{"id":"https://openalex.org/W2913039382","doi":"https://doi.org/10.1109/iccnc.2019.8685560","title":"Verification Code Recognition Based on Active and Deep Learning","display_name":"Verification Code Recognition Based on Active and Deep Learning","publication_year":2019,"publication_date":"2019-02-01","ids":{"openalex":"https://openalex.org/W2913039382","doi":"https://doi.org/10.1109/iccnc.2019.8685560","mag":"2913039382"},"language":"en","primary_location":{"id":"doi:10.1109/iccnc.2019.8685560","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccnc.2019.8685560","pdf_url":null,"source":{"id":"https://openalex.org/S4306498526","display_name":"2019 International Conference on Computing, Networking and Communications (ICNC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Computing, Networking and Communications (ICNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100341934","display_name":"Dongliang Xu","orcid":"https://orcid.org/0000-0002-6908-253X"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dongliang Xu","raw_affiliation_strings":["School of Computer Science and Technology, Shandong University, Weihai, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Shandong University, Weihai, P.R. China","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017871129","display_name":"Bailing Wang","orcid":"https://orcid.org/0000-0003-2973-8036"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bailing Wang","raw_affiliation_strings":["School of Computer Science and Teclmology, Harbin Institute of Technology, Weihai, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Teclmology, Harbin Institute of Technology, Weihai, P.R. China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060514022","display_name":"Xiaojiang Du","orcid":"https://orcid.org/0000-0003-4235-9671"},"institutions":[{"id":"https://openalex.org/I84392919","display_name":"Temple University","ror":"https://ror.org/00kx1jb78","country_code":"US","type":"education","lineage":["https://openalex.org/I84392919"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"XiaoJiang Du","raw_affiliation_strings":["Department of Computer and Information Sciences, Temple University, Philadelphia, PA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, Temple University, Philadelphia, PA, USA","institution_ids":["https://openalex.org/I84392919"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100671245","display_name":"Xiaoyan Zhu","orcid":"https://orcid.org/0000-0003-3741-9158"},"institutions":[{"id":"https://openalex.org/I4210141776","display_name":"China XD Group (China)","ror":"https://ror.org/04ceqst84","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210141776"]},{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyan Zhu","raw_affiliation_strings":["Computer information center, Xidian University, Xi&#x2019;an, P.R. China","Computer information center, Xidian University, Xi'an, P.R. China"],"affiliations":[{"raw_affiliation_string":"Computer information center, Xidian University, Xi&#x2019;an, P.R. China","institution_ids":["https://openalex.org/I149594827","https://openalex.org/I4210141776"]},{"raw_affiliation_string":"Computer information center, Xidian University, Xi'an, P.R. China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090064722","display_name":"Zhitao Guan","orcid":"https://orcid.org/0000-0003-0901-8621"},"institutions":[{"id":"https://openalex.org/I153473198","display_name":"North China Electric Power University","ror":"https://ror.org/04qr5t414","country_code":"CN","type":"education","lineage":["https://openalex.org/I153473198"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"zhitao Guan","raw_affiliation_strings":["School of Control and Computer Engineering, North China Electric Power University, Beijing, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Control and Computer Engineering, North China Electric Power University, Beijing, P.R. China","institution_ids":["https://openalex.org/I153473198"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100695163","display_name":"Xiaoyan Yu","orcid":"https://orcid.org/0000-0003-0351-8393"},"institutions":[{"id":"https://openalex.org/I96852419","display_name":"Capital Normal University","ror":"https://ror.org/005edt527","country_code":"CN","type":"education","lineage":["https://openalex.org/I96852419"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyan Yu","raw_affiliation_strings":["Dept. of Computer Science and Technology, Capital Normal University, Beijing, P.R. China"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Technology, Capital Normal University, Beijing, P.R. China","institution_ids":["https://openalex.org/I96852419"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100424755","display_name":"Jingyu Liu","orcid":"https://orcid.org/0000-0003-2332-5062"},"institutions":[{"id":"https://openalex.org/I4210123583","display_name":"Weihai Municipal Hospital","ror":"https://ror.org/03vpa9q11","country_code":"CN","type":"healthcare","lineage":["https://openalex.org/I4210123583"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingyu Liu","raw_affiliation_strings":["Computer information center, Intermediate People&#x2019;s Court, Weihai, P.R. China","Computer information center, Intermediate People's Court, Weihai, P.R. China"],"affiliations":[{"raw_affiliation_string":"Computer information center, Intermediate People&#x2019;s Court, Weihai, P.R. China","institution_ids":["https://openalex.org/I4210123583"]},{"raw_affiliation_string":"Computer information center, Intermediate People's