{"id":"https://openalex.org/W4405271224","doi":"https://doi.org/10.1109/cvmi61877.2024.10782603","title":"Unleashing Password Potential: VAEs vs GANs in a Password Guessing Duel","display_name":"Unleashing Password Potential: VAEs vs GANs in a Password Guessing Duel","publication_year":2024,"publication_date":"2024-10-19","ids":{"openalex":"https://openalex.org/W4405271224","doi":"https://doi.org/10.1109/cvmi61877.2024.10782603"},"language":"en","primary_location":{"id":"doi:10.1109/cvmi61877.2024.10782603","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cvmi61877.2024.10782603","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Computer Vision and Machine Intelligence (CVMI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115395212","display_name":"Siddhant Salve","orcid":null},"institutions":[{"id":"https://openalex.org/I9747756","display_name":"Atal Bihari Vajpayee Indian Institute of Information Technology and Management","ror":"https://ror.org/008b3ap06","country_code":"IN","type":"education","lineage":["https://openalex.org/I9747756"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Siddhant Salve","raw_affiliation_strings":["ABV-IIITM,Dept. of Computer Science and Engg.,Gwalior,India"],"affiliations":[{"raw_affiliation_string":"ABV-IIITM,Dept. of Computer Science and Engg.,Gwalior,India","institution_ids":["https://openalex.org/I9747756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030289462","display_name":"Narinder Singh Punn","orcid":"https://orcid.org/0000-0003-1175-1865"},"institutions":[{"id":"https://openalex.org/I9747756","display_name":"Atal Bihari Vajpayee Indian Institute of Information Technology and Management","ror":"https://ror.org/008b3ap06","country_code":"IN","type":"education","lineage":["https://openalex.org/I9747756"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Narinder Singh Punn","raw_affiliation_strings":["ABV-IIITM,Dept. of Computer Science and Engg.,Gwalior,India"],"affiliations":[{"raw_affiliation_string":"ABV-IIITM,Dept. of Computer Science and Engg.,Gwalior,India","institution_ids":["https://openalex.org/I9747756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041626929","display_name":"Deepak Kumar Dewangan","orcid":"https://orcid.org/0000-0002-0160-4215"},"institutions":[{"id":"https://openalex.org/I9747756","display_name":"Atal Bihari Vajpayee Indian Institute of Information Technology and Management","ror":"https://ror.org/008b3ap06","country_code":"IN","type":"education","lineage":["https://openalex.org/I9747756"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Deepak Kumar Dewangan","raw_affiliation_strings":["ABV-IIITM,Dept. of Computer Science and Engg.,Gwalior,India"],"affiliations":[{"raw_affiliation_string":"ABV-IIITM,Dept. of Computer Science and Engg.,Gwalior,India","institution_ids":["https://openalex.org/I9747756"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102732684","display_name":"Sonali Agarwal","orcid":"https://orcid.org/0000-0002-3753-428X"},"institutions":[{"id":"https://openalex.org/I26072440","display_name":"Indian Institute of Information Technology Allahabad","ror":"https://ror.org/03rgjt374","country_code":"IN","type":"education","lineage":["https://openalex.org/I26072440"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sonali Agarwal","raw_affiliation_strings":["IIIT Allahabad,Dept. of Information Technology,Prayagraj,India"],"affiliations":[{"raw_affiliation_string":"IIIT Allahabad,Dept. of Information Technology,Prayagraj,India","institution_ids":["https://openalex.org/I26072440"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5115395212"],"corresponding_institution_ids":["https://openalex.org/I9747756"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.3570617,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9786999821662903,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9786999821662903,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9085999727249146,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.9089428186416626},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7230742573738098},{"id":"https://openalex.org/keywords/password-strength","display_name":"Password strength","score":0.5859565734863281},{"id":"https://openalex.org/keywords/s/key","display_name":"S/KEY","score":0.5059239268302917},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47879156470298767},{"id":"https://openalex.org/keywords/zero-knowledge-password-proof","display_name":"Zero-knowledge password proof","score":0.4704049229621887},{"id":"https://openalex.org/keywords/password-cracking","display_name":"Password