{"id":"https://openalex.org/W2693668331","doi":"https://doi.org/10.1109/tifs.2017.2718479","title":"No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation","display_name":"No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation","publication_year":2017,"publication_date":"2017-06-21","ids":{"openalex":"https://openalex.org/W2693668331","doi":"https://doi.org/10.1109/tifs.2017.2718479","mag":"2693668331"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2017.2718479","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2718479","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1109/tifs.2017.2718479","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068276075","display_name":"Margarita Osadchy","orcid":"https://orcid.org/0000-0001-5480-5099"},"institutions":[{"id":"https://openalex.org/I91203450","display_name":"University of Haifa","ror":"https://ror.org/02f009v59","country_code":"IL","type":"education","lineage":["https://openalex.org/I91203450"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Margarita Osadchy","raw_affiliation_strings":["Computer Science Department, University of Haifa, Haifa, Israel"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, University of Haifa, Haifa, Israel","institution_ids":["https://openalex.org/I91203450"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059422128","display_name":"Julio Hern\u00e1ndez-Castro","orcid":"https://orcid.org/0000-0002-6432-5328"},"institutions":[{"id":"https://openalex.org/I20581793","display_name":"University of Kent","ror":"https://ror.org/00xkeyj56","country_code":"GB","type":"education","lineage":["https://openalex.org/I20581793"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Julio Hernandez-Castro","raw_affiliation_strings":["School of Computing, University of Kent, Canterbury, U.K"],"affiliations":[{"raw_affiliation_string":"School of Computing, University of Kent, Canterbury, U.K","institution_ids":["https://openalex.org/I20581793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024619073","display_name":"Stuart Gibson","orcid":"https://orcid.org/0000-0002-7981-241X"},"institutions":[{"id":"https://openalex.org/I20581793","display_name":"University of Kent","ror":"https://ror.org/00xkeyj56","country_code":"GB","type":"education","lineage":["https://openalex.org/I20581793"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Stuart Gibson","raw_affiliation_strings":["School of Physical Sciences, University of Kent, Canterbury, U.K"],"affiliations":[{"raw_affiliation_string":"School of Physical Sciences, University of Kent, Canterbury, U.K","institution_ids":["https://openalex.org/I20581793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065467078","display_name":"Orr Dunkelman","orcid":"https://orcid.org/0000-0001-5799-2635"},"institutions":[{"id":"https://openalex.org/I91203450","display_name":"University of Haifa","ror":"https://ror.org/02f009v59","country_code":"IL","type":"education","lineage":["https://openalex.org/I91203450"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Orr Dunkelman","raw_affiliation_strings":["Computer Science Department, University of Haifa, Haifa, Israel"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, University of Haifa, Haifa, Israel","institution_ids":["https://openalex.org/I91203450"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024282437","display_name":"Daniel P\u00e9rez\u2010Cabo","orcid":null},"institutions":[{"id":"https://openalex.org/I106437751","display_name":"Centro Tecnol\u00f3xico de Telecomunicaci\u00f3ns de Galicia","ror":"https://ror.org/045ncxc88","country_code":"ES","type":"nonprofit","lineage":["https://openalex.org/I106437751"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Daniel Perez-Cabo","raw_affiliation_strings":["Gradiant, Campus Universitario de Vigo, Vigo, Spain"],"affiliations":[{"raw_affiliation_string":"Gradiant, Campus Universitario de Vigo, Vigo, Spain","institution_ids":["https://openalex.org/I106437751"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5068276075"],"corresponding_institution_ids":["https://openalex.org/I91203450"],"apc_list":null,"apc_paid":null,"fwci":14.9504,"has_fulltext":false,"cited_by_count":184,"citation_normalized_percentile":{"value":0.99125246,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"12","issue":"11","first_page":"2640","last_page":"2653"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/captcha","display_name":"CAPTCHA","score":0.9710883498191833},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.9233665466308594},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.828463077545166},{"id":"https://openalex.org/keywords/turing-test","display_name":"Turing