{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:51:09Z","timestamp":1771519869350,"version":"3.50.1"},"reference-count":10,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2018]]},"DOI":"10.1587\/transinf.2017edl8175","type":"journal-article","created":{"date-parts":[[2018,1,31]],"date-time":"2018-01-31T22:33:22Z","timestamp":1517438002000},"page":"543-546","source":"Crossref","is-referenced-by-count":23,"title":["CAPTCHA Image Generation Systems Using Generative Adversarial Networks"],"prefix":"10.1587","volume":"E101.D","author":[{"given":"Hyun","family":"KWON","sequence":"first","affiliation":[{"name":"School of Computing, Korea Advanced Institute of Science and Technology"}]},{"given":"Yongchul","family":"KIM","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, North Carolina State University"}]},{"given":"Hyunsoo","family":"YOON","sequence":"additional","affiliation":[{"name":"School of Computing, Korea Advanced Institute of Science and Technology"}]},{"given":"Daeseon","family":"CHOI","sequence":"additional","affiliation":[{"name":"Dept. of Medical Information, Kongju National University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] L. Von Ahn, M. Blum, N.J. Hopper, and J. Langford, \u201cCAPTCHA: Using hard AI problems for security,\u201d International Conference on the Theory and Applications of Cryptographic Techniques, Lecture Notes in Computer Science, vol.2656, pp.294-311, Springer, 2003. 10.1007\/3-540-39200-9_18","DOI":"10.1007\/3-540-39200-9_18"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] G. Moy, N. Jones, C. Harkless, and R. Potter, \u201cDistortion estimation techniques in solving visual CAPTCHAs,\u201d Proc. 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, CVPR 2004, pp.23-28, 2004. 10.1109\/cvpr.2004.1315140","DOI":"10.1109\/CVPR.2004.1315140"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] A. Hindle, M.W. Godfrey, and R.C. Holt, \u201cReverse engineering CAPTCHAs,\u201d 15th Working Conference on Reverse Engineering, WCRE&apos;08, pp.59-68, 2008. 10.1109\/wcre.2008.35","DOI":"10.1109\/WCRE.2008.35"},{"key":"4","unstructured":"[4] E. Bursztein, J. Aigrain, A. Moscicki, and J.C. Mitchell, \u201cThe end is nigh: Generic solving of text-based captchas,\u201d WOOT, 2014."},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] B. Biggio, I. Corona, D. Maiorca, B. Nelson, N. \u0160rndi\u0107, P. Laskov, G. Giacinto, and F. Roli, \u201cEvasion attacks against machine learning at test time,\u201d Joint European Conference on Machine Learning and Knowledge Discovery in Databases, Lecture Notes in Computer Science, vol.8190, pp.387-402, Springer, 2013. 10.1007\/978-3-642-40994-3_25","DOI":"10.1007\/978-3-642-40994-3_25"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] N. Papernot, P. McDaniel, S. Jha, M. Fredrikson, Z.B. Celik, and A. Swami, \u201cThe limitations of deep learning in adversarial settings,\u201d 2016 IEEE European Symposium on Security and Privacy (EuroS&amp;P), pp.372-387, 2016. 10.1109\/eurosp.2016.36","DOI":"10.1109\/EuroSP.2016.36"},{"key":"7","unstructured":"[7] I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio, \u201cGenerative adversarial nets,\u201d Advances in Neural Information Processing Systems, pp.2672-2680, 2014."},{"key":"8","unstructured":"[8] A. Radford, L. Metz, and S. Chintala, \u201cUnsupervised representation learning with deep convolutional generative adversarial networks,\u201d arXiv preprint arXiv:1511.06434, 2015."},{"key":"9","unstructured":"[9] \u201cGSA captcha breaker,\u201d GSA-Softwareentwicklung und Analytik GmbH, Available: https:\/\/captcha-breaker.gsa-online.de\/, 2017."},{"key":"10","unstructured":"[10] M. Abadi, A. Agarwal, P. Barham, E. Brevdo, Z. Chen, C. Citro, G.S. Corrado, A. Davis, J. Dean, M. Devin, et al., \u201cTensorflow: Large-scale machine learning on heterogeneous distributed systems,\u201d arXiv preprint arXiv:1603.04467, 2016."}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E101.D\/2\/E101.D_2017EDL8175\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T10:53:12Z","timestamp":1751280792000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E101.D\/2\/E101.D_2017EDL8175\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":10,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2017edl8175","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}