Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A systematic literature review of empirical methods and risk representation in usable privacy and security research
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …
represent risk to research participants. To understand how these approaches are used and …
Hidden voice commands
Voice interfaces are becoming more ubiquitous and are now the primary input method for
many devices. We explore in this paper how they can be attacked with hidden voice …
many devices. We explore in this paper how they can be attacked with hidden voice …
A survey of research on captcha designing and breaking techniques
Y Zhang, H Gao, G Pei, S Luo… - 2019 18th IEEE …, 2019 - ieeexplore.ieee.org
The Internet plays an increasingly important role in people's lives, but it also brings security
problems. CAPTCHA, which stands for Completely Automated Public Turing Test to Tell …
problems. CAPTCHA, which stands for Completely Automated Public Turing Test to Tell …
Recruiting participants with programming skills: A comparison of four crowdsourcing platforms and a CS student mailing list
Reliably recruiting participants with programming skills is an ongoing challenge for empirical
studies involving software development technologies, often leading to the use of …
studies involving software development technologies, often leading to the use of …
Blind and human: Exploring more usable audio {CAPTCHA} designs
V Fanelle, S Karimi, A Shah, B Subramanian… - Sixteenth Symposium on …, 2020 - usenix.org
For people with visual impairments (PVIs), audio CAPTCHAs are accessible alternatives to
standard visual CAPTCHAs. However, current audio CAPTCHA designs are slower to …
standard visual CAPTCHAs. However, current audio CAPTCHA designs are slower to …
A survey of CAPTCHA technologies to distinguish between human and computer
Abstract CAPTCHA, Completely Automated Public Turing test to tell Computers and Humans
Apart, is widely used as a security mechanism to classify human and computer. This security …
Apart, is widely used as a security mechanism to classify human and computer. This security …
Foundations, properties, and security applications of puzzles: A survey
Cryptographic algorithms have been used not only to create robust ciphertexts but also to
generate cryptograms that, contrary to the classic goal of cryptography, are meant to be …
generate cryptograms that, contrary to the classic goal of cryptography, are meant to be …
Robust text captchas using adversarial examples
CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart)
is a widely used technology to distinguish real users and automated users such as bots …
is a widely used technology to distinguish real users and automated users such as bots …
Improving the security of audio captchas with adversarial examples
CAPTCHAs (completely automated public Turing tests to tell computers and humans apart)
have been the main protection against malicious attacks on public systems for many years …
have been the main protection against malicious attacks on public systems for many years …
Nonsense attacks on google assistant and missense attacks on amazon alexa
This paper presents novel attacks on voice-controlled digital assistants using nonsensical
word sequences. We present the results of a small-scale experiment which demonstrates …
word sequences. We present the results of a small-scale experiment which demonstrates …