{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:36:17Z","timestamp":1763343377657,"version":"3.45.0"},"reference-count":35,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.063862","type":"journal-article","created":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T04:23:46Z","timestamp":1747369426000},"page":"463-490","source":"Crossref","is-referenced-by-count":0,"title":["TGI-FPR: An Improved Multi-Label Password Guessing Model"],"prefix":"10.32604","volume":"84","author":[{"given":"Wei","family":"Ou","sequence":"first","affiliation":[]},{"given":"Shuai","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Mengxue","family":"Pang","sequence":"additional","affiliation":[]},{"given":"Jianqiang","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Qiuling","family":"Yue","sequence":"additional","affiliation":[]},{"given":"Wenbao","family":"Han","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1016\/j.ijhcs.2019.08.006","article-title":"The password is dead, long live the password\u2014A laboratory study on user perceptions of authentication schemes","volume":"133","author":"Zimmermann","year":"2020","journal-title":"Int J Hum-Comput Stud"},{"key":"ref2","series-title":"2014 IEEE Symposium on Security and Privacy","first-page":"689","article-title":"A study of probabilistic password models","author":"Ma"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1007\/978-3-030-58951-6_34","author":"Hranick\u00fd","year":"2020","journal-title":"Computer security\u2014ESORICS 2020"},{"key":"ref4","series-title":"2009 30th IEEE Symposium on Security and Privacy","first-page":"391","article-title":"Password cracking using probabilistic context-free grammars","author":"Weir","year":"2009"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/978-3-030-21568-2_11","author":"Hitaj","year":"2019","journal-title":"Applied cryptography and network security"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/978-3-319-94421-0_9","author":"Tirado","year":"2018","journal-title":"Future network systems and security"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1007\/978-3-319-75307-2_11","article-title":"New technologies in password cracking techniques","volume":"93","author":"Aggarwal","year":"2018","journal-title":"Cyber Secur Power Technol"},{"key":"ref8","series-title":"25th USENIX Security Symposium (USENIX Security 16)","first-page":"175","article-title":"Fast, lean, and accurate: modeling password guessability using neural networks","author":"Melicher","year":"2016"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1292","DOI":"10.1016\/j.jnca.2011.02.004","article-title":"Using one-time passwords to prevent password phishing attacks","volume":"34","author":"Huang","year":"2011","journal-title":"J Netw Comput Appl"},{"key":"ref10","series-title":"Network and Distributed System Security Symposium","article-title":"On semantic patterns of passwords and their security impact","author":"Veras","year":"2014"},{"key":"ref11","series-title":"23rd USENIX Security Symposium (USENIX Security 14)","first-page":"559","article-title":"A large-scale empirical analysis of Chinese web passwords","author":"Li","year":"2014"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"7639","DOI":"10.1109\/JIOT.2021.3138073","article-title":"Modern authentication schemes in smartphones and IoT devices: an empirical survey","volume":"9","author":"Ahvanooey","year":"2021","journal-title":"IEEE Internet Things J"},{"key":"ref13","series-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","first-page":"1242","article-title":"Targeted online password guessing: an underestimated threat","author":"Wang","year":"2016"},{"key":"ref14","series-title":"IEEE INFOCOM 2016\u2014The 35th Annual IEEE International Conference on Computer Communications","first-page":"1","article-title":"A study of personal information in human-chosen passwords and its security implications","author":"Li","year":"2016"},{"key":"ref15","first-page":"23","article-title":"The tangled web of password reuse","author":"Das","year":"2014","journal-title":"Proceedings 2014 Network and Distributed System Security Symposium"},{"key":"ref16","series-title":"32nd USENIX Security Symposium (USENIX Security 23)","first-page":"1001","article-title":"Improving real-world password guessing attacks via bi-directional transformers","author":"Xu","year":"2023"},{"key":"ref17","series-title":"32nd USENIX Security Symposium (USENIX Security 23)","first-page":"965","article-title":"Password guessing using random forest","author":"Wang","year":"2023"},{"key":"ref18","unstructured":"Oesch S, Ruoti S. That was then, this is now: a security evaluation of password generation, storage, and autofill in browser-based password managers. arXiv:1908.03296. 