{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:55:02Z","timestamp":1773510902197,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T00:00:00Z","timestamp":1515974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,1,15]]},"DOI":"10.1145\/3270101.3270104","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T13:23:10Z","timestamp":1539696190000},"page":"85-96","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Towards Evaluating the Security of Real-World Deployed Image CAPTCHAs"],"prefix":"10.1145","author":[{"given":"Binbin","family":"Zhao","sequence":"first","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Haiqin","family":"Weng","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Shouling","family":"Ji","sequence":"additional","affiliation":[{"name":"Zhejiang University &amp; Alibaba-Zhejiang University, Hangzhou, China"}]},{"given":"Jianhai","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Ting","family":"Wang","sequence":"additional","affiliation":[{"name":"Lehigh University, Bethlehem, PA, USA"}]},{"given":"Qinming","family":"He","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Reheem","family":"Beyah","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,1,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AliAPI. https:\/\/data.aliyun.com\/ai'spm=a2c0j.9189909.810797.13. 64c6547a3VOVGD#\/image-tag  AliAPI. https:\/\/data.aliyun.com\/ai'spm=a2c0j.9189909.810797.13. 64c6547a3VOVGD#\/image-tag"},{"key":"e_1_3_2_1_2_1","unstructured":"AliOCR. https:\/\/www.aliyun.com\/product\/cdi\/  AliOCR. https:\/\/www.aliyun.com\/product\/cdi\/"},{"key":"e_1_3_2_1_3_1","unstructured":"BaiduOCR. https:\/\/cloud.baidu.com\/product\/ocr.html  BaiduOCR. https:\/\/cloud.baidu.com\/product\/ocr.html"},{"key":"e_1_3_2_1_4_1","unstructured":"Face++OCR. https:\/\/www.faceplusplus.com.cn\/general-text-recognition\/  Face++OCR. https:\/\/www.faceplusplus.com.cn\/general-text-recognition\/"},{"key":"e_1_3_2_1_5_1","unstructured":"GoogleAPI. https:\/\/cloud.google.com\/vision\/  GoogleAPI. https:\/\/cloud.google.com\/vision\/"},{"key":"e_1_3_2_1_6_1","unstructured":"GoogleOCR. https:\/\/cloud.google.com\/vision\/docs\/ocr  GoogleOCR. https:\/\/cloud.google.com\/vision\/docs\/ocr"},{"key":"e_1_3_2_1_7_1","unstructured":"MicrosoftAPI. https:\/\/azure.microsoft.com\/zh-cn\/services\/cognitive-services\/ computer-vision\/  MicrosoftAPI. https:\/\/azure.microsoft.com\/zh-cn\/services\/cognitive-services\/ computer-vision\/"},{"key":"e_1_3_2_1_8_1","unstructured":"ReLu. https:\/\/en.wikipedia.org\/wiki\/Rectifier_(neural_networks)  ReLu. https:\/\/en.wikipedia.org\/wiki\/Rectifier_(neural_networks)"},{"key":"e_1_3_2_1_9_1","unstructured":"Report. https:\/\/cloud.tencent.com\/product\/yy#featuresV2  Report. https:\/\/cloud.tencent.com\/product\/yy#featuresV2"},{"key":"e_1_3_2_1_10_1","unstructured":"Report. http:\/\/www.geetest.com\/case.html  Report. http:\/\/www.geetest.com\/case.html"},{"key":"e_1_3_2_1_11_1","unstructured":"Report. https:\/\/www.google.com\/recaptcha\/intro\/  Report. https:\/\/www.google.com\/recaptcha\/intro\/"},{"key":"e_1_3_2_1_12_1","unstructured":"Report. http:\/\/kqga.qfc.cn\/news\/d-1786.html  Report. http:\/\/kqga.qfc.cn\/news\/d-1786.html"},{"key":"e_1_3_2_1_13_1","unstructured":"Report. https:\/\/baike.baidu.com\/item\/12306%E9%AA%8C%E8%AF%81%E7%A0% 81\/16963369?fr=aladdin  Report. https:\/\/baike.baidu.com\/item\/12306%E9%AA%8C%E8%AF%81%E7%A0% 81\/16963369?fr=aladdin"},{"key":"e_1_3_2_1_14_1","unstructured":"Sigmoid. https:\/\/en.wikipedia.org\/wiki\/Sigmoid_function  