM Trans Privacy Secur (TOPS) 23(2):1\u201329","journal-title":"ACM Trans Privacy Secur (TOPS)"},{"key":"8262_CR49","doi-asserted-by":"crossref","unstructured":"Tian S, Xiong T (2020) A generic solver combining unsupervised learning and representation learning for breaking text-based captchas. In: Proceedings of the web conference 2020, pp 860\u2013871","DOI":"10.1145\/3366423.3380166"},{"key":"8262_CR50","doi-asserted-by":"crossref","unstructured":"Chellapilla K, Larson K, Simard PY, Czerwinski M (2005) Computers beat humans at single character recognition in reading based human interaction proofs (HIPs). In: CEAS","DOI":"10.1145\/1054972.1055070"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-08262-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-023-08262-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-08262-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,25]],"date-time":"2023-04-25T00:26:44Z","timestamp":1682382404000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-023-08262-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,14]]},"references-count":50,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["8262"],"URL":"https:\/\/doi.org\/10.1007\/s00521-023-08262-0","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,14]]},"assertion":[{"value":"8 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 February 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author declares that there is no conflict of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}