Author of the publication

3E-Solver: An Effortless, Easy-to-Update, and End-to-End Solver with Semi-Supervised Learning for Breaking Text-Based Captchas.

, , , , , and . IJCAI, page 3817-3824. ijcai.org, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wiretap Channel with Information Embedding on Actions., and . Entropy, 16 (4): 2105-2130 (2014)An Efficient Self-Healing Key Distribution with Resistance to the Collusion Attack for Wireless Sensor Networks., and . ICC, page 1-5. IEEE, (2010)Tracking the Mobile Jammer Continuously in Time by Using Moving Vector., , , and . ISCID (1), page 43-48. IEEE, (2017)A Semi-Supervised Federated Learning Scheme via Knowledge Distillation for Intrusion Detection., , , , , and . ICC, page 2688-2693. IEEE, (2022)Yet Another Traffic Classifier: A Masked Autoencoder Based Traffic Transformer with Multi-Level Flow Representation., , , , , , and . AAAI, page 5420-5427. AAAI Press, (2023)A Unified Host-based Intrusion Detection Framework using Spark in Cloud., , and . TrustCom, page 97-103. IEEE, (2020)Capacity-Equivocation Region Bounds for Degraded Broadcast Channel with Action-Dependent States., , , , and . CIT, page 263-269. IEEE Computer Society, (2014)Character-Level Intrusion Detection Based On Convolutional Neural Networks., , and . IJCNN, page 1-8. IEEE, (2018)Two Stochastic Models for Security Evaluation Based on Attack Graph., , , and . ICYCS, page 2198-2203. IEEE Computer Society, (2008)A Novel Range-Free Jammer Localization Solution in Wireless Network by Using PSO Algorithm., , , and . ICPCSEE (2), volume 728 of Communications in Computer and Information Science, page 198-211. Springer, (2017)