Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Birthday, name and bifacial-security: understanding passwords of Chinese web users
Much attention has been paid to passwords chosen by English speaking users, yet only a
few studies have examined how non-English speaking users select passwords. In this …
few studies have examined how non-English speaking users select passwords. In this …
Improving real-world password guessing attacks via bi-directional transformers
Password guessing attacks, prevalent issues in the real world, can be conceptualized as
efforts to approximate the probability distribution of text tokens. Techniques in the natural …
efforts to approximate the probability distribution of text tokens. Techniques in the natural …
Chemical unclonable functions based on operable random DNA pools
Physical unclonable functions (PUFs) based on unique tokens generated by random
manufacturing processes have been proposed as an alternative to mathematical one-way …
manufacturing processes have been proposed as an alternative to mathematical one-way …
Chunk-level password guessing: Towards modeling refined password composition representations
Textual password security hinges on the guessing models adopted by attackers, in which a
suitable password composition representation is an influential factor. Unfortunately, the …
suitable password composition representation is an influential factor. Unfortunately, the …
How to attack and generate honeywords
Honeywords are decoy passwords associated with each user account to timely detect
password leakage. The key issue lies in how to generate honeywords that are hard to be …
password leakage. The key issue lies in how to generate honeywords that are hard to be …
Passgpt: Password modeling and (guided) generation with large language models
Large language models (LLMs) successfully model natural language from vast amounts of
text without the need for explicit supervision. In this paper, we investigate the efficacy of …
text without the need for explicit supervision. In this paper, we investigate the efficacy of …
A {Two-Decade} Retrospective Analysis of a University's Vulnerability to Attacks Exploiting Reused Passwords
Credential-guessing attacks often exploit passwords that were reused across a user's online
accounts. To learn how organizations can better protect users, we retrospectively analyzed …
accounts. To learn how organizations can better protect users, we retrospectively analyzed …
Reducing bias in modeling real-world password strength via deep learning and dynamic dictionaries
Password security hinges on an in-depth understanding of the techniques adopted by
attackers. Unfortunately, real-world adversaries resort to pragmatic guessing strategies such …
attackers. Unfortunately, real-world adversaries resort to pragmatic guessing strategies such …
Honeyword-based authentication techniques for protecting passwords: A survey
Honeyword (or decoy password) based authentication, first introduced by Juels and Rivest
in 2013, has emerged as a security mechanism that can provide security against server-side …
in 2013, has emerged as a security mechanism that can provide security against server-side …
GuessFuse: Hybrid Password Guessing with Multi-View
Z **e, F Shi, M Zhang, H Ma, H Wang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Password guessing is a primary method for password strength evaluation. Despite various
password guessing models have been proposed, there is still a significant gap between …
password guessing models have been proposed, there is still a significant gap between …