{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T05:47:26Z","timestamp":1774158446127,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":4,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,5,13]],"date-time":"2013-05-13T00:00:00Z","timestamp":1368403200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,5,13]]},"DOI":"10.1145\/2487788.2487866","type":"proceedings-article","created":{"date-parts":[[2016,2,5]],"date-time":"2016-02-05T14:50:40Z","timestamp":1454683840000},"page":"159-160","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Framework for evaluation of text captchas"],"prefix":"10.1145","author":[{"given":"Achint","family":"Thomas","sequence":"first","affiliation":[{"name":"Yahoo! Inc., Sunnyvale, CA, USA"}]},{"given":"Kunal","family":"Punera","sequence":"additional","affiliation":[{"name":"RelateIQ, Palo Alto, CA, USA"}]},{"given":"Lyndon","family":"Kennedy","sequence":"additional","affiliation":[{"name":"Yahoo! Inc., Sunnyvale, CA, USA"}]},{"given":"Belle","family":"Tseng","sequence":"additional","affiliation":[{"name":"Apple Inc., Cupertino, CA, USA"}]},{"given":"Yi","family":"Chang","sequence":"additional","affiliation":[{"name":"Yahoo! Inc., Sunnyvale, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046724"},{"key":"e_1_3_2_1_2_1","first-page":"21","volume-title":"2nd Conference on Email and Anti-Spam","author":"Chellapilla K.","year":"2005","unstructured":"Chellapilla, K., Larson, K., Simard, P., and Czerwinski, M., Computers beat humans at single character recognition in reading based human interaction proofs (HIPs), 2nd Conference on Email and Anti-Spam, pp. 21--22. Citeseer, 2005."},{"key":"e_1_3_2_1_3_1","first-page":"279","volume-title":"23rd Annual Computer Security Applications Conference, 2007. ACSAC 2007","author":"Yan J.","year":"2007","unstructured":"Yan, J., and El Ahmad, A., Breaking Visual CAPTCHAs with Naive Pattern Recognition Algorithms, 23rd Annual Computer Security Applications Conference, 2007. ACSAC 2007, pp. 279--291. 2007."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455839"}],"event":{"name":"WWW '13: 22nd International World Wide Web Conference","location":"Rio de Janeiro Brazil","acronym":"WWW '13","sponsor":["CGIBR Comite Gestor da Internet no Brazil","NICBR Nucleo de Informatcao e Coordenacao do Ponto BR","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the 22nd International Conference on World Wide Web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2487788.2487866","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2487788.2487866","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T03:29:47Z","timestamp":1774150187000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2487788.2487866"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,13]]},"references-count":4,"alternative-id":["10.1145\/2487788.2487866","10.1145\/2487788"],"URL":"https:\/\/doi.org\/10.1145\/2487788.2487866","relation":{},"subject":[],"published":{"date-parts":[[2013,5,13]]},"assertion":[{"value":"2013-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}