{"id":"https://openalex.org/W7118830902","doi":"https://doi.org/10.1186/s42400-025-00430-0","title":"Improving targeted password guessing attacks by using personally identifiable information and old password","display_name":"Improving targeted password guessing attacks by using personally identifiable information and old password","publication_year":2026,"publication_date":"2026-01-07","ids":{"openalex":"https://openalex.org/W7118830902","doi":"https://doi.org/10.1186/s42400-025-00430-0"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00430-0","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00430-0","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00430-0.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00430-0.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102705091","display_name":"Wei Ou","orcid":"https://orcid.org/0000-0002-1760-8528"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]},{"id":"https://openalex.org/I4210126580","display_name":"RIKEN Center for Advanced Intelligence Project","ror":"https://ror.org/03ckxwf91","country_code":"JP","type":"facility","lineage":["https://openalex.org/I4210110652","https://openalex.org/I4210126580"]},{"id":"https://openalex.org/I4210158984","display_name":"National Supercomputing Center in Wuxi","ror":"https://ror.org/04ypjrs34","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210158984"]}],"countries":["CN","JP"],"is_corresponding":false,"raw_author_name":"Wei Ou","raw_affiliation_strings":["Jiangsu Variable Supercomputer Technology Co., Ltd, Wuxi, 214100, China","Laboratory for Advanced Computing and Intelligence Engineering, Wuxi, 214100, China","School of Cyberspace Security (School of Cryptology), Hainan University, Haikou, 570228, Hainan, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Variable Supercomputer Technology Co., Ltd, Wuxi, 214100, China","institution_ids":["https://openalex.org/I4210158984"]},{"raw_affiliation_string":"Laboratory for Advanced Computing and Intelligence Engineering, Wuxi, 214100, China","institution_ids":["https://openalex.org/I4210126580"]},{"raw_affiliation_string":"School of Cyberspace Security (School of Cryptology), Hainan University, Haikou, 570228, Hainan, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122193363","display_name":"Chengliang Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chengliang Sun","raw_affiliation_strings":["School of Cyberspace Security (School of Cryptology), Hainan University, Haikou, 570228, Hainan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security (School of Cryptology), Hainan University, Haikou, 570228, Hainan, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110956597","display_name":"Mengxue Pang","orcid":null},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mengxue Pang","raw_affiliation_strings":["School of Cyberspace Security (School of Cryptology), Hainan University, Haikou, 570228, Hainan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security (School of Cryptology), Hainan University, Haikou, 570228, Hainan, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081297670","display_name":"Qiuling Yue","orcid":null},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiuling Yue","raw_affiliation_strings":["School of Cyberspace Security (School of Cryptology), Hainan University, Haikou, 570228, Hainan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security (School of Cryptology), Hainan University, Haikou, 570228, Hainan, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000136407","display_name":"Yanshuo Zhang","orcid":"https://orcid.org/0000-0002-5349-6447"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanshuo Zhang","raw_affiliation_strings":["Department of Cryptographic Science andTechnology, Beijing Electronic Science and Technology Institute, Beijing, 100070, China"],"affiliations":[{"raw_affiliation_string":"Department of Cryptographic Science andTechnology, Beijing Electronic Science and Technology Institute, Beijing, 100070, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108902607","display_name":"Wenbao Han","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenbao Han","raw_affiliation_strings":["School of Cyberspace Security (School of Cryptology), Hainan University, Haikou, 570228, Hainan, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security (School of Cryptology), Hainan University, Haikou, 570228, Hainan, China","institution_ids":["https://openalex.org/I20942203"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5122193363"],"corresponding_institution_ids":["https://openalex.org/I20942203"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0237892,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9799000024795532,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9799000024795532,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.004100000020116568,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.004000000189989805,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.9735999703407288},{"id":"https://openalex.org/keywords/cognitive-password","display_name":"Cognitive password","score":0.7627000212669373},{"id":"https://openalex.org/keywords/password-strength","display_name":"Password strength","score":0.7093999981880188},{"id":"https://openalex.org/keywords/password-cracking","display_name":"Password cracking","score":0.699999988079071},{"id":"https://openalex.org/keywords/password-policy","display_name":"Password policy","score":0.6969000101089478},{"id":"https://openalex.org/keywords/s/key","display_name":"S/KEY","score":0.5454000234603882},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5138999819755554}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.9735999703407288},{"id":"https://openalex.org/C23875713","wikidata":"https://www.wikidata.org/wiki/Q5141232","display_name":"Cognitive password","level":5,"score":0.7627000212669373},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7325000166893005},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7105000019073486},{"id":"https://openalex.org/C70530487","wikidata":"https://www.wikidata.org/wiki/Q1990841","display_name":"Password strength","level":4,"score":0.7093999981880188},{"id":"https://openalex.org/C3847113","wikidata":"https://www.wikidata.org/wiki/Q2746524","display_name":"Password cracking","level":5,"score":0.699999988079071},{"id":"https://openalex.org/C98705547","wikidata":"https://www.wikidata.org/wiki/Q3394687","display_name":"Password policy","level":4,"score":0.6969000101089478},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.5454000234603882},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5199000239372253},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5138999819755554},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4334999918937683},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.42289999127388},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.42179998755455017},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.3930000066757202},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.3377000093460083},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.25609999895095825}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00430-0","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00430-0","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00430-0.