J. Zhi-gang, Principles and Prevention of HTTP Attacks Based on Identifying Code Recognization, Computer Engineering, issue.20, pp.32-170, 2006.

Y. Xiao-min, The Research on User Modelling for Internet Personalized Services, 2003.

M. Luis-von-ahn, J. Blum, and . Langford, Telling Humans and Computers Apart Automatically, COMMUNICATIONS OF THE ACM, issue.2, pp.47-57, 2004.

S. R. Tao and Z. J. Wang, Ambiguity function based on the linear canonical transform, IET Signal Processing, vol.6, issue.6, pp.568-576
DOI : 10.1049/iet-spr.2011.0320

W. Wang-bin-jun, D. Jing-ya, and . Kai-xuan, Research on attach and strategy of CAPTCHA technology, Application Research of Computers, vol.2013, issue.9, pp.30-2776

G. Mori and J. Malik, Recognizing objects in adversarial clutter: breaking a visual CAPTCHA, 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003. Proceedings., pp.124-141, 2003.
DOI : 10.1109/CVPR.2003.1211347

Z. Bao-he, . Shi-xiao-ai, and . Xie-fang-yong, A Neural Network Based Approach to Recognizing the Verification Code, Computer Engineering & Science, issue.12, pp.31-51, 2009.

H. Sai-ping and X. Ming, Recognition and Improvement of Identifying Code, Journal of Nanjing Normal University, vol.9, issue.2, pp.84-88, 2009.

Y. Jian-wei and . Lu-feng, Comparative Study of Knowledge Representation, Computer Systems & Applications, vol.20, issue.3, pp.242-246, 2010.

Z. Xuan-ping, G. Hui, and Z. Zhong-meng, The Rule Representation for Knowledge in Database Style, Computer Engineering and Applications, vol.38, issue.1, pp.200-202, 2002.

Z. Qi-yu, Research and Design of Spam Email Filter System based on Bayesian algorithm spam, 2006.