Principles and Prevention of HTTP Attacks Based on Identifying Code Recognization, Computer Engineering, issue.20, pp.32-170, 2006. ,
The Research on User Modelling for Internet Personalized Services, 2003. ,
Telling Humans and Computers Apart Automatically, COMMUNICATIONS OF THE ACM, issue.2, pp.47-57, 2004. ,
Ambiguity function based on the linear canonical transform, IET Signal Processing, vol.6, issue.6, pp.568-576 ,
DOI : 10.1049/iet-spr.2011.0320
Research on attach and strategy of CAPTCHA technology, Application Research of Computers, vol.2013, issue.9, pp.30-2776 ,
Recognizing objects in adversarial clutter: breaking a visual CAPTCHA, 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003. Proceedings., pp.124-141, 2003. ,
DOI : 10.1109/CVPR.2003.1211347
A Neural Network Based Approach to Recognizing the Verification Code, Computer Engineering & Science, issue.12, pp.31-51, 2009. ,
Recognition and Improvement of Identifying Code, Journal of Nanjing Normal University, vol.9, issue.2, pp.84-88, 2009. ,
Comparative Study of Knowledge Representation, Computer Systems & Applications, vol.20, issue.3, pp.242-246, 2010. ,
The Rule Representation for Knowledge in Database Style, Computer Engineering and Applications, vol.38, issue.1, pp.200-202, 2002. ,
Research and Design of Spam Email Filter System based on Bayesian algorithm spam, 2006. ,