{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T20:07:19Z","timestamp":1778789239233,"version":"3.51.4"},"reference-count":61,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61571290"],"award-info":[{"award-number":["61571290"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61831007"],"award-info":[{"award-number":["61831007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61431008"],"award-info":[{"award-number":["61431008"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013290","name":"National Key Research and Development Program of China Stem Cell and Translational Research","doi-asserted-by":"publisher","award":["2017YFB0802900"],"award-info":[{"award-number":["2017YFB0802900"]}],"id":[{"id":"10.13039\/501100013290","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013290","name":"National Key Research and Development Program of China Stem Cell and Translational Research","doi-asserted-by":"publisher","award":["2018YFB0803503"],"award-info":[{"award-number":["2018YFB0803503"]}],"id":[{"id":"10.13039\/501100013290","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013290","name":"National Key Research and Development Program of China Stem Cell and Translational Research","doi-asserted-by":"publisher","award":["2017YFB0802300"],"award-info":[{"award-number":["2017YFB0802300"]}],"id":[{"id":"10.13039\/501100013290","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Zhejiang","award":["U1509219"],"award-info":[{"award-number":["U1509219"]}]},{"DOI":"10.13039\/501100010868","name":"Ministry of Public Security of the People's Republic of China","doi-asserted-by":"publisher","award":["C18611"],"award-info":[{"award-number":["C18611"]}],"id":[{"id":"10.13039\/501100010868","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1539047"],"award-info":[{"award-number":["CNS-1539047"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1652669"],"award-info":[{"award-number":["CNS-1652669"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Multimedia"],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1109\/tmm.2019.2940877","type":"journal-article","created":{"date-parts":[[2019,9,11]],"date-time":"2019-09-11T19:47:15Z","timestamp":1568231235000},"page":"1323-1332","source":"Crossref","is-referenced-by-count":32,"title":["GENPass: A Multi-Source Deep Learning Model for Password Guessing"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4708-8260","authenticated-orcid":false,"given":"Zhiyang","family":"Xia","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4530-5118","authenticated-orcid":false,"given":"Ping","family":"Yi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1539-7050","authenticated-orcid":false,"given":"Yunyu","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bo","family":"Jiang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ting","family":"Zhu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","first-page":"295","article-title":"Let's go in for a closer look: Observing passwords in their natural habitat.","author":"sarah","year":"0","journal-title":"Proc ACM SIGSAC Conf Comput Commun Secur"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524583"},{"key":"ref33","year":"0"},{"key":"ref32","first-page":"723","article-title":"Security improvement of WPA 2 (Wi-Fi Protected Access 2)","volume":"3","author":"sakib","year":"2011","journal-title":"Int J Eng Sci Technol"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/WICOM.2010.5601275"},{"key":"ref30","author":"percival","year":"2016"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978339"},{"key":"ref36","first-page":"559","article-title":"A large-scale empirical analysis of chinese web passwords","author":"li","year":"0","journal-title":"Proc USENIX Security07"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102168"},{"key":"ref34","year":"0"},{"key":"ref60","first-page":"1","article-title":"Robustness analysis on electric vehicle energy distribution networks","author":"lin","year":"0","journal-title":"in Proc IEEE Power Energy Soc Gen Meeting"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364483"},{"key":"ref28","first-page":"164","article-title":"Detecting adversarial examples in deep neural networks using normalizing filters","author":"shuangchi","year":"0","journal-title":"Proc 3rd Int Conf Agents Artif Intell"},{"key":"ref27","first-page":"1","article-title":"Web phishing detection using a deep learning framework","volume":"3","author":"ping","year":"2018","journal-title":"Wireless Commun Mobile Comput"},{"key":"ref29","first-page":"1","article-title":"Detection for pulmonary nodules using RGB channel superposition method in deep learning framework","author":"yishuang","year":"0","journal-title":"Proc 3rd Int Conf Secur Smart Cities Ind Control Syst Commun"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1038\/nature16961"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"yann","year":"2015","journal-title":"Nature"},{"key":"ref20","first-page":"1029","article-title":"A denial of service attack in advanced metering infrastructure network","author":"ping","year":"0","journal-title":"Proc IEEE Int Conf Commun"},{"key":"ref22","first-page":"4101","article-title":"Cross-layer detection for black hole attack in wireless network","volume":"8","author":"ping","year":"2012","journal-title":"J Comput Inf Syst"},{"key":"ref21","first-page":"3037","article-title":"Green firewall: An energy-efficient