{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:55:02Z","timestamp":1773510902180,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2017R1D1A1B03030627"],"award-info":[{"award-number":["2017R1D1A1B03030627"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Institute for Information and Communications Technology Promotion","award":["IITP-2017-2015-0-00403"],"award-info":[{"award-number":["IITP-2017-2015-0-00403"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3201581","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"797-799","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["POSTER"],"prefix":"10.1145","author":[{"given":"William","family":"Aiken","sequence":"first","affiliation":[{"name":"Sungkyunkwan University, Suwon, Rebublic of Korea"}]},{"given":"Hyoungshick","family":"Kim","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University, Suwon, Rebublic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Kevin Bock Daven Patel George Hughey and Dave Levin . 2017. unCaptcha: a low-resource defeat of reCaptcha's audio challenge Proceedings of the 11th USENIX Workshop on Offensive Technologies.   Kevin Bock Daven Patel George Hughey and Dave Levin . 2017. unCaptcha: a low-resource defeat of reCaptcha's audio challenge Proceedings of the 11th USENIX Workshop on Offensive Technologies."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Nicholas Carlini and David Wagner . 2018. Audio adversarial examples: Targeted attacks on speech-to-text. arXiv preprint arXiv:1801.01944 (January . 2018).  Nicholas Carlini and David Wagner . 2018. Audio adversarial examples: Targeted attacks on speech-to-text. arXiv preprint arXiv:1801.01944 (January . 2018).","DOI":"10.1109\/SPW.2018.00009"},{"key":"e_1_3_2_1_3_1","unstructured":"Google . 2018 (accessed March 1 2018). Google reCAPTCHA: Tough on bots Easy on humans. https:\/\/www.google.com\/recaptcha\/intro\/android.html  Google . 2018 (accessed March 1 2018). Google reCAPTCHA: Tough on bots Easy on humans. https:\/\/www.google.com\/recaptcha\/intro\/android.html"},{"key":"e_1_3_2_1_4_1","unstructured":"Awni Hannun Carl Case Jared Casper Bryan Catanzaro Greg Diamos Erich Elsen Ryan Prenger Sanjeev Satheesh Shubho Sengupta Adam Coates and Andrew Y. Ng. . 2014. Deep Speech: Scaling up end-to-end speech recognition. arXiv preprint arXiv:1412.5567 (December . 2014).  Awni Hannun Carl Case Jared Casper Bryan Catanzaro Greg Diamos Erich Elsen Ryan Prenger Sanjeev Satheesh Shubho Sengupta Adam Coates and Andrew Y. Ng. . 2014. Deep Speech: Scaling up end-to-end speech recognition. arXiv preprint arXiv:1412.5567 (December . 2014)."},{"key":"e_1_3_2_1_5_1","unstructured":"Martin Kopp Matvej Nikl and Martin Holevn . 2017. Breaking CAPTCHAs with convolutional neural networks Proceedings of the 17th Conference on Information Technologies - Applications and Theory.  Martin Kopp Matvej Nikl and Martin Holevn . 2017. Breaking CAPTCHAs with convolutional neural networks Proceedings of the 17th Conference on Information Technologies - Applications and Theory."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Brian M. Powell Ekampreet Kalsy Gaurav Goswami Mayank Vatsa Richa Singh and Afzel Noore . 2017. Attack-Resistant aiCAPTCHA using a negative selection artificial immune system IEEE Security and Privacy Workshops.  Brian M. Powell Ekampreet Kalsy Gaurav Goswami Mayank Vatsa Richa Singh and Afzel Noore . 2017. Attack-Resistant aiCAPTCHA using a negative selection artificial immune system IEEE Security and Privacy Workshops.","DOI":"10.1109\/SPW.2017.22"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Brian M. Powell Abhishek Kumar Jatin Thapar Gaurav Goswami Mayank Vatsa Richa Singh and Afzel Noore . 2016. A multibiometrics-based CAPTCHA for improved online security IEEE 8th International Conference on Biometrics Theory Applications and Systems.  Brian M. Powell Abhishek Kumar Jatin Thapar Gaurav Goswami Mayank Vatsa Richa Singh and Afzel Noore . 2016. A multibiometrics-based CAPTCHA for improved online security IEEE 8th International Conference on Biometrics Theory Applications and Systems.","DOI":"10.1109\/BTAS.2016.7791157"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Suphannee Sivakorn Iasonas Polakis and Angelos D Keromytis . 2016. I am robot: (deep) learning to break semantic image CAPTCHAs IEEE European Symposium on Security and Privacy (EuroS&P).  Suphannee Sivakorn Iasonas Polakis and Angelos D Keromytis . 2016. I am robot: (deep) learning to break semantic image CAPTCHAs IEEE European Symposium on Security and Privacy (EuroS&P).","DOI":"10.1109\/EuroSP.2016.37"},{"key":"e_1_3_2_1_9_1","unstructured":"Christine Sket . 2017 (accessed March 8 2018). 508 Compliance: Who Needs to be Compliant? https:\/\/brailleworks.com\/508-compliance-needs-compliant\/  Christine Sket . 2017 (accessed March 8 2018). 508 Compliance: Who Needs to be Compliant? https:\/\/brailleworks.com\/508-compliance-needs-compliant\/"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","location":"Incheon Republic of Korea","acronym":"ASIA CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3201581","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3201581","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:39Z","timestamp":1750208919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3201581"}},"subtitle":["DeepCRACk: Using Deep Learning to Automatically CRack Audio CAPTCHAs"],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":9,"alternative-id":["10.1145\/3196494.3201581","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3201581","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}