test","score":0.6702820658683777},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.6032088994979858},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5884413719177246},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5165737867355347},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.485795259475708},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.48420074582099915},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.46282511949539185},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.45486563444137573},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3812065124511719},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.34558868408203125},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3393891453742981},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.2636127173900604},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10784032940864563},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.09170347452163696}],"concepts":[{"id":"https://openalex.org/C163339463","wikidata":"https://www.wikidata.org/wiki/Q484598","display_name":"CAPTCHA","level":2,"score":0.9710883498191833},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.9233665466308594},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.828463077545166},{"id":"https://openalex.org/C577917","wikidata":"https://www.wikidata.org/wiki/Q189223","display_name":"Turing test","level":2,"score":0.6702820658683777},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.6032088994979858},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5884413719177246},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5165737867355347},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.485795259475708},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.48420074582099915},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.46282511949539185},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.45486563444137573},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3812065124511719},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.34558868408203125},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3393891453742981},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.2636127173900604},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10784032940864563},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.09170347452163696},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2017.2718479","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2718479","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:kar.kent.ac.uk:62081","is_oa":false,"landing_page_url":"https://doi.org/10.1109/TIFS.2017.2718479>)","pdf_url":null,"source":{"id":"https://openalex.org/S4377196264","display_name":"Kent Academic Repository (University of Kent)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I20581793","host_organization_name":"University of Kent","host_organization_lineage":["https://openalex.org/I20581793"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":{"id":"doi:10.1109/tifs.2017.2718479","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2718479","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2618082681","display_name":"Improving cyber security using realistic synthetic face generation","funder_award_id":"EP/M013375/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G6685178587","display_name":null,"funder_award_id":"EP/M013375/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G7221248509","display_name":null,"funder_award_id":"3-11858","funder_id":"https://openalex.org/F4320322108","funder_display_name":"Ministry of Science and Technology"}],"funders":[{"id":"https://openalex.org/F4320322108","display_name":"Ministry of Science and Technology","ror":"https://ror.org/032e49973"},{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":80,"referenced_works":["https://openalex.org/W769612788","https://openalex.org/W1487583988","https://openalex.org/W1500290976","https://openalex.org/W1560502112","https://openalex.org/W1667580224","https://openalex.org/W1673923490","https://openalex.org/W1827297289","https://openalex.org/W1849277567","https://openalex.org/W1883420340","https://openalex.org/W1914017572","https://openalex.org/W1932198206","https://openalex.org/W1945616565","https://openalex.org/W1963882359","https://openalex.org/W1969670714","https://openalex.org/W2003735219","https://openalex.org/W2015824828","https://openalex.org/W2022710553","https://openalex.org/W2055013232","https://openalex.org/W2072410439","https://openalex.org/W2084062832","https://openalex.org/W2097073572","https://openalex.org/W2112796928","https://openalex.org/W2113321599","https://openalex.