intrusion prevention mechanism in wireless sensor network","author":"ping","year":"0","journal-title":"Proc IEEE Global Commun Conf"},{"key":"ref24","first-page":"40","article-title":"Intrusion detection for wireless mesh networks using finite state machine","volume":"7","author":"ping","year":"2010","journal-title":"China Commun"},{"key":"ref23","first-page":"107","article-title":"Towards an artificial immune systems in detection of anomalies in wireless mesh networks","volume":"8","author":"ping","year":"2011","journal-title":"China Commun"},{"key":"ref26","first-page":"143","article-title":"A secure energy routing mechanism for sharing renewable energy in smart microgrid","author":"ting","year":"0","journal-title":"Proc IEEE Int Conf Smart Grid Commun"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"6","DOI":"10.4103\/0256-4602.58969","article-title":"A survey on security in wireless mesh networks","volume":"27","author":"ping","year":"2010","journal-title":"IETE Tech Rev"},{"key":"ref50","author":"stuart","year":"1994","journal-title":"Kendall s Advanced Theory of Statistics Vol 1 Distribution Theory"},{"key":"ref51","first-page":"34","author":"mackay","year":"2003","journal-title":"Information Theory Inference and Learning Algorithms"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2013.43"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996576"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2019.00363"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2549269"},{"key":"ref55","year":"0"},{"key":"ref54","year":"0"},{"key":"ref53","year":"0"},{"key":"ref52","year":"0"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.50"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.8"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2577031"},{"key":"ref12","article-title":"A critical review of recurrent neural networks for sequence learning","author":"lipton","year":"0"},{"key":"ref13","first-page":"175","article-title":"Fast, lean and accurate: Modeling password guessability using neural networks","author":"melicher","year":"0","journal-title":"Proc Usenix Secur Symp"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21568-2_11"},{"key":"ref15","article-title":"CCID: Cross-Correlation identity distinction method for detecting shrew DDoS","volume":"2019","author":"cheng","year":"2019","journal-title":"Wireless Commun Mobile Comput"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1016\/j.jnca.2015.04.015","article-title":"Puppet attack: A denial of service attack in advanced metering infrastructure network","volume":"59","author":"ping","year":"2016","journal-title":"J Netw Comput Appl"},{"key":"ref17","first-page":"269","article-title":"An intrusion prevention mechanism in mobile ad hoc networks","volume":"17","author":"ping","year":"2013","journal-title":"Ad Hoc Sensor Wireless Netw"},{"key":"ref18","first-page":"107","article-title":"Towards an artificial immune systems in detection of anomalies in wireless MESH networks","volume":"8","author":"ping","year":"2011","journal-title":"China Commun"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"809","DOI":"10.1109\/TSG.2011.2167354","article-title":"Security framework for wireless communications in smart distribution grid","volume":"2","author":"xudong","year":"2011","journal-title":"IEEE Trans Smart Grid"},{"key":"ref4","year":"0"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.150"},{"key":"ref6","year":"0"},{"key":"ref5","year":"0"},{"key":"ref8","year":"0"},{"key":"ref7","year":"0"},{"key":"ref49","first-page":"649","article-title":"Character-level convolutional networks for text classification","author":"xiang","year":"0","journal-title":"in Proc Adv Neural Inf Process Syst"},{"key":"ref9","year":"0"},{"key":"ref46","article-title":"Generating text via adversarial training","author":"zhang","year":"0","journal-title":"Proc Conf Neural Inf Process Syst Workshop Adversarial Training"},{"key":"ref45","first-page":"4006","article-title":"Adversarial feature matching for text generation","author":"zhang","year":"0","journal-title":"Proc 34th Int Conf Mach Learn"},{"key":"ref48","first-page":"3320","article-title":"How transferable are features in deep neural networks?","author":"yosinski","year":"0","journal-title":"Proc Int Conf Neural Inf Process"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"ref42","article-title":"Generating sequences with recurrent neural networks","author":"graves","year":"0"},{"key":"ref41","article-title":"Recurrent neural network regularization","author":"zaremba","year":"2014"},{"key":"ref44","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"0","journal-title":"Proc Int Conf Neural Inf Process"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"}],"container-title":["IEEE Transactions on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6046\/9076751\/8832180-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6046\/9076751\/08832180.pdf?arnumber=8832180","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:50:21Z","timestamp":1649443821000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8832180\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":61,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tmm.2019.2940877","relation":{},"ISSN":["1520-9210","1941-0077"],"issn-type":[{"value":"1520-9210","type":"print"},{"value":"1941-0077","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5]]}}}