2019."},{"key":"ref19","series-title":"8th International Conference on Cryptography, Security and Privacy (CSP)","first-page":"38","article-title":"A trust service model adaptable to various assurance levels by linking digital IDs and certificates","author":"Hayata","year":"2024 Apr 20\u201322"},{"key":"ref20","series-title":"2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","first-page":"507","article-title":"PG-Pass: targeted online password guessing model based on pointer generator network","author":"Li","year":"2022 May 4\u20136"},{"key":"ref21","series-title":"ICASSP 2022\u20142022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","first-page":"3044","article-title":"Passtrans: an improved password reuse model based on transformer","author":"He","year":"2022 May 23\u201327"},{"key":"ref22","series-title":"2024 54th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","first-page":"429","article-title":"PagPassGPT: pattern guided password guessing via generative pretrained transformer","author":"Su","year":"2024 Jun 24\u201327"},{"key":"ref23","series-title":"2016 European Intelligence and Security Informatics Conference (EISIC)","first-page":"136","article-title":"Personal information leakage during password recovery of internet services","author":"Guri","year":"2016"},{"key":"ref24","series-title":"Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy","first-page":"196","article-title":"The next domino to fall: empirical analysis of user passwords across online services","author":"Wang","year":"2018"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3465171","article-title":"Machine learning-based cyber attacks targeting on controlled information: a survey","volume":"54","author":"Miao","year":"2021","journal-title":"ACM Comput Surv"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1109\/TDSC.2021.3129512","article-title":"Efficient quantum-resistant two-factor authentication scheme for mobile devices","volume":"20","author":"Wang","year":"2021","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref27","series-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems","first-page":"2903","article-title":"A spoonful of sugar? The impact of guidance and feedback on password-creation behavior","author":"Shay","year":"2015"},{"key":"ref28","series-title":"Eleventh Symposium on Usable Privacy and Security (SOUPS 2015)","first-page":"123","article-title":"\u201cI added \u2018!\u2019 at the end to make it secure\u201d: observing password creation in the lab","author":"Ur","year":"2015"},{"key":"ref29","series-title":"2012 IEEE Symposium on Security and Privacy","first-page":"523","article-title":"Guess again (and again and again): measuring password strength by simulating password-cracking algorithms","author":"Kelley","year":"2012"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3183341","article-title":"The password life cycle","volume":"21","author":"Stobert","year":"2018","journal-title":"ACM Trans Priv Secur"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"2776","DOI":"10.1109\/TIFS.2017.2721359","article-title":"Zipf\u2019s law in passwords","volume":"12","author":"Wang","year":"2017","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref32","series-title":"28th USENIX Security Symposium (USENIX Security 19)","first-page":"1537","article-title":"Birthday, name and bifacial-security: understanding passwords of Chinese web users","author":"Wang","year":"2019"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"4081","DOI":"10.1109\/TII.2018.2834351","article-title":"Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks","volume":"14","author":"Wang","year":"2018","journal-title":"IEEE Trans Ind Inform"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"9390","DOI":"10.1109\/TVT.2020.2971254","article-title":"Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles","volume":"69","author":"Jiang","year":"2020","journal-title":"IEEE Trans Veh Technol"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TDSC.2020.2974220","article-title":"Understanding node capture attacks in user authentication schemes for wireless sensor networks","volume":"19","author":"Wang","year":"2020","journal-title":"IEEE Trans Dependable Secure Comput"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-1\/TSP_CMC_63862\/TSP_CMC_63862.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:34:34Z","timestamp":1763343274000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n1\/61750"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":35,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.063862","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}