{"id":"https://openalex.org/W3094898851","doi":"https://doi.org/10.1145/3372297.3417258","title":"Text Captcha Is Dead? A Large Scale Deployment and Empirical Study","display_name":"Text Captcha Is Dead? A Large Scale Deployment and Empirical Study","publication_year":2020,"publication_date":"2020-10-30","ids":{"openalex":"https://openalex.org/W3094898851","doi":"https://doi.org/10.1145/3372297.3417258","mag":"3094898851"},"language":"en","primary_location":{"id":"doi:10.1145/3372297.3417258","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3372297.3417258","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016502133","display_name":"Chenghui Shi","orcid":"https://orcid.org/0000-0001-8799-9045"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chenghui Shi","raw_affiliation_strings":["Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058611515","display_name":"Shouling Ji","orcid":"https://orcid.org/0000-0003-4268-372X"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shouling Ji","raw_affiliation_strings":["Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101828542","display_name":"Qianjun Liu","orcid":"https://orcid.org/0000-0002-4228-2363"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qianjun Liu","raw_affiliation_strings":["Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103101104","display_name":"Changchang Liu","orcid":"https://orcid.org/0000-0003-3111-0782"},"institutions":[{"id":"https://openalex.org/I1341412227","display_name":"IBM (United States)","ror":"https://ror.org/05hh8d621","country_code":"US","type":"company","lineage":["https://openalex.org/I1341412227"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Changchang Liu","raw_affiliation_strings":["IBM Research, Yorktown Heights, NY, USA"],"affiliations":[{"raw_affiliation_string":"IBM Research, Yorktown Heights, NY, USA","institution_ids":["https://openalex.org/I1341412227"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102976060","display_name":"Yuefeng Chen","orcid":"https://orcid.org/0000-0003-0378-3103"},"institutions":[{"id":"https://openalex.org/I45928872","display_name":"Alibaba Group (China)","ror":"https://ror.org/00k642b80","country_code":"CN","type":"company","lineage":["https://openalex.org/I45928872"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuefeng Chen","raw_affiliation_strings":["Alibaba Group, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Alibaba Group, Hangzhou, China","institution_ids":["https://openalex.org/I45928872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101802340","display_name":"Yuan He","orcid":"https://orcid.org/0000-0002-6885-1341"},"institutions":[{"id":"https://openalex.org/I45928872","display_name":"Alibaba Group (China)","ror":"https://ror.org/00k642b80","country_code":"CN","type":"company","lineage":["https://openalex.org/I45928872"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan He","raw_affiliation_strings":["Alibaba Group, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Alibaba Group, Hangzhou, China","institution_ids":["https://openalex.org/I45928872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100462383","display_name":"Zhe Liu","orcid":"https://orcid.org/0000-0003-1313-8327"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhe Liu","raw_affiliation_strings":["Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033073212","display_name":"Raheem Beyah","orcid":"https://orcid.org/0000-0002-9188-3464"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Raheem Beyah","raw_affiliation_strings":["Georgia Institute of Technology, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100428026","display_name":"Ting Wang","orcid":"https://orcid.org/0000-0003-4927-5833"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ting Wang","raw_affiliation_strings":["Penn State, State College, PA, USA"],"affiliations":[{"raw_affiliation_string":"Penn State, State College, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5016502133"],"corresponding_institution_ids":["https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":5.0002,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.9579284,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1391","last_page":"1406"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/captcha","display_name":"CAPTCHA","score":0.9988905787467957},{"id":"https://openalex.org/keywords/turing-test","display_name":"Turing