Court, Weihai, P.R. China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100341934"],"corresponding_institution_ids":["https://openalex.org/I154099455"],"apc_list":null,"apc_paid":null,"fwci":0.2624,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.58131962,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"453","last_page":"456"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8450437188148499},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.7641031742095947},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6591262221336365},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5757859945297241},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5745826959609985},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5598799586296082},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5320894122123718},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5245347619056702},{"id":"https://openalex.org/keywords/training-set","display_name":"Training set","score":0.508517861366272},{"id":"https://openalex.org/keywords/test-data","display_name":"Test data","score":0.4583345055580139},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4324434697628021},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.38401663303375244},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.367573082447052},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.10068869590759277}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8450437188148499},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.7641031742095947},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6591262221336365},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5757859945297241},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5745826959609985},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5598799586296082},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5320894122123718},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5245347619056702},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.508517861366272},{"id":"https://openalex.org/C16910744","wikidata":"https://www.wikidata.org/wiki/Q7705759","display_name":"Test data","level":2,"score":0.4583345055580139},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4324434697628021},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.38401663303375244},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.367573082447052},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.10068869590759277},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccnc.2019.8685560","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccnc.2019.8685560","pdf_url":null,"source":{"id":"https://openalex.org/S4306498526","display_name":"2019 International Conference on Computing, Networking and Communications (ICNC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Computing, Networking and Communications (ICNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W70975097","https://openalex.org/W1603565383","https://openalex.org/W1827297289","https://openalex.org/W1974040450","https://openalex.org/W1982626035","https://openalex.org/W1989864688","https://openalex.org/W2067524451","https://openalex.org/W2098897917","https://openalex.org/W2099256741","https://openalex.org/W2112796928","https://openalex.org/W2114337635","https://openalex.org/W2147800946","https://openalex.org/W2170018742","https://openalex.org/W2296094676","https://openalex.org/W2415321112","https://openalex.org/W2460736843","https://openalex.org/W2517389839","https://openalex.org/W2768475350","https://openalex.org/W2953301748","https://openalex.org/W2998704965","https://openalex.org/W4285719527","https://openalex.org/W6680532216"],"related_works":["https://openalex.org/W2950190409","https://openalex.org/W3191940147","https://openalex.org/W3011996889","https://openalex.org/W2520127694","https://openalex.org/W2904118884","https://openalex.org/W2990879136","https://openalex.org/W2774611252","https://openalex.org/W2965328038","https://openalex.org/W3134691684","https://openalex.org/W3205135396","https://openalex.org/W2922423245","https://openalex.org/W2544062944","https://openalex.org/W2982802130","https://openalex.org/W2786811458","https://openalex.org/W3025825613","https://openalex.org/W3184415262","https://openalex.org/W3046662910","https://openalex.org/W2912744143","https://openalex.org/W3160369295","https://openalex.org/W2736553478"],"abstract_inverted_index":{"A":[0,104],"verification":[1,19,34,67,98,122],"code":[2,35,68,99,123],"is":[3,36,74,115,124,154],"an":[4,84],"automated":[5],"test":[6],"method":[7,136],"used":[8,52],"to":[9,90],"distinguish":[10],"between":[11],"humans":[12],"and":[13,86,120],"computers.":[14],"Humans":[15],"can":[16,137],"easily":[17],"identify":[18],"codes,":[20],"whereas":[21],"machines":[22],"cannot.":[23],"With":[24],"the":[25,42,50,54,58,61,121,127,135,140,148],"development":[26],"of":[27,44,60,143,150],"convolutional":[28,45,71,129],"neural":[29,46,72,130,145],"networks,":[30],"automatically":[31],"recognizing":[32],"a":[33,66,70,96,109,144],"now":[37],"possible":[38],"for":[39,108],"machines.":[40],"However,":[41],"advantages":[43],"networks":[47],"depend":[48],"on":[49,95],"data":[51,78,94,114,153],"by":[53,126],"training":[55,62,77,93,113,152],"classifier,":[56],"particularly":[57],"size":[59],"set.":[63],"Therefore,":[64],"identifying":[65],"using":[69],"network":[73,146],"difficult":[75],"when":[76,147],"are":[79],"insufficient.":[80],"This":[81],"study":[82],"proposes":[83],"active":[85],"deep":[87],"learning":[88,106],"strategy":[89],"obtain":[91],"new":[92],"special":[97],"set":[100],"without":[101],"manual":[102],"intervention.":[103],"feature":[105],"model":[107],"scene":[110],"with":[111],"less":[112],"presented":[116],"in":[117],"this":[118],"work,":[119],"identified":[125],"designed":[128],"network.":[131],"Experiments":[132],"show":[133],"that":[134],"considerably":[138],"improve":[139],"recognition":[141],"accuracy":[142],"amount":[149],"initial":[151],"small.":[155]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