Sigmoid. https:\/\/en.wikipedia.org\/wiki\/Sigmoid_function"},{"key":"e_1_3_2_1_15_1","unstructured":"Softmax. https:\/\/en.wikipedia.org\/wiki\/Softmax_function  Softmax. https:\/\/en.wikipedia.org\/wiki\/Softmax_function"},{"key":"e_1_3_2_1_16_1","unstructured":"Tanh. https:\/\/brenocon.com\/blog\/2013\/10\/ tanh-is-a-rescaled-logistic-sigmoid-function\/  Tanh. https:\/\/brenocon.com\/blog\/2013\/10\/ tanh-is-a-rescaled-logistic-sigmoid-function\/"},{"key":"e_1_3_2_1_17_1","unstructured":"TencentAPI. https:\/\/youtu.qq.com\/#\/img-content-identity  TencentAPI. https:\/\/youtu.qq.com\/#\/img-content-identity"},{"key":"e_1_3_2_1_18_1","unstructured":"TencentOCR. https:\/\/ai.qq.com\/product\/ocr.shtml#identify  TencentOCR. https:\/\/ai.qq.com\/product\/ocr.shtml#identify"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518983"},{"key":"e_1_3_2_1_21_1","volume-title":"8th USENIX Workshop on Offensive Technologies, WOOT '14","author":"Bursztein Elie","unstructured":"Elie Bursztein , Jonathan Aigrain , Angelika Moscicki , and John C. Mitchell . 2014. The End is Nigh: Generic Solving of Text-based CAPTCHAs . In 8th USENIX Workshop on Offensive Technologies, WOOT '14 , San Diego, CA, USA , August 19. Elie Bursztein, Jonathan Aigrain, Angelika Moscicki, and John C. Mitchell. 2014. The End is Nigh: Generic Solving of Text-based CAPTCHAs. In 8th USENIX Workshop on Offensive Technologies, WOOT '14, San Diego, CA, USA, August 19."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 3rd USENIX conference on Offensive technologies.","author":"Bursztein Elie","year":"2009","unstructured":"Elie Bursztein and Steven Bethard . 2009 . Decaptcha: breaking 75% of eBay audio CAPTCHAs . In Proceedings of the 3rd USENIX conference on Offensive technologies. Elie Bursztein and Steven Bethard. 2009. Decaptcha: breaking 75% of eBay audio CAPTCHAs. In Proceedings of the 3rd USENIX conference on Offensive technologies."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046724"},{"key":"e_1_3_2_1_24_1","volume-title":"NIPS 2004","author":"Chellapilla Kumar","year":"2004","unstructured":"Kumar Chellapilla and Patrice Y. Simard . 2004. Using Machine Learning to Break Visual Human Interaction Proofs (HIPs). In Advances in Neural Information Processing Systems 17 {Neural Information Processing Systems , NIPS 2004 , December 13 --18 , 2004 , Vancouver, British Columbia, Canada}. Kumar Chellapilla and Patrice Y. Simard. 2004. Using Machine Learning to Break Visual Human Interaction Proofs (HIPs). In Advances in Neural Information Processing Systems 17 {Neural Information Processing Systems, NIPS 2004, December 13--18, 2004, Vancouver, British Columbia, Canada}."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30144-8_23"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315291"},{"key":"e_1_3_2_1_27_1","volume-title":"Jiawei Li. A Simple Generic Attack on Text Captchas. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016","author":"Gao Haichang","year":"2016","unstructured":"Haichang Gao , Jeff Yan , Fang Cao , Zhengya Zhang , Lei Lei , Mengyun Tang , Ping Zhang , Xin Zhou , Xuqin Wang , and Jiawei Li. A Simple Generic Attack on Text Captchas. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016 , San Diego, California, USA, February 21--24 , 2016 . Haichang Gao, Jeff Yan, Fang Cao, Zhengya Zhang, Lei Lei, Mengyun Tang, Ping Zhang, Xin Zhou, Xuqin Wang, and Jiawei Li. A Simple Generic Attack on Text Captchas. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016, San Diego, California, USA, February 21--24, 2016."