org/W2115601549","https://openalex.org/W2117539524","https://openalex.org/W2125561172","https://openalex.org/W2145339207","https://openalex.org/W2147800946","https://openalex.org/W2156749117","https://openalex.org/W2163605009","https://openalex.org/W2168126647","https://openalex.org/W2179402106","https://openalex.org/W2180612164","https://openalex.org/W2230740169","https://openalex.org/W2293768274","https://openalex.org/W2380581874","https://openalex.org/W2408141691","https://openalex.org/W2460937040","https://openalex.org/W2468059673","https://openalex.org/W2486441166","https://openalex.org/W2535873859","https://openalex.org/W2552767274","https://openalex.org/W2570685808","https://openalex.org/W2574797807","https://openalex.org/W2603766943","https://openalex.org/W2949152835","https://openalex.org/W2950864148","https://openalex.org/W2951807304","https://openalex.org/W2953301748","https://openalex.org/W2963173190","https://openalex.org/W2963389226","https://openalex.org/W2963542991","https://openalex.org/W2963739340","https://openalex.org/W2964040467","https://openalex.org/W2964082701","https://openalex.org/W4256044039","https://openalex.org/W4293529028","https://openalex.org/W4300511536","https://openalex.org/W6622262455","https://openalex.org/W6629368666","https://openalex.org/W6629986808","https://openalex.org/W6636863008","https://openalex.org/W6637162671","https://openalex.org/W6638685980","https://openalex.org/W6639204139","https://openalex.org/W6640425456","https://openalex.org/W6648737282","https://openalex.org/W6654603960","https://openalex.org/W6682764186","https://openalex.org/W6684191040","https://openalex.org/W6685736903","https://openalex.org/W6685943642","https://openalex.org/W6689238212","https://openalex.org/W6714069269","https://openalex.org/W6719080892","https://openalex.org/W6722479552","https://openalex.org/W6729756640","https://openalex.org/W6731695623","https://openalex.org/W6731927902","https://openalex.org/W6736092963"],"related_works":["https://openalex.org/W4312500010","https://openalex.org/W2086464669","https://openalex.org/W2313567600","https://openalex.org/W2965099444","https://openalex.org/W1999034556","https://openalex.org/W1998496804","https://openalex.org/W1991242267","https://openalex.org/W2910114670","https://openalex.org/W3144744384","https://openalex.org/W4287068092"],"abstract_inverted_index":{"Recent":[0],"advances":[1],"in":[2],"deep":[3],"learning":[4,56],"(DL)":[5],"allow":[6],"for":[7,33],"solving":[8],"complex":[9],"AI":[10],"problems":[11],"that":[12,118,139,159],"used":[13],"to":[14,29,39,104,113,124,132,142],"be":[15,30],"considered":[16,28],"very":[17],"hard.":[18],"While":[19],"this":[20,59,146],"progress":[21],"has":[22],"advanced":[23],"many":[24],"fields,":[25],"it":[26],"is":[27,122,140],"bad":[31],"news":[32],"Completely":[34],"Automated":[35],"Public":[36],"Turing":[37],"tests":[38],"tell":[40],"Computers":[41],"and":[42,66,98,155,165],"Humans":[43],"Apart":[44],"(CAPTCHAs),":[45],"the":[46,52,78,109,160,170],"security":[47,164],"of":[48,54,77,152],"which":[49,129],"rests":[50],"on":[51,71],"hardness":[53],"some":[55],"problems.":[57],"In":[58,145],"paper,":[60,147],"we":[61,148],"introduce":[62,133],"DeepCAPTCHA,":[63],"a":[64,96,150],"new":[65],"secure":[67,126],"CAPTCHA":[68,127],"scheme":[69,161],"based":[70],"adversarial":[72,83,102,120,135,137],"examples,":[73],"an":[74],"inherit":[75],"limitation":[76],"current":[79],"DL":[80,111],"networks.":[81],"These":[82],"examples":[84],"are":[85],"constructed":[86],"inputs,":[87],"either":[88],"synthesized":[89],"from":[90],"scratch":[91],"or":[92],"computed":[93],"by":[94],"adding":[95],"small":[97],"specific":[99],"perturbation":[100],"called":[101],"noise":[103,121,138],"correctly":[105],"classified":[106],"items,":[107],"causing":[108],"targeted":[110],"network":[112],"misclassify":[114],"them.":[115],"We":[116],"show":[117],"plain":[119],"insufficient":[123],"achieve":[125],"schemes,":[128],"leads":[130],"us":[131],"immutable":[134],"noise-an":[136],"resistant":[141],"removal":[143],"attempts.":[144],"implement":[149],"proof":[151],"concept":[153],"system,":[154],"its":[156],"analysis":[157],"shows":[158],"offers":[162],"high":[163],"good":[166],"usability":[167],"compared":[168],"with":[169],"best":[171],"previously":[172],"existing":[173],"CAPTCHAs.":[174]},"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":17},{"year":2023,"cited_by_count":19},{"year":2022,"cited_by_count":38},{"year":2021,"cited_by_count":29},{"year":2020,"cited_by_count":29},{"year":2019,"cited_by_count":27},{"year":2018,"cited_by_count":14},{"year":2017,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
