{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T16:35:25Z","timestamp":1773678925339,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1109\/icit.2017.7915494","type":"proceedings-article","created":{"date-parts":[[2017,5,13]],"date-time":"2017-05-13T02:23:01Z","timestamp":1494642181000},"page":"980-985","source":"Crossref","is-referenced-by-count":21,"title":["Combining convolutional neural network and self-adaptive algorithm to defeat synthetic multi-digit text-based CAPTCHA"],"prefix":"10.1109","author":[{"given":"Ye","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yuanjiang","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Wu","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Zhi","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Debin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Mi","family":"Lu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/72.554195"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1007\/3-540-39200-9_18","article-title":"Captcha: Using hard ai problems for security","author":"von ahn","year":"2003","journal-title":"Advances in Cryptology&#x2014;EUROCRYPT 2003"},{"key":"ref12","first-page":"1","article-title":"A survey and analysis of current captcha approaches","volume":"12","author":"roshanbin","year":"2013","journal-title":"Journal of Web Engineering"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455839"},{"key":"ref14","article-title":"A projection-based segmentation algorithm for breaking msn and yahoo captchas","author":"huang","year":"2008","journal-title":"Proc Int Conf Sig Image Eng"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1007\/978-3-642-35795-4_53","article-title":"An efficient ellipse-shaped blobs detection algorithm for breaking facebook captcha","author":"liu","year":"2013","journal-title":"Trustworthy Computing and Services"},{"key":"ref16","author":"stearns","year":"1995","journal-title":"Method for 2-d affine transformation of images"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1117\/12.587811","article-title":"Scattertype: a reading captcha resistant to segmentation attack","author":"baird","year":"2005","journal-title":"Electronic Imaging 2005 International Society for Optics and Photonics"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1006\/gmip.1993.1040"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.7763\/IJMLC.2012.V2.137"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2007.902329"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2012.28"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-009-0341-5"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2016.7474839"},{"key":"ref8","first-page":"15","article-title":"Fast template matching","volume":"95","author":"lewis","year":"1995","journal-title":"Vision Interface"},{"key":"ref7","first-page":"629","article-title":"An overview of the tesseract ocr engine","author":"smith","year":"2007","journal-title":"ICDAR"},{"key":"ref2","first-page":"1","article-title":"Building segmentation based human-friendly human interaction proofs (hips)","author":"chellapilla","year":"2005","journal-title":"Human Interactive Proofs"},{"key":"ref9","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046724"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1577802.1577804"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref21","author":"goodfellow","year":"2013","journal-title":"Multi-digit number recognition from street view imagery using deep convolutional neural networks"},{"key":"ref24","author":"jaderberg","year":"2014","journal-title":"Synthetic data and artificial neural networks for natural scene text recognition"},{"key":"ref23","first-page":"1","article-title":"Learning representations by back-propagating errors","volume":"5","author":"rumelhart","year":"1988","journal-title":"Cognitive Modeling"},{"key":"ref25","author":"hinton","year":"2012","journal-title":"Improving Neural Networks by Preventing Co-adaptation of Feature Detectors"}],"event":{"name":"2017 IEEE International Conference on Industrial Technology (ICIT)","location":"Toronto, ON","start":{"date-parts":[[2017,3,22]]},"end":{"date-parts":[[2017,3,25]]}},"container-title":["2017 IEEE International Conference on Industrial Technology (ICIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7907563\/7912587\/07915494.pdf?arnumber=7915494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T15:54:04Z","timestamp":1569340444000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7915494\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icit.2017.7915494","relation":{},"subject":[],"published":{"date-parts":[[2017,3]]}}}