{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:22:04Z","timestamp":1775578924314,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":71,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSFC","award":["U1836207"],"award-info":[{"award-number":["U1836207"]}]},{"name":"National Key Projects of Research and Development","award":["2019YFE010495"],"award-info":[{"award-number":["2019YFE010495"]}]},{"name":"STCSM Key Projects","award":["21511101600"],"award-info":[{"award-number":["21511101600"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484743","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"5-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Chunk-Level Password Guessing: Towards Modeling Refined Password Composition Representations"],"prefix":"10.1145","author":[{"given":"Ming","family":"Xu","sequence":"first","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"given":"Chuanwang","family":"Wang","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"given":"Jitao","family":"Yu","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"given":"Junjie","family":"Zhang","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"given":"Kai","family":"Zhang","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"given":"Weili","family":"Han","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"1Password. https:\/\/1password.com\/. https:\/\/1password.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Dashlane. https:\/\/www.dashlane.com\/. https:\/\/www.dashlane.com\/."},{"key":"e_1_3_2_1_3_1","unstructured":"LastPass. https:\/\/lastpass.com\/. https:\/\/lastpass.com\/."},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/hashcat.net\/hashcat\/","author":"Hashcat Steube","year":"2009","unstructured":"Jens, Steube Hashcat. https:\/\/hashcat.net\/hashcat\/, 2009-., 2009-."},{"key":"e_1_3_2_1_5_1","volume-title":"https:\/\/www.rockyou.com\/. https:\/\/www.rockyou.com\/","year":"2009","unstructured":"Rockyou. https:\/\/www.rockyou.com\/. https:\/\/www.rockyou.com\/, 2009."},{"key":"e_1_3_2_1_6_1","unstructured":"178. https:\/\/www.178.com\/ 2011."},{"key":"e_1_3_2_1_7_1","unstructured":"CSDN. https:\/\/www.csdn.net\/. http:\/\/www.csdn.net\/company\/about.html 2011."},{"key":"e_1_3_2_1_8_1","volume-title":"https:\/\/www.neopets.com\/","year":"2011","unstructured":"Neopets. https:\/\/www.neopets.com\/, 2011."},{"key":"e_1_3_2_1_9_1","volume-title":"https:\/\/www.youku.com\/. Youku. https:\/\/www.youku.com\/","year":"2015","unstructured":"Youku. https:\/\/www.youku.com\/. Youku. https:\/\/www.youku.com\/, 2015."},{"key":"e_1_3_2_1_10_1","unstructured":"NLTK 2017. http:\/\/www.nltk.org\/_modules\/nltk\/stem\/snowball.html."},{"key":"e_1_3_2_1_11_1","unstructured":"English affix 2018. https:\/\/sites.google.com\/site\/itskys\/englsih-study\/ying-yu-zhong-chang-jian-de-qian-zhui-ji-qi-shi-yi."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00009"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699390"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34638-5_1"},{"key":"e_1_3_2_1_16_1","volume-title":"19th Annual Network and Distributed System Security Symposium, NDSS 2012","author":"Castelluccia Claude","year":"2012","unstructured":"Claude Castelluccia, Markus D\u00fc rmuth, and Daniele Perito. Adaptive password-strength meters from markov models. In 19th Annual Network and Distributed System Security Symposium, NDSS 2012, San Diego, California, USA, February 5--8, 2012. The Internet Society, 2012."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23357"},{"key":"e_1_3_2_1_18_1","volume-title":"The corpus of comtemporary american english:425 million words","author":"Davies M.","year":"1990","unstructured":"M. Davies. The corpus of comtemporary american english:425 million words, 1990-persent, 2020."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2739044"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813631"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833671"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15618-7_10"},{"key":"e_1_3_2_1_23_1","volume-title":"The Cambridge dictionary of statistics","author":"Everitt Brian","year":"2002","unstructured":"Brian Everitt. The Cambridge dictionary of statistics. Cambridge University Press, Cambridge, UK; New York, 2002."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934663"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/177910.177914"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243769"},{"key":"e_1_3_2_1_27_1","unstructured":"Grant.Jenks. Wordsegment 1.3.1:description 2018."