{"id":"https://openalex.org/W2977343768","doi":"https://doi.org/10.1109/iccchina.2019.8855847","title":"A Neural Attack Model for Cracking Passwords in Adversarial Environments","display_name":"A Neural Attack Model for Cracking Passwords in Adversarial Environments","publication_year":2019,"publication_date":"2019-08-01","ids":{"openalex":"https://openalex.org/W2977343768","doi":"https://doi.org/10.1109/iccchina.2019.8855847","mag":"2977343768"},"language":"en","primary_location":{"id":"doi:10.1109/iccchina.2019.8855847","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccchina.2019.8855847","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE/CIC International Conference on Communications in China (ICCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065487736","display_name":"Yushuo Guan","orcid":"https://orcid.org/0000-0001-5258-2397"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yushuo Guan","raw_affiliation_strings":["Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020022791","display_name":"Yuanxing Zhang","orcid":"https://orcid.org/0000-0003-1460-8124"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanxing Zhang","raw_affiliation_strings":["Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100443798","display_name":"Lin Chen","orcid":"https://orcid.org/0000-0003-2352-2226"},"institutions":[{"id":"https://openalex.org/I32971472","display_name":"Yale University","ror":"https://ror.org/03v76x132","country_code":"US","type":"education","lineage":["https://openalex.org/I32971472"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lin Chen","raw_affiliation_strings":["Yale University, USA"],"affiliations":[{"raw_affiliation_string":"Yale University, USA","institution_ids":["https://openalex.org/I32971472"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064314482","display_name":"Kaigui Bian","orcid":null},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kaigui Bian","raw_affiliation_strings":["Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5065487736"],"corresponding_institution_ids":["https://openalex.org/I20231570"],"apc_list":null,"apc_paid":null,"fwci":0.3391,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.6879284,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"abs 1406 2661","issue":null,"first_page":"183","last_page":"188"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.9286113381385803},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7817894220352173},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6935533881187439},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.6408520936965942},{"id":"https://openalex.org/keywords/s/key","display_name":"S/KEY","score":0.6199573874473572},{"id":"https://openalex.org/keywords/password-cracking","display_name":"Password cracking","score":0.5992572903633118},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4904138743877411},{"id":"https://openalex.org/keywords/cognitive-password","display_name":"Cognitive password","score":0.4903903007507324},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.4768596589565277},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.46612122654914856},{"id":"https://openalex.org/keywords/notice","display_name":"Notice","score":0.42577847838401794},{"id":"https://openalex.org/keywords/password-strength","display_name":"Password strength","score":0.42015111446380615},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4187038838863373},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1947493553161621}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.9286113381385803},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7817894220352173},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6935533881187439},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.6408520936965942},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.6199573874473572},{"id":"https://openalex.org/C3847113","wikidata":"https://www.wikidata.org/wiki/Q2746524","display_name":"Password cracking","level":5,"score":0.5992572903633118},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4904138743877411},{"id":"https://openalex.org/C23875713","wikidata":"https://www.wikidata.org/wiki/Q5141232","display_name":"Cognitive