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:9fcb1e51fa454f2ebc3650a75d716652","is_oa":true,"landing_page_url":"https://doaj.org/article/9fcb1e51fa454f2ebc3650a75d716652","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 9, Iss 1, Pp 1-17 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00430-0","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00430-0","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00430-0.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.4887496531009674,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1858642095","display_name":null,"funder_award_id":"U23A20304","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3085993365","display_name":null,"funder_award_id":"(Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G37568934","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4020255992","display_name":null,"funder_award_id":"Project","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4541832459","display_name":null,"funder_award_id":"2023005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5939423041","display_name":null,"funder_award_id":"Technology","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6510479079","display_name":null,"funder_award_id":"U23A2030","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6676365692","display_name":null,"funder_award_id":"U23A203","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7726157001","display_name":null,"funder_award_id":"Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321605","display_name":"Government of Jiangsu Province","ror":"https://ror.org/004svx814"},{"id":"https://openalex.org/F4320323370","display_name":"Hainan University","ror":"https://ror.org/03q648j11"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7118830902.pdf","grobid_xml":"https://content.openalex.org/works/W7118830902.grobid-xml"},"referenced_works_count":38,"referenced_works":["https://openalex.org/W2007488200","https://openalex.org/W2030112111","https://openalex.org/W2037202491","https://openalex.org/W2048755632","https://openalex.org/W2086553822","https://openalex.org/W2093397575","https://openalex.org/W2100783932","https://openalex.org/W2135359429","https://openalex.org/W2218132318","https://openalex.org/W2396652156","https://openalex.org/W2411725940","https://openalex.org/W2490171383","https://openalex.org/W2538793708","https://openalex.org/W2582719221","https://openalex.org/W2680793898","https://openalex.org/W2891820333","https://openalex.org/W2908510526","https://openalex.org/W2931153881","https://openalex.org/W2963532563","https://openalex.org/W2982664727","https://openalex.org/W3031972324","https://openalex.org/W3168867926","https://openalex.org/W4205610099","https://openalex.org/W4225295240","https://openalex.org/W4287265459","https://openalex.org/W4292779060","https://openalex.org/W4307079201","https://openalex.org/W4318321042","https://openalex.org/W4322718191","https://openalex.org/W4353112507","https://openalex.org/W4362515116","https://openalex.org/W4380031458","https://openalex.org/W4381744352","https://openalex.org/W4388193432","https://openalex.org/W4390699478","https://openalex.org/W4394663136","https://openalex.org/W4398756485","https://openalex.org/W4399837985"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Text-based":[1],"passwords":[2,21,63,90,100,115,143,214,229],"serve":[3],"as":[4,244],"a":[5,12,171,175],"primary":[6],"means":[7],"of":[8,40,50,56,72,85,187,217,235],"authentication":[9],"and":[10,61,88,98,113,134,141,163,196,227,238],"play":[11],"crucial":[13],"role":[14],"in":[15,116,215],"securing":[16],"information":[17,51,136],"systems.":[18,52],"However,":[19],"easy-to-remember":[20],"are":[22,101],"often":[23],"vulnerable":[24],"to":[25,46,67,151,250],"targeted":[26,32,73,117,176,190],"password":[27,33,41,74,118,133,147,177,236],"guessing":[28,34,119,178],"attacks.":[29],"Research":[30],"on":[31,81,174,182],"not":[35],"only":[36,209,212],"deepens":[37],"our":[38],"understanding":[39],"security":[42,49,123,154],"but":[43],"also":[44],"contributes":[45],"enhancing":[47],"the":[48,54,70,82,105,153,168,233],"Although":[53],"use":[55,84,208],"Personally":[57],"Identifiable":[58],"Information":[59],"(PII)":[60],"old":[62,89,99,114,142,164,197,213,228],"has":[64,77],"been":[65,78],"shown":[66],"significantly":[68,203],"improve":[69,232],"accuracy":[71,234],"guessing,":[75,237],"there":[76],"little":[79],"research":[80,222],"combined":[83],"both":[86,111,161,194],"PII":[87,97,112,140,162,195,210,226],"for":[91],"guessing.":[92],"In":[93],"an":[94,121,247],"era":[95],"where":[96],"increasingly":[102],"accessible,":[103],"assessing":[104],"threat":[106],"posed":[107,156],"by":[108,157,192],"attackers":[109,158],"using":[110,240],"is":[120,185,246],"urgent":[122],"issue.":[124],"To":[125],"address":[126],"this":[127,252],"gap,":[128],"we":[129,166],"first":[130],"analyze":[131],"leaked":[132],"personal":[135],"datasets,":[137],"demonstrating":[138],"that":[139,201,207,224,239],"critically":[144],"influence":[145],"users\u2019":[146],"creation":[148],"behavior.":[149],"Then,":[150],"simulate":[152],"risks":[155],"who":[159],"know":[160],"passwords,":[165],"propose":[167],"PassGLM":[169,184,202],"model,":[170],"model":[172],"fine-tuned":[173],"task":[179],"dataset":[180],"based":[181],"glm-4-9b.":[183],"capable":[186],"generating":[188],"highly":[189],"guesses":[191],"leveraging":[193],"passwords.":[198],"Experiments":[199],"show":[200],"outperforms":[204],"leading":[205],"models":[206,243],"or":[211],"terms":[216],"guess":[218],"success":[219],"rates.":[220],"Our":[221],"demonstrates":[223],"combining":[225],"can":[230],"substantially":[231],"large":[241],"language":[242],"tools":[245],"effective":[248],"way":[249],"achieve":[251],"improvement.":[253]},"counts_by_year":[],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2026-01-08T00:00:00"}