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.81"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.169"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455838"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.123"},{"key":"e_1_3_2_1_32_1","volume-title":"TRUST 2016, Vienna, Austria, August 29--30, 2016, Proceedings.","author":"Hupperich Thomas","year":"2016","unstructured":"Thomas Hupperich , Katharina Krombholz , and Thorsten Holz . 2016 . Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness. In Trust and Trustworthy Computing - 9th International Conference , TRUST 2016, Vienna, Austria, August 29--30, 2016, Proceedings. Thomas Hupperich, Katharina Krombholz, and Thorsten Holz. 2016. Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness. In Trust and Trustworthy Computing - 9th International Conference, TRUST 2016, Vienna, Austria, August 29--30, 2016, Proceedings."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISBAST.2012.17"},{"key":"e_1_3_2_1_34_1","volume-title":"AgeCAPTCHA: an Image-based CAPTCHA that Annotates Images of Human Faces with their Age Groups. TIIS","author":"Kim Jonghak","year":"2014","unstructured":"Jonghak Kim , Joonhyuk Yang , and Kwangyun Wohn . 2014. AgeCAPTCHA: an Image-based CAPTCHA that Annotates Images of Human Faces with their Age Groups. TIIS ( 2014 ). Jonghak Kim, Joonhyuk Yang, and Kwangyun Wohn. 2014. AgeCAPTCHA: an Image-based CAPTCHA that Annotates Images of Human Faces with their Age Groups. TIIS (2014)."},{"key":"e_1_3_2_1_35_1","unstructured":"Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems.   Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1989.1.4.541"},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings, Part I.","author":"Liu Wei","unstructured":"Wei Liu , Dragomir Anguelov , Dumitru Erhan , Christian Szegedy , Scott E. Reed , Cheng-Yang Fu , and Alexander C. Berg . SSD: Single Shot MultiBox Detector. In Computer Vision - ECCV 2016 - 14th European Conference, Amsterdam, The Netherlands, October 11--14, 2016 , Proceedings, Part I. Wei Liu, Dragomir Anguelov, Dumitru Erhan, Christian Szegedy, Scott E. Reed, Cheng-Yang Fu, and Alexander C. Berg. SSD: Single Shot MultiBox Detector. In Computer Vision - ECCV 2016 - 14th European Conference, Amsterdam, The Netherlands, October 11--14, 2016, Proceedings, Part I."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45204-8_16"},{"key":"e_1_3_2_1_39_1","volume-title":"8th International Conference, ICISS 2012, Guwahati, India, December 15--19, 2012. Proceedings.","author":"Lorenzi David","unstructured":"David Lorenzi , Jaideep Vaidya , Emre Uzun , Shamik Sural , and Vijayalakshmi Atluri . Attacking Image Based CAPTCHAs Using Image Recognition Techniques. In Information Systems Security , 8th International Conference, ICISS 2012, Guwahati, India, December 15--19, 2012. Proceedings. David Lorenzi, Jaideep Vaidya, Emre Uzun, Shamik Sural, and Vijayalakshmi Atluri. Attacking Image Based CAPTCHAs Using Image Recognition Techniques. In Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15--19, 2012. Proceedings."},{"key":"e_1_3_2_1_40_1","volume-title":"Misra and Kris Gaj. Face Recognition CAPTCHAs. In Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT\/ICIW 2006","author":"Deapesh","year":"2006","unstructured":"Deapesh Misra and Kris Gaj. Face Recognition CAPTCHAs. In Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT\/ICIW 2006 ), 19--25 February 2006 , Guadeloupe, French Caribbean. Deapesh Misra and Kris Gaj. Face Recognition CAPTCHAs. In Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT\/ICIW 2006), 19--25 February 2006, Guadeloupe, French Caribbean."