{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:23:54Z","timestamp":1769747034257,"version":"3.49.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/icc.2018.8422243","type":"proceedings-article","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T22:51:41Z","timestamp":1534805501000},"page":"1-6","source":"Crossref","is-referenced-by-count":30,"title":["GENPass: A General Deep Learning Model for Password Guessing with PCFG Rules and Adversarial Generation"],"prefix":"10.1109","author":[{"given":"Yunyu","family":"Liu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhiyang","family":"Xia","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ping","family":"Yi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yao","family":"Yao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tiantian","family":"Xie","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ting","family":"Zhu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref33","year":"0","journal-title":"MySpace"},{"key":"ref32","year":"0","journal-title":"TensorFlow&#x2122;"},{"key":"ref31","first-page":"34","author":"mackay","year":"2003","journal-title":"Information Theory Inference and Learning Algorithms"},{"key":"ref30","volume":"8 7","author":"stuart","year":"1994","journal-title":"Kendall's Advanced Theory of Statistics Volume IDistribution Theory"},{"key":"ref36","year":"0","journal-title":"Linkedln"},{"key":"ref35","year":"0","journal-title":"RockYou"},{"key":"ref34","year":"0","journal-title":"Phpbb"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1016\/j.jnca.2015.04.015","article-title":"Puppet Attack: A Denial of Service Attack in Advanced Metering Infrastructure Network","volume":"59","author":"yi","year":"2016","journal-title":"Journal of Network and Computer Applications"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SARNOF.2006.4534795"},{"key":"ref12","first-page":"269","article-title":"An Intrusion Prevention Mechanism in Mobile Ad Hoc Networks","volume":"17","author":"yi","year":"2013","journal-title":"Ad Hoc & Sensor Wireless Networks"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2167354"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883456"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503580"},{"key":"ref16","article-title":"Gait-Based Wi-Fi Signatures for Privacy-Preserving","author":"li","year":"2016","journal-title":"the 2016 ACM Symposium on InformAtion Computer and Communications Security"},{"key":"ref17","first-page":"4101","article-title":"Cross-layer Detection for Black Hole Attack in Wireless Network","volume":"8","author":"yi","year":"2012","journal-title":"Journal of Computational Information Systems"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2011.6102307"},{"key":"ref19","first-page":"40","article-title":"Intrusion Detection for Wireless Mesh Networks using Finite State Machine","volume":"7","author":"yi","year":"2010","journal-title":"China Communications"},{"key":"ref28","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"International Conference on Neural Information Processing Systems"},{"key":"ref4","author":"peslyak","year":"0","journal-title":"John the Ripper"},{"key":"ref27","article-title":"Generating Sequences With Recurrent Neural Networks","author":"graves","year":"2013","journal-title":"Computer Science"},{"key":"ref3","author":"steube","year":"0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.8"},{"key":"ref29","article-title":"Character-level convolutional networks for text classification","author":"xiang","year":"2015","journal-title":"Advances in neural information processing systems"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.50"},{"key":"ref8","article-title":"Fast, lean and accurate: Modeling password guessability using neural networks","author":"melicher","year":"2016","journal-title":"Proceedings of USENIX Security"},{"key":"ref7","author":"lipton","year":"2015","journal-title":"A critical review of recurrent neural networks for sequence learning"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"484","DOI":"10.1038\/nature16961","article-title":"Mastering the game of Go with deep neural networks and tree search","volume":"529","author":"silver","year":"2016","journal-title":"Nature"},{"key":"ref9","author":"hitaj","year":"2017","journal-title":"PassGAN A Deep Learning Approach for Password Guessing"},{"key":"ref1","first-page":"436","article-title":"Deep learning","volume":"521 7553","author":"yann","year":"2015","journal-title":"Nature"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.4103\/0256-4602.58969"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"851","DOI":"10.1016\/S1004-4132(08)60163-2","article-title":"Distributed Intrusion Detection for mobile ad hoc networks","volume":"19","author":"yi","year":"2008","journal-title":"Journal of Systems Engineering and Electronics"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1109\/GLOCOM.2006.270","article-title":"A Secure Quality of Service Routing Protocol for Wireless Ad Hoc Networks","author":"zhu","year":"2006","journal-title":"IEEE Globecom 2006"},{"key":"ref24","first-page":"559","article-title":"A Large-Scale Empirical Analysis of Chinese Web Passwords","author":"li","year":"2014","journal-title":"Usenix Security"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102168"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524583"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978339"}],"event":{"name":"2018 IEEE International Conference on Communications (ICC 2018)","location":"Kansas City, MO","start":{"date-parts":[[2018,5,20]]},"end":{"date-parts":[[2018,5,24]]}},"container-title":["2018 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8411665\/8422068\/08422243.pdf?arnumber=8422243","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T03:25:38Z","timestamp":1598239538000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8422243\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/icc.2018.8422243","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}