test","score":0.8529334664344788},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.799507737159729},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.7204128503799438},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6257718205451965},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5467033982276917},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5157025456428528},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4807450771331787},{"id":"https://openalex.org/keywords/turing","display_name":"Turing","score":0.44526827335357666},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4289889633655548},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3689184784889221},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.340928852558136},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.16225281357765198}],"concepts":[{"id":"https://openalex.org/C163339463","wikidata":"https://www.wikidata.org/wiki/Q484598","display_name":"CAPTCHA","level":2,"score":0.9988905787467957},{"id":"https://openalex.org/C577917","wikidata":"https://www.wikidata.org/wiki/Q189223","display_name":"Turing test","level":2,"score":0.8529334664344788},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.799507737159729},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.7204128503799438},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6257718205451965},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5467033982276917},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5157025456428528},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4807450771331787},{"id":"https://openalex.org/C9870796","wikidata":"https://www.wikidata.org/wiki/Q490481","display_name":"Turing","level":2,"score":0.44526827335357666},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4289889633655548},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3689184784889221},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.340928852558136},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.16225281357765198},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3372297.3417258","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3372297.3417258","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.46000000834465027,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1616111308","https://openalex.org/W1667580224","https://openalex.org/W1971657180","https://openalex.org/W1993821077","https://openalex.org/W2005062613","https://openalex.org/W2038762609","https://openalex.org/W2064675550","https://openalex.org/W2088301450","https://openalex.org/W2097117768","https://openalex.org/W2112796928","https://openalex.org/W2113321599","https://openalex.org/W2147019420","https://openalex.org/W2180612164","https://openalex.org/W2194187530","https://openalex.org/W2194775991","https://openalex.org/W2380581874","https://openalex.org/W2504108613","https://openalex.org/W2512472178","https://openalex.org/W2528437680","https://openalex.org/W2561498661","https://openalex.org/W2693668331","https://openalex.org/W2746600820","https://openalex.org/W2774644650","https://openalex.org/W2777652944","https://openalex.org/W2798801120","https://openalex.org/W2907384656","https://openalex.org/W2912554321","https://openalex.org/W2921673038","https://openalex.org/W2962700793","https://openalex.org/W2963178695","https://openalex.org/W2963207607","https://openalex.org/W2963517393","https://openalex.org/W2963564844","https://openalex.org/W2963857521","https://openalex.org/W2964153729","https://openalex.org/W2964318098","https://openalex.org/W4249142012","https://openalex.org/W4289038676","https://openalex.org/W4386232377"],"related_works":["https://openalex.org/W4312500010","https://openalex.org/W2965099444","https://openalex.org/W2086464669","https://openalex.org/W1999034556","https://openalex.org/W1998496804","https://openalex.org/W1991242267","https://openalex.org/W3144744384","https://openalex.org/W3015118614","https://openalex.org/W2019322056","https://openalex.org/W33990236"],"abstract_inverted_index":{"The":[0],"development":[1],"of":[2,11,33,63,74,79],"deep":[3],"learning":[4,51],"techniques":[5],"has":[6,81],"significantly":[7],"increased":[8],"the":[9,31,60,71],"ability":[10],"computers":[12],"to":[13,21,47,52,70],"recognize":[14],"CAPTCHA":[15],"(Completely":[16],"Automated":[17],"Public":[18],"Turing":[19],"test":[20],"tell":[22],"Computers":[23],"and":[24,87,91],"Humans":[25],"Apart),":[26],"thus":[27],"breaking":[28],"or":[29,67],"mitigating":[30],"security":[32],"existing":[34],"captcha":[35,54,64],"schemes.":[36],"To":[37],"protect":[38],"against":[39],"these":[40],"attacks,":[41],"recent":[42],"works":[43],"have":[44],"been":[45,82],"proposed":[46],"leverage":[48],"adversarial":[49],"machine":[50],"perturb":[53],"pictures.":[55],"However,":[56],"they":[57],"either":[58],"require":[59],"prior":[61],"knowledge":[62],"solving":[65],"models":[66],"lack":[68],"adaptivity":[69],"evolving":[72],"behaviors":[73],"attackers.":[75],"Most":[76],"importantly,":[77],"none":[78],"them":[80],"deployed":[83],"in":[84],"practical":[85,89],"applications,":[86],"their":[88],"applicability":[90],"effectiveness":[92],"are":[93],"unknown.":[94]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