password","level":5,"score":0.4903903007507324},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.4768596589565277},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.46612122654914856},{"id":"https://openalex.org/C2779913896","wikidata":"https://www.wikidata.org/wiki/Q7063001","display_name":"Notice","level":2,"score":0.42577847838401794},{"id":"https://openalex.org/C70530487","wikidata":"https://www.wikidata.org/wiki/Q1990841","display_name":"Password strength","level":4,"score":0.42015111446380615},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4187038838863373},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1947493553161621},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccchina.2019.8855847","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccchina.2019.8855847","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE/CIC International Conference on Communications in China (ICCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1482972535","https://openalex.org/W1710476689","https://openalex.org/W1817409002","https://openalex.org/W1968034188","https://openalex.org/W1988115241","https://openalex.org/W1990935444","https://openalex.org/W2002072414","https://openalex.org/W2021647714","https://openalex.org/W2064675550","https://openalex.org/W2092127673","https://openalex.org/W2108525321","https://openalex.org/W2112767991","https://openalex.org/W2115042198","https://openalex.org/W2126453598","https://openalex.org/W2155873597","https://openalex.org/W2163605009","https://openalex.org/W2190659946","https://openalex.org/W2194187530","https://openalex.org/W2343052201","https://openalex.org/W2463456957","https://openalex.org/W2532350646","https://openalex.org/W2610908153","https://openalex.org/W2741095865","https://openalex.org/W2766662839","https://openalex.org/W2767105570","https://openalex.org/W2806715823","https://openalex.org/W2809576682","https://openalex.org/W2898050070","https://openalex.org/W2899771611","https://openalex.org/W2963532563","https://openalex.org/W2964018263","https://openalex.org/W4243599615","https://openalex.org/W4298289240","https://openalex.org/W4321320097","https://openalex.org/W6628788447","https://openalex.org/W6637568146","https://openalex.org/W6638338228","https://openalex.org/W6684191040","https://openalex.org/W6719406283","https://openalex.org/W6743626266"],"related_works":["https://openalex.org/W2969720675","https://openalex.org/W2021087413","https://openalex.org/W2953105088","https://openalex.org/W2793662593","https://openalex.org/W2400890210","https://openalex.org/W2182949018","https://openalex.org/W2596766976","https://openalex.org/W2017283799","https://openalex.org/W85711018","https://openalex.org/W4361801999"],"abstract_inverted_index":{"In":[0,69],"many":[1],"scenarios,":[2],"one":[3],"has":[4],"to":[5,55,95],"enter":[6],"her":[7],"text":[8],"or":[9],"graphical":[10],"password":[11,27,44,74,132,160],"in":[12,35,66,76,81,131,134,161],"a":[13,32,36,101,109,114,142,154],"public":[14,67],"area,":[15],"such":[16,77],"as":[17,50],"unlocking":[18],"the":[19,22,26,40,43,96,121,148,159],"smartphone":[20],"on":[21,147],"street,":[23],"and":[24,89,113],"entering":[25],"when":[28,158],"she":[29],"pays":[30],"with":[31],"debit":[33],"card":[34],"shopping":[37],"mall.":[38],"However,":[39],"environment":[41],"where":[42],"is":[45,52,93,163],"entered":[46],"may":[47],"be":[48],"adversarial":[49,79],"it":[51],"almost":[53],"impossible":[54],"prevent":[56],"adversaries":[57],"from":[58],"premeditated":[59],"installation":[60],"of":[61,108,127],"surveillance":[62],"and/or":[63],"eavesdropping":[64],"equipment":[65],"areas.":[68],"this":[70],"work,":[71],"we":[72],"investigate":[73],"security":[75,166],"extreme":[78],"environments":[80],"which":[82,106],"every":[83],"single":[84],"interaction":[85],"between":[86],"humans":[87],"(provers)":[88],"input":[90],"terminals":[91],"(verifiers)":[92],"transparent":[94],"attacker.":[97],"We":[98,139],"first":[99],"present":[100],"neural":[102,122],"network-based":[103],"attack":[104,149],"model,":[105],"consists":[107],"feature":[110],"extraction":[111],"model":[112,123],"prediction":[115,133],"model.":[116,150],"Experimental":[117],"results":[118],"show":[119],"that":[120],"attains":[124],"an":[125],"accuracy":[126],"more":[128],"than":[129],"80%":[130],"three":[135],"real-world":[136],"authentication":[137],"systems.":[138],"also":[140],"propose":[141],"risk":[143],"alert":[144],"system":[145],"based":[146],"It":[151],"can":[152],"issue":[153],"timely":[155],"warning":[156],"notice":[157],"use":[162],"at":[164],"high":[165],"risk.":[167]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