},{"key":"e_1_3_2_1_28_1","volume-title":"On the impact of perceived vulnerability in the adoption of information systems security innovations. CoRR, abs\/1904.08229","author":"Hameed Mumtaz Abdul","year":"2019","unstructured":"Mumtaz Abdul Hameed and Nalin Asanka Gamagedara Arachchilage. On the impact of perceived vulnerability in the adoption of information systems security innovations. CoRR, abs\/1904.08229, 2019."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2568187"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3003696"},{"key":"e_1_3_2_1_31_1","volume-title":"7th USENIX Workshop on Hot Topics in Security, HotSec'12","author":"Jakobsson Markus","year":"2012","unstructured":"Markus Jakobsson and Mayank Dhiman. The benefits of understanding passwords. In Patrick Traynor, editor, 7th USENIX Workshop on Hot Topics in Security, HotSec'12, Bellevue, WA, USA, August 7, 2012. USENIX Association, 2012."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1987.1165125"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.38"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23077"},{"key":"e_1_3_2_1_35_1","unstructured":"Saranga Komanduri. Modeling the Adversary to Evaluate Password Strength with Limited Samples. PhD thesis Carnegie Mellon University 2016."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524583"},{"key":"e_1_3_2_1_37_1","first-page":"559","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Li Zhigong","year":"2014","unstructured":"Zhigong Li, Weili Han, and Wenyuan Xu. A large-scale empirical analysis of chinese web passwords. In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20--22, 2014., pages 559--574, 2014."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00070"},{"key":"e_1_3_2_1_39_1","volume-title":"Roberta: A robustly optimized BERT pretraining approach. CoRR, abs\/1907.11692","author":"Liu Yinhan","year":"2019","unstructured":"Yinhan Liu, Myle Ott, Naman Goyal, Jingfei Du, Mandar Joshi, Danqi Chen, Omer Levy, Mike Lewis, Luke Zettlemoyer, and Veselin Stoyanov. Roberta: A robustly optimized BERT pretraining approach. CoRR, abs\/1907.11692, 2019."},{"key":"e_1_3_2_1_40_1","first-page":"203","volume-title":"Better managed than memorized? studying the impact of managers on password strength and reuse","author":"Lyastani Sanam Ghorbani","year":"2018","unstructured":"Sanam Ghorbani Lyastani, Michael Schilling, Sascha Fahl, Michael Backes, and Sven Bugiel. Better managed than memorized? studying the impact of managers on password strength and reuse. In William Enck and Adrienne Porter Felt, editors, 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15--17, 2018, pages 203--220. USENIX Association, 2018."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00047"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.50"},{"key":"e_1_3_2_1_43_1","volume-title":"2017 USENIX Annual Technical Conference, USENIX ATC 2017","author":"Melicher William","year":"2017","unstructured":"William Melicher, Blase Ur, Saranga Komanduri, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. Fast, lean, and accurate: Modeling password guessability using neural networks. In 2017 USENIX Annual Technical Conference, USENIX ATC 2017, Santa Clara, CA, USA, July 12--14, 2017., 2017."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0043158"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102168"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.4630370105"},{"key":"e_1_3_2_1_47_1","volume-title":"Improving password guessing via representation learning. IACR Cryptol. ePrint Arch","author":"Pasquini Dario","year":"2019","unstructured":"Dario Pasquini, Ankit Gangwal, Giuseppe Ateniese, Massimo Bernaschi, and Mauro Conti. Improving password guessing via representation learning. IACR Cryptol. ePrint Arch., 2019:1188, 2019."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.170"},{"key":"e_1_3_2_1_49_1","volume-title":"L33t transformations","year":"2005","unstructured":"qntm. L33t transformations, 2005. https:\/\/qntm.org\/l33t."},{"key":"e_1_3_2_1_50_1","volume-title":"Language models are unsupervised multitask learners","author":"Radford Alec","year":"2018","unstructured":"Alec Radford, Jeffrey Wu, Rewon Child, David Luan, Dario Amodei, and Ilya Sutskever. Language models are unsupervised multitask learners. 2018."},{"key":"e_1_3_2_1_51_1","first-page":"317","volume-title":"Third ACM Conference on Data and Application Security and Privacy, CODASPY'13","author":"Rao Ashwini","year":"2013","unstructured":"Ashwini Rao, Birendra Jha, and Gananand Kini. Effect of grammar on security of long passwords. In Elisa Bertino, Ravi S. Sandhu, Lujo Bauer, and Jaehong Park, editors, Third ACM Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18--20, 2013, pages 317--324. ACM, 2013."