cracking","score":0.46164339780807495},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.38894325494766235}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.9089428186416626},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7230742573738098},{"id":"https://openalex.org/C70530487","wikidata":"https://www.wikidata.org/wiki/Q1990841","display_name":"Password strength","level":4,"score":0.5859565734863281},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.5059239268302917},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47879156470298767},{"id":"https://openalex.org/C188615804","wikidata":"https://www.wikidata.org/wiki/Q8069448","display_name":"Zero-knowledge password proof","level":5,"score":0.4704049229621887},{"id":"https://openalex.org/C3847113","wikidata":"https://www.wikidata.org/wiki/Q2746524","display_name":"Password cracking","level":5,"score":0.46164339780807495},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.38894325494766235}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cvmi61877.2024.10782603","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cvmi61877.2024.10782603","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Computer Vision and Machine Intelligence (CVMI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W821002660","https://openalex.org/W1487941708","https://openalex.org/W2000638898","https://openalex.org/W2002093701","https://openalex.org/W2004882387","https://openalex.org/W2007488200","https://openalex.org/W2025768430","https://openalex.org/W2085186713","https://openalex.org/W2086553822","https://openalex.org/W2113606819","https://openalex.org/W2135359429","https://openalex.org/W2145889472","https://openalex.org/W2149031026","https://openalex.org/W2503779953","https://openalex.org/W2810490284","https://openalex.org/W2921353139","https://openalex.org/W2963532563","https://openalex.org/W2967860338","https://openalex.org/W3096831136","https://openalex.org/W3204690507","https://openalex.org/W4211042938","https://openalex.org/W4226129006","https://openalex.org/W4381548007","https://openalex.org/W4390742037","https://openalex.org/W4390937897","https://openalex.org/W4396927180","https://openalex.org/W6679061810","https://openalex.org/W6680067488","https://openalex.org/W6719406283","https://openalex.org/W6735913928","https://openalex.org/W6851054131"],"related_works":["https://openalex.org/W313857503","https://openalex.org/W4328027822","https://openalex.org/W1990594668","https://openalex.org/W4299928509","https://openalex.org/W2063867724","https://openalex.org/W2953105088","https://openalex.org/W1970072309","https://openalex.org/W2611520932","https://openalex.org/W2793662593","https://openalex.org/W2969720675"],"abstract_inverted_index":{"Insecure":[0],"passwords":[1,56,99],"remain":[2],"a":[3,42,68],"persistent":[4],"vulnerability":[5],"in":[6,64,100],"cybersecurity.":[7],"This":[8],"study":[9,92],"investigates":[10],"the":[11,30,59,72,83,91,94,133,142,151,159],"potential":[12,143],"of":[13,32,44,71,76,87,96,123,144,154,161],"employing":[14],"Variational":[15],"Autoencoders":[16],"(VAEs)":[17],"and":[18,61,74,85,110,127,146,158],"Generative":[19],"Adversarial":[20],"Networks":[21],"(GANs)":[22],"as":[23],"tools":[24],"for":[25],"generating":[26],"synthetic":[27,78,98],"passwords,":[28,47,79],"with":[29,136],"aim":[31],"enhancing":[33],"existing":[34],"password":[35,101,124],"cracking":[36,102],"methodologies.":[37],"These":[38],"models,":[39],"trained":[40],"on":[41,51],"dataset":[43],"leaked":[45],"RockYou":[46],"are":[48],"evaluated":[49],"based":[50],"their":[52,105],"capacity":[53],"to":[54,107,119,131,150],"produce":[55],"that":[57],"replicate":[58],"complexity":[60],"diversity":[62],"observed":[63],"real-world":[65],"passwords.":[66,113,138],"Through":[67],"thorough":[69],"assessment":[70],"quality":[73],"characteristics":[75],"these":[77],"this":[80,116],"research":[81,117],"reveals":[82],"strengths":[84],"weaknesses":[86],"each":[88],"model.":[89],"Additionally,":[90],"examines":[93],"effectiveness":[95],"utilizing":[97],"endeavors,":[103],"comparing":[104],"performance":[106],"established":[108],"methods":[109],"actual":[111],"breached":[112],"In":[114],"conclusion,":[115],"seeks":[118],"deepen":[120],"our":[121,129],"comprehension":[122],"creation":[125],"patterns":[126],"fortify":[128],"ability":[130],"counter":[132],"risks":[134],"associated":[135],"weak":[137],"By":[139],"delving":[140],"into":[141],"VAEs":[145],"GANs,":[147],"we":[148],"contribute":[149],"ongoing":[152],"pursuit":[153],"robust":[155],"cybersecurity":[156],"measures":[157],"safeguarding":[160],"sensitive":[162],"information.":[163]},"counts_by_year":[],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
