{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T11:18:20Z","timestamp":1758280700022,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,18]],"date-time":"2020-10-18T00:00:00Z","timestamp":1602979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Combat Capabilities Development Command Army Research Laboratory","award":["W911NF-04-2-0021"],"award-info":[{"award-number":["W911NF-04-2-0021"]}]},{"name":"National Science Foundation","award":["1801751"],"award-info":[{"award-number":["1801751"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,19]]},"DOI":"10.1145\/3412815.3416895","type":"proceedings-article","created":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T23:37:54Z","timestamp":1602805074000},"page":"161-170","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["StyleCAPTCHA"],"prefix":"10.1145","author":[{"given":"Haitian","family":"Chen","sequence":"first","affiliation":[{"name":"University of California, Davis, Davis, CA, USA"}]},{"given":"Bai","family":"Jiang","sequence":"additional","affiliation":[{"name":"Bytedance AI Lab, Mountain View, CA, USA"}]},{"given":"Hao","family":"Chen","sequence":"additional","affiliation":[{"name":"University of California, Davis, Davis, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,10,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"e_1_3_2_1_2_1","volume-title":"International Conference on Machine Learning, 531--540","author":"Belghazi Mohamed Ishmael","year":"2018","unstructured":"Mohamed Ishmael Belghazi , Aristide Baratin , Sai Rajeshwar , Sherjil Ozair , Yoshua Bengio , Aaron Courville , and Devon Hjelm . 2018 . Mutual information neural estimation . In International Conference on Machine Learning, 531--540 . Mohamed Ishmael Belghazi, Aristide Baratin, Sai Rajeshwar, Sherjil Ozair, Yoshua Bengio, Aaron Courville, and Devon Hjelm. 2018. Mutual information neural estimation. In International Conference on Machine Learning, 531--540."},{"key":"e_1_3_2_1_3_1","volume-title":"the 8th USENIX Workshop on Offensive Technologies.","author":"Bursztein Elie","year":"2014","unstructured":"Elie Bursztein , Jonathan Aigrain , Angelika Moscicki , and John C Mitchell . 2014 . The end is nigh: generic solving of textbased CAPTCHAs . In the 8th USENIX Workshop on Offensive Technologies. Elie Bursztein, Jonathan Aigrain, Angelika Moscicki, and John C Mitchell. 2014. The end is nigh: generic solving of textbased CAPTCHAs. In the 8th USENIX Workshop on Offensive Technologies."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046724"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46493-0_22"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3374664.3375728"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2018.5036"},{"volume-title":"ACM Conference on Multimedia, 331--334","author":"Datta Ritendra","key":"e_1_3_2_1_8_1","unstructured":"Ritendra Datta , Jia Li , and James Z. Wang . 2005. Imagination: a robust image-based CAPTCHA generation system . In ACM Conference on Multimedia, 331--334 . Ritendra Datta, Jia Li, and James Z. Wang. 2005. Imagination: a robust image-based CAPTCHA generation system. In ACM Conference on Multimedia, 331--334."},{"key":"e_1_3_2_1_9_1","volume-title":"IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 5203--5212","author":"Deng Jiankang","year":"2020","unstructured":"Jiankang Deng , Jia Guo , Zhou Yuxiang , Jinke Yu , Irene Kotsia , and Stefanos Zafeiriou . 2020 . RetinaFace: single-stage dense face localisation in the wild . In IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 5203--5212 . Jiankang Deng, Jia Guo, Zhou Yuxiang, Jinke Yu, Irene Kotsia, and Stefanos Zafeiriou. 2020. RetinaFace: single-stage dense face localisation in the wild. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 5203--5212."},{"key":"e_1_3_2_1_10_1","volume-title":"ACM Conference on Computer and Communications Security.","volume":"7","author":"Elson Jeremy","year":"2007","unstructured":"Jeremy Elson , John R Douceur , Jon Howell , and Jared Saul . 2007 . Asirra: a CAPTCHA that exploits interest-aligned manual image categorization . In ACM Conference on Computer and Communications Security. Volume 7 , 366--374. Jeremy Elson, John R Douceur, Jon Howell, and Jared Saul. 2007. Asirra: a CAPTCHA that exploits interest-aligned manual image categorization. In ACM Conference on Computer and Communications Security. Volume 7, 366--374."