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1162"},{"key":"e_1_3_2_1_53_1","first-page":"2927","volume-title":"CHI Conference on Human Factors in Computing Systems, CHI'14","author":"Shay Richard","year":"2014","unstructured":"Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti, Blase Ur, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. Can long passwords be secure and usable? In Matt Jones, Philippe A. Palanque, Albrecht Schmidt, and Tovi Grossman, editors, CHI Conference on Human Factors in Computing Systems, CHI'14, Toronto, ON, Canada - April 26 - May 01, 2014, pages 2927--2936. ACM, 2014."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21548-4_28"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417882"},{"key":"e_1_3_2_1_56_1","volume-title":"Patrick Gage Kelley, Michelle L. Mazurek, and Timothy Vidas. Poster: The art of password creation","author":"Ur Blase","year":"2013","unstructured":"Blase Ur, Saranga Kom, Richard Shay, Stephanos Matsumoto, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Patrick Gage Kelley, Michelle L. Mazurek, and Timothy Vidas. Poster: The art of password creation, 2013."},{"key":"e_1_3_2_1_57_1","first-page":"123","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS 2015","author":"Ur Blase","year":"2015","unstructured":"Blase Ur, Fumiko Noma, Jonathan Bees, Sean M. Segreti, Richard Shay, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. \"i added textquoteright!textquoteright at the end to make it secure\": Observing password creation in the lab. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), pages 123--140, Ottawa, July 2015. USENIX Association."},{"key":"e_1_3_2_1_58_1","first-page":"463","volume-title":"24th USENIX Security Symposium, USENIX Security 15","author":"Ur Blase","year":"2015","unstructured":"Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Saranga Komanduri, Darya Kurilova, Michelle L. Mazurek, William Melicher, and Richard Shay. Measuring real-world accuracies and biases in modeling password guessability. In 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12--14, 2015., pages 463--481, 2015."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23103"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2721359"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23142"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.60"},{"key":"e_1_3_2_1_63_1","first-page":"1537","volume-title":"name and bifacial-security: Understanding passwords of chinese web users","author":"Wang Ding","year":"2019","unstructured":"Ding Wang, Ping Wang, Debiao He, and Yuan Tian. Birthday, name and bifacial-security: Understanding passwords of chinese web users. In Nadia Heninger and Patrick Traynor, editors, 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14--16, 2019, pages 1537--1555. USENIX Association, 2019."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978339"},{"key":"e_1_3_2_1_65_1","volume-title":"The version of 4.1 for pcfg models","author":"Weir Matt","year":"2019","unstructured":"Matt Weir. The version of 4.1 for pcfg models, 2019. https:\/\/github.com\/lakiw\/pcfg_cracker."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.8"},{"key":"e_1_3_2_1_67_1","first-page":"157","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Wheeler Daniel Lowe","year":"2016","unstructured":"Daniel Lowe Wheeler. zxcvbn: Low-budget password strength estimation. In 25th USENIX Security Symposium (USENIX Security 16), pages 157--173, Austin, TX, 2016. USENIX Association."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/5184643"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.81"},{"key":"e_1_3_2_1_70_1","first-page":"1","volume-title":"Password advice shouldn't be boring: Visualizing password guessing attacks. In 2013 APWG eCrime Researchers Summit","author":"Zhang-Kennedy Leah","year":"2013","unstructured":"Leah Zhang-Kennedy, Sonia Chiasson, and Robert Biddle. Password advice shouldn't be boring: Visualizing password guessing attacks. In 2013 APWG eCrime Researchers Summit, pages 1--11, 2013."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1999.11518226"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484743","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484743","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:49:42Z","timestamp":1763498982000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484743"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":71,"alternative-id":["10.1145\/3460120.3484743","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484743","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}