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/1965841.1965858"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2013.77"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"e_1_3_2_1_44_1","volume-title":"IEEE European Symposium on. 388--403","author":"Sivakorn Suphannee","year":"2016","unstructured":"Suphannee Sivakorn , Iasonas Polakis , and Angelos D Keromytis . 2016 . I am robot:(deep) learning to break semantic image captchas. In Security and Privacy (EuroS&P) , IEEE European Symposium on. 388--403 . Suphannee Sivakorn, Iasonas Polakis, and Angelos D Keromytis. 2016. I am robot:(deep) learning to break semantic image captchas. In Security and Privacy (EuroS&P), IEEE European Symposium on. 388--403."},{"key":"e_1_3_2_1_45_1","volume-title":"Advanced CAPTCHA technique using Hand Gesture based on SIFT. Assistant Professor, Computer Science and Engineering Department","author":"Srinivas B","year":"2011","unstructured":"B Srinivas , G Kalyan Raju , and Koduganti Venkata Rao . 2011. Advanced CAPTCHA technique using Hand Gesture based on SIFT. Assistant Professor, Computer Science and Engineering Department , MVGR College of Engineering ( 2011 ). B Srinivas, G Kalyan Raju, and Koduganti Venkata Rao. 2011. Advanced CAPTCHA technique using Hand Gesture based on SIFT. Assistant Professor, Computer Science and Engineering Department, MVGR College of Engineering (2011)."},{"key":"e_1_3_2_1_46_1","unstructured":"Erkam Uzun Simon Pak Ho Chung Irfan Essa and Wenke Lee. rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System. (????).  Erkam Uzun Simon Pak Ho Chung Irfan Essa and Wenke Lee. rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System. (????)."},{"key":"e_1_3_2_1_47_1","volume-title":"International Conference on the Theory and Applications of Cryptographic Techniques","author":"von Ahn Luis","year":"2003","unstructured":"Luis von Ahn , Manuel Blum , Nicholas J. Hopper , and John Langford . CAPTCHA : Using Hard AI Problems for Security. In Advances in Cryptology - EUROCRYPT 2003 , International Conference on the Theory and Applications of Cryptographic Techniques , Warsaw, Poland, May 4--8 , 2003 , Proceedings. Luis von Ahn, Manuel Blum, Nicholas J. Hopper, and John Langford. CAPTCHA: Using Hard AI Problems for Security. In Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4--8, 2003, Proceedings."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/1766171.1766196"},{"key":"e_1_3_2_1_49_1","volume-title":"Learning to Associate Words and Images Using a Large-scale Graph. arXiv preprint arXiv:1705.07768","author":"Ya Heqing","year":"2017","unstructured":"Heqing Ya , Haonan Sun , Jeffrey Helt , and Tai Sing Lee . 2017. Learning to Associate Words and Images Using a Large-scale Graph. arXiv preprint arXiv:1705.07768 ( 2017 ). Heqing Ya, Haonan Sun, Jeffrey Helt, and Tai Sing Lee. 2017. Learning to Associate Words and Images Using a Large-scale Graph. arXiv preprint arXiv:1705.07768 (2017)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455839"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada","acronym":"CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3270101.3270104","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3270101.3270104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:26Z","timestamp":1750208546000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3270101.3270104"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,15]]},"references-count":49,"alternative-id":["10.1145\/3270101.3270104","10.1145\/3270101"],"URL":"https:\/\/doi.org\/10.1145\/3270101.3270104","relation":{},"subject":[],"published":{"date-parts":[[2018,1,15]]},"assertion":[{"value":"2018-01-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}