Improving Password Guessing via Representation Learning
暂无分享,去创建一个
[1] Shakir Mohamed,et al. Learning in Implicit Generative Models , 2016, ArXiv.
[2] Tom White,et al. Sampling Generative Networks: Notes on a Few Effective Techniques , 2016, ArXiv.
[3] Christian Ledig,et al. Photo-Realistic Single Image Super-Resolution Using a Generative Adversarial Network , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[4] 拓海 杉山,et al. “Unpaired Image-to-Image Translation using Cycle-Consistent Adversarial Networks”の学習報告 , 2017 .
[5] Aaron C. Courville,et al. Adversarially Learned Inference , 2016, ICLR.
[6] Rama Chellappa,et al. Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models , 2018, ICLR.
[7] Wei Wang,et al. Keystroke Recognition Using WiFi Signals , 2015, MobiCom.
[8] Soumith Chintala,et al. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks , 2015, ICLR.
[9] Nikita Borisov,et al. The Tangled Web of Password Reuse , 2014, NDSS.
[10] Martin Vuagnoux,et al. Compromising Electromagnetic Emanations of Wired and Wireless Keyboards , 2009, USENIX Security Symposium.
[11] Giovanni Vigna,et al. ClearShot: Eavesdropping on Keyboard Input from Video , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[12] Blase Ur,et al. "I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab , 2015, SOUPS.
[13] Blase Ur,et al. Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks , 2016, USENIX Annual Technical Conference.
[14] Claude Castelluccia,et al. OMEN: Faster Password Guessing Using an Ordered Markov Enumerator , 2015, ESSoS.
[15] Rui Wang,et al. Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow , 2010, 2010 IEEE Symposium on Security and Privacy.
[16] Max Welling,et al. Auto-Encoding Variational Bayes , 2013, ICLR.
[17] Georg Langs,et al. Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery , 2017, IPMI.
[18] Klaus-Robert Müller,et al. Covariate Shift Adaptation by Importance Weighted Cross Validation , 2007, J. Mach. Learn. Res..
[19] Ninghui Li,et al. A Study of Probabilistic Password Models , 2014, 2014 IEEE Symposium on Security and Privacy.
[20] Jiancheng Lv,et al. Learning Inverse Mapping by AutoEncoder Based Generative Adversarial Nets , 2017, ICONIP.
[21] Wojciech Zaremba,et al. Improved Techniques for Training GANs , 2016, NIPS.
[22] Kuldip K. Paliwal,et al. Bidirectional recurrent neural networks , 1997, IEEE Trans. Signal Process..
[23] Samy Bengio,et al. Generating Sentences from a Continuous Space , 2015, CoNLL.
[24] Tao Yang,et al. Word Embedding for Understanding Natural Language: A Survey , 2018 .
[25] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[26] Hossein Bidgoli,et al. Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security Foundations (Handbook of Information Security) , 2006 .
[27] Steve Gold. Cracking passwords , 2010, Netw. Secur..
[28] Pascal Vincent,et al. Representation Learning: A Review and New Perspectives , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[29] Ping Wang,et al. Targeted Online Password Guessing: An Underestimated Threat , 2016, CCS.
[30] Fernando Pérez-Cruz,et al. PassGAN: A Deep Learning Approach for Password Guessing , 2017, ACNS.
[31] R.V. Yampolskiy. Analyzing User Password Selection Behavior for Reduction of Password Space , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.
[32] Geoffrey E. Hinton,et al. Generating Text with Recurrent Neural Networks , 2011, ICML.
[33] Ken Thompson,et al. Password security: a case history , 1979, CACM.
[34] Aaron C. Courville,et al. Improved Training of Wasserstein GANs , 2017, NIPS.
[35] Palash Goyal,et al. Graph Embedding Techniques, Applications, and Performance: A Survey , 2017, Knowl. Based Syst..
[36] Blase Ur,et al. Measuring Real-World Accuracies and Biases in Modeling Password Guessability , 2015, USENIX Security Symposium.
[37] Alexei A. Efros,et al. Context Encoders: Feature Learning by Inpainting , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[38] Thomas Ristenpart,et al. Beyond Credential Stuffing: Password Similarity Models Using Neural Networks , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[39] Vitaly Shmatikov,et al. Fast dictionary attacks on passwords using time-space tradeoff , 2005, CCS '05.
[40] Jeff Donahue,et al. Large Scale GAN Training for High Fidelity Natural Image Synthesis , 2018, ICLR.
[41] Alfredo De Santis,et al. Neural Network Techniques for Proactive Password Checking , 2006, IEEE Transactions on Dependable and Secure Computing.
[42] Sudhir Aggarwal,et al. Password Cracking Using Probabilistic Context-Free Grammars , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[43] Trevor Darrell,et al. Adversarial Feature Learning , 2016, ICLR.
[44] Lucas Theis,et al. Amortised MAP Inference for Image Super-resolution , 2016, ICLR.
[45] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[46] Geoffrey E. Hinton,et al. Visualizing Data using t-SNE , 2008 .
[47] P. Diggle,et al. Monte Carlo Methods of Inference for Implicit Statistical Models , 1984 .
[48] Ian J. Goodfellow,et al. NIPS 2016 Tutorial: Generative Adversarial Networks , 2016, ArXiv.
[49] Maximilian Golla,et al. On the Accuracy of Password Strength Meters , 2018, CCS.
[50] Patrick Traynor,et al. (sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers , 2011, CCS '11.