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.265"},{"key":"e_1_3_2_1_12_1","volume-title":"International Conference on Learning Representations.","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow , Yaroslav Bulatov , Julian Ibarz , Sacha Arnoud , and Vinay Shet . 2014 . Multi-digit number recognition from street view imagery using deep convolutional neural networks . In International Conference on Learning Representations. Ian J Goodfellow, Yaroslav Bulatov, Julian Ibarz, Sacha Arnoud, and Vinay Shet. 2014. Multi-digit number recognition from street view imagery using deep convolutional neural networks. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_13_1","unstructured":"Ian J Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative adversarial nets. In Neural Information Processing Systems 2672--2680.  Ian J Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative adversarial nets. In Neural Information Processing Systems 2672--2680."},{"key":"e_1_3_2_1_14_1","volume-title":"International Conference on Learning Representations.","author":"Goodfellow Ian J","year":"2015","unstructured":"Ian J Goodfellow , Jonathon Shlens , and Christian Szegedy . 2015 . Explaining and harnessing adversarial examples . In International Conference on Learning Representations. Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and harnessing adversarial examples. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.08.013"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.166"},{"volume-title":"Labeled faces in the wild: a database for studying face recognition in unconstrained environments. Technical report","author":"Huang Gary B","key":"e_1_3_2_1_18_1","unstructured":"Gary B Huang , Marwan Mattar , Tamara Berg , and Eric Learned- Miller . 2007. Labeled faces in the wild: a database for studying face recognition in unconstrained environments. Technical report . University of Massachusetts , Amherst. pnt mTnycspy ae ofdng to Preflight profile Sheridan2 FODS-2020, October 18--20, 2020, Seattle, WA Haitian Chen, Bai Jiang, and Hao Chen Gary B Huang, Marwan Mattar, Tamara Berg, and Eric Learned- Miller. 2007. Labeled faces in the wild: a database for studying face recognition in unconstrained environments. Technical report. University of Massachusetts, Amherst. pnt mTnycspy ae ofdng to Preflight profile Sheridan2 FODS-2020, October 18--20, 2020, Seattle, WA Haitian Chen, Bai Jiang, and Hao Chen"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.167"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01219-9_11"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46475-6_43"},{"key":"e_1_3_2_1_22_1","unstructured":"Kaggle. 2016. Dogs vs. Cats Redux Kernels Edition: distinguish images of dogs from cats. https:\/\/www.kaggle.com\/c\/ dogs-vs-cats-redux-kernels-edition.  Kaggle. 2016. Dogs vs. Cats Redux Kernels Edition: distinguish images of dogs from cats. https:\/\/www.kaggle.com\/c\/ dogs-vs-cats-redux-kernels-edition."},{"key":"e_1_3_2_1_23_1","unstructured":"Kaggle. 2013. Dogs vs. Cats: create an algorithm to distinguish dogs from cats. https:\/\/www.kaggle.com\/c\/dogs-vscats.  Kaggle. 2013. Dogs vs. Cats: create an algorithm to distinguish dogs from cats. https:\/\/www.kaggle.com\/c\/dogs-vscats."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"e_1_3_2_1_26_1","volume-title":"IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 6939--6948","author":"Khan Muhammad Haris","year":"2020","unstructured":"Muhammad Haris Khan , John McDonagh , Salman Khan , Muhammad Shahabuddin , Aditya Arora , Fahad Shahbaz Khan , Ling Shao , and Georgios Tzimiropoulos . 2020 . Animal- Web: a large-scale hierarchical dataset of annotated animal faces . In IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 6939--6948 . Muhammad Haris Khan, John McDonagh, Salman Khan, Muhammad Shahabuddin, Aditya Arora, Fahad Shahbaz Khan, Ling Shao, and Georgios Tzimiropoulos. 2020. Animal- Web: a large-scale hierarchical dataset of annotated animal faces. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 6939--6948."},{"key":"e_1_3_2_1_27_1","unstructured":"Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton. 2012. ImageNet classification with deep convolutional neural networks. In Neural Information Processing Systems 1097--1105.  Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton. 2012. ImageNet classification with deep convolutional neural networks. In Neural Information Processing Systems 1097--1105."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01554-1_6"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.740"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2004.1315140"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2008.4595271"},{"key":"e_1_3_2_1_33_1","unstructured":"Shaoqing Ren Kaiming He Ross Girshick and Jian Sun. 2015. Faster R-CNN: towards real-time object detection with region proposal networks. In Neural Information Processing Systems 91--99.  Shaoqing Ren Kaiming He Ross Girshick and Jian Sun. 2015. Faster R-CNN: towards real-time object detection with region proposal networks. In Neural Information Processing Systems 91--99."},{"key":"e_1_3_2_1_34_1","volume-title":"International Conference on Learning Representations.","author":"Simonyan Karen","year":"2015","unstructured":"Karen Simonyan and Andrew Zisserman . 2015 . Very deep convolutional networks for large-scale image recognition . In International Conference on Learning Representations. Karen Simonyan and Andrew Zisserman. 2015. Very deep convolutional networks for large-scale image recognition. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.37"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"e_1_3_2_1_37_1","volume-title":"International Conference on Learning Representations.","author":"Szegedy Christian","year":"2014","unstructured":"Christian Szegedy , Wojciech Zaremba , Ilya Sutskever , Joan Bruna , Dumitru Erhan , Ian Goodfellow , and Rob Fergus . 2014 . Intriguing properties of neural networks . In International Conference on Learning Representations. Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2014. Intriguing properties of neural networks. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_38_1","volume-title":"International Conference on Machine Learning, 6105--6114","author":"Tan Mingxing","year":"2019","unstructured":"Mingxing Tan and Quoc V Le . 2019 . EfficientNet: rethinking model scaling for convolutional neural networks . In International Conference on Machine Learning, 6105--6114 . Mingxing Tan and Quoc V Le. 2019. EfficientNet: rethinking model scaling for convolutional neural networks. In International Conference on Machine Learning, 6105--6114."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_18"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Luis Von Ahn Benjamin Maurer Colin McMillen David Abraham and Manuel Blum. 2008. reCAPTCHA: humanbased character recognition via web security measures. Science 321 5895 1465--1468.  Luis Von Ahn Benjamin Maurer Colin McMillen David Abraham and Manuel Blum. 2008. reCAPTCHA: humanbased character recognition via web security measures. Science 321 5895 1465--1468.","DOI":"10.1126\/science.1160379"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408671"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.596"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"},{"key":"e_1_3_2_1_44_1","volume-title":"IEEE International Conference on Computer Vision, 192--201","author":"Zhang Shifeng","year":"2017","unstructured":"Shifeng Zhang , Xiangyu Zhu , Zhen Lei , Hailin Shi , Xiaobo Wang , and Stan Z Li . 2017 . C . In IEEE International Conference on Computer Vision, 192--201 . Shifeng Zhang, Xiangyu Zhu, Zhen Lei, Hailin Shi, Xiaobo Wang, and Stan Z Li. 2017. C. In IEEE International Conference on Computer Vision, 192--201."}],"event":{"name":"FODS '20: ACM-IMS Foundations of Data Science Conference","acronym":"FODS '20","location":"Virtual Event USA"},"container-title":["Proceedings of the 2020 ACM-IMS on Foundations of Data Science Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412815.3416895","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3412815.3416895","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:25:02Z","timestamp":1750195502000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412815.3416895"}},"subtitle":["CAPTCHA Based on Stylized Images to Defend against Deep Networks"],"short-title":[],"issued":{"date-parts":[[2020,10,18]]},"references-count":44,"alternative-id":["10.1145\/3412815.3416895","10.1145\/3412815"],"URL":"https:\/\/doi.org\/10.1145\/3412815.3416895","relation":{},"subject":[],"published":{"date-parts":[[2020,10,18]]},"assertion":[{"value":"2020-10-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}