- User Authentication and Security Systems
- Advanced Malware Detection Techniques
- Advanced Steganography and Watermarking Techniques
- Wireless Communication Networks Research
- Tensor decomposition and applications
- Spam and Phishing Detection
- Adversarial Robustness in Machine Learning
- Sparse and Compressive Sensing Techniques
- Topic Modeling
- Cloud Data Security Solutions
- Anomaly Detection Techniques and Applications
- Financial Markets and Investment Strategies
- Educational Reforms and Innovations
- Psychedelics and Drug Studies
- Privacy-Preserving Technologies in Data
- Complex Systems and Time Series Analysis
- Data Quality and Management
- Indoor and Outdoor Localization Technologies
- Advanced Adaptive Filtering Techniques
- Blind Source Separation Techniques
- Biometric Identification and Security
- Bacillus and Francisella bacterial research
- Handwritten Text Recognition Techniques
- Corporate Finance and Governance
Xidian University
2016-2018
Institute of Software
2016-2018
Tencent (China)
2018
PLA Army Engineering University
2015-2016
Hunan Normal University
2013
The ability of hackers to infiltrate computer systems using attack programs and bots led the development Captchas or Completely Automated Public Turing Tests Tell Computers Humans Apart. text Captcha is most popular scheme given its ease construction user friendliness. However, next generation programmers has decreased expected security these mechanisms, leaving websites open attack. Text are still widely used, because it believed that speeds slow, typically two five seconds per image, this...
Text-based Captchas have been widely deployed across the Internet to defend against undesirable or malicious bot programs.Many attacks proposed; these fine prior art advanced scientific understanding of Captcha robustness, but most them a limited applicability.In this paper, we report simple, low-cost powerful attack that effectively breaks wide range text with distinct design features, including those by Google, Microsoft, Yahoo!, Amazon and other giants.For all schemes, our achieved...
Captcha is a security mechanism designed to differentiate between computers and humans, used defend against malicious bot programs. Text-based Captchas are the most widely deployed differentiation mechanism, almost all text-based single layered. Numerous successful attacks on single-layer by Google, Yahoo!, Amazon have been reported. In 2015, Microsoft new two-layer scheme. This appears be first application of Captchas. It is, therefore, natural ask fundamental question: as secure its...
Spectrum data, which are usually characterized by many dimensions, such as location, frequency, time, and signal strength, present formidable challenges in terms of acquisition, processing, visualization. In practice, a portion spectrum data entries may be unavailable due to the interference during acquisition process or compression sensing process. Nevertheless, completion work multi-dimensional has drawn few attention researchers working field. this paper, we first put forward concept...
Spectrum data, which is usually characterized by many dimensions, such as location, frequency, time and signal strength, presents formidable challenges in terms of acquisition, processing visualization. In practice, a portion spectrum data entries may be unavailable due to the interference during acquisition process or compression sensing process. However, completion work multi-dimensional has drawn few attention. this paper, we first put forward concept tensor depict then invoke recent...
This paper presents an efficient method to construct white space database for devices communicate in TV (TVWS). The goal is build a TVWS which senses the spectrum signal strength from (WSDs). Considering incompleteness of measurement data, we formulate problem spatial inference as matrix completion and propose data recovery by combining fixed point continuation algorithm (FPCA) with popular k-nearest neighbor (KNN) algorithm. Simulation results show that proposed approach has better...
Text retrieval has been widely-used in many online applications to help users find relevant information from a text collection. In this paper, we study new attack scenario against evaluate its robustness adversarial attacks under the black-box setting, which attackers want their own texts always get high relevance scores with different users' input queries and thus be retrieved frequently can receive large amounts of impressions for profits. Considering that most current methods only simply...
Evaluating Large Language Models (LLMs) is crucial for understanding their capabilities and limitations across various applications, including natural language processing code generation. Existing benchmarks like MMLU, C-Eval, HumanEval assess general LLM performance but lack focus on specific expert domains such as cybersecurity. Previous attempts to create cybersecurity datasets have faced limitations, insufficient data volume a reliance multiple-choice questions (MCQs). To address these...
Text-based Captchas are now most widely used security technology for differentiating between computers and humans. Hollow have emerged as one of the latest designs, they been deployed by more major companies. Besides Yahoo!, Tencent, Sina, China Mobile Baidu, some other websites, especially higher requirement shopping websites also using this scheme. A main feature such schemes is to use contour lines form connected hollow characters with aim improving usability simultaneously. It hard...