{"id":"https://openalex.org/W4410449070","doi":"https://doi.org/10.32604/cmc.2025.063862","title":"TGI-FPR: An Improved Multi-Label Password Guessing Model","display_name":"TGI-FPR: An Improved Multi-Label Password Guessing Model","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4410449070","doi":"https://doi.org/10.32604/cmc.2025.063862"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.063862","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.063862","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.063862","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082112630","display_name":"Wei Ou","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Wei Ou","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090788114","display_name":"Shuai Liu","orcid":"https://orcid.org/0000-0001-9909-0664"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shuai Liu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Mengxue Pang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mengxue Pang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101523859","display_name":"Jianqiang Ma","orcid":"https://orcid.org/0009-0009-8814-0609"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jianqiang Ma","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081297670","display_name":"Qiuling Yue","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qiuling Yue","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5013350223","display_name":"Wenbao Han","orcid":"https://orcid.org/0000-0001-8955-8489"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wenbao Han","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5082112630"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14297856,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"84","issue":"1","first_page":"463","last_page":"490"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9857000112533569,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.6703429818153381},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.42861616611480713},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.41845622658729553},{"id":"https://openalex.org/keywords/econometrics","display_name":"Econometrics","score":0.39618998765945435},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3800165057182312},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.3337025046348572},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.29373300075531006},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2664264440536499}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.6703429818153381},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.42861616611480713},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.41845622658729553},{"id":"https://openalex.org/C149782125","wikidata":"https://www.wikidata.org/wiki/Q160039","display_name":"Econometrics","level":1,"score":0.39618998765945435},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3800165057182312},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.3337025046348572},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.29373300075531006},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2664264440536499}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.063862","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.063862","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.063862","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.063862","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2137215443","https://openalex.org/W2734150319","https://openalex.org/W2799341537","https://openalex.org/W2801242599","https://openalex.org/W2801931360","https://openalex.org/W2808164006","https://openalex.org/W2963532563","https://openalex.org/W2969748787","https://openalex.org/W3005206852","https://openalex.org/W3008439638","https://openalex.org/W3085613209","https://openalex.org/W3184914355","https://openalex.org/W3215903849","https://openalex.org/W4205168310"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W143386018","https://openalex.org/W2656445685","https://openalex.org/W1004582678","https://openalex.org/W2115218409","https://openalex.org/W2090949570","https://openalex.org/W2263162522","https://openalex.org/W2134080857","https://openalex.org/W1989237518"],"abstract_inverted_index":{"TarGuess-I":[0],"is":[1],"a":[2,167],"leading":[3],"model":[4,21,56],"utilizing":[5],"Personally":[6,49],"Identifiable":[7,50],"Information":[8],"for":[9],"online":[10],"targeted":[11],"password":[12,27,85,119,148],"guessing.":[13],"Due":[14],"to":[15,58,116,160],"its":[16,153],"remarkable":[17],"guessing":[18,86,171],"performance,":[19],"the":[20,35,55,126,135,138,156],"has":[22],"drawn":[23],"considerable":[24],"attention":[25],"in":[26,170],"security":[28],"research.":[29],"However,":[30],"through":[31],"an":[32,83],"analysis":[33],"of":[34,38,96,109,125,130,137,162],"vulnerable":[36],"behavior":[37],"users":[39],"when":[40],"constructing":[41],"passwords":[42,46,61,98],"by":[43,99],"combining":[44],"popular":[45,60,97],"with":[47,73],"their":[48],"Information,":[51],"we":[52,81,141],"identified":[53],"that":[54,161],"fails":[57],"consider":[59],"and":[62,65,121,151],"frequent":[63,110],"substrings,":[64],"it":[66],"uses":[67],"overly":[68],"broad":[69],"personal":[70,131],"information":[71],"categories,":[72],"extensive":[74],"duplicate":[75],"statistics.":[76],"To":[77,133],"address":[78],"these":[79],"issues,":[80],"propose":[82],"improved":[84],"model,":[87,140],"TGI-FPR,":[88],"which":[89],"incorporates":[90],"three":[91],"semantic":[92],"methods:":[93],"(1)":[94],"identification":[95],"generating":[100],"top":[101],"300":[102],"lists":[103],"from":[104],"similar":[105],"websites,":[106],"(2)":[107],"use":[108],"substrings":[111],"as":[112],"new":[113],"grammatical":[114],"labels":[115],"capture":[117],"finer-grained":[118],"structures,":[120],"(3)":[122],"further":[123],"subdivision":[124],"six":[127,145],"major":[128],"categories":[129],"information.":[132],"evaluate":[134],"performance":[136],"proposed":[139],"conducted":[142],"experiments":[143],"on":[144],"large-scale":[146],"real-world":[147],"leak":[149],"datasets":[150],"compared":[152],"accuracy":[154],"within":[155],"first":[157],"100":[158],"guesses":[159],"TarGuess-I.":[163],"The":[164],"results":[165],"indicate":[166],"2.65%":[168],"improvement":[169],"accuracy.":[172]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
