default search action
Haichang Gao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Guoqin Chang, Haichang Gao, Ge Pei, Sainan Luo, Yang Zhang, Nuo Cheng, Yiwen Tang, Qianwen Guo:
The robustness of behavior-verification-based slider CAPTCHAs. J. Inf. Secur. Appl. 81: 103711 (2024) - [j26]Shudong Zhang, Haichang Gao, Chao Shu, Xiwen Cao, Yunyi Zhou, Jianping He:
Black-box Bayesian adversarial attack with transferable priors. Mach. Learn. 113(4): 1511-1528 (2024) - [j25]Ping Wang, Haichang Gao, Xiaoyan Guo, Zhongni Yuan, Jiawei Nian:
Improving the Security of Audio CAPTCHAs With Adversarial Examples. IEEE Trans. Dependable Secur. Comput. 21(2): 650-667 (2024) - [j24]Zhixuan Ma, Haichang Gao, Shangwen Li, Ping Wang:
A Stability-Enhanced Dynamic Backdoor Defense in Federated Learning for IIoT. IEEE Trans. Ind. Informatics 20(11): 12513-12522 (2024) - [c30]Jianping He, Haichang Gao, Yunyi Zhou:
Enhancing Data-Free Model Stealing Attack on Robust Models. IJCNN 2024: 1-8 - [c29]Yier Wei, Haichang Gao, Xingyi Quan, Guotu Luo:
A Transferable Adversarial Attack against Object Detection Networks. IJCNN 2024: 1-8 - [c28]Hafiz Bilal Ahmad, Haichang Gao, Naila Latif, Abdul Aziiz, Muhammad Auraangzeb, Muhammad Tanveer Khan:
Adversarial Machine Learning for Detecting Advanced Threats Inspired by StuxNet in Critical Infrastructure Networks. ISDFS 2024: 1-7 - [i12]Zihui Wu, Haichang Gao, Jianping He, Ping Wang:
The Dark Side of Function Calling: Pathways to Jailbreaking Large Language Models. CoRR abs/2407.17915 (2024) - [i11]Zihui Wu, Haichang Gao, Ping Wang, Shudong Zhang, Zhaoxiang Liu, Shiguo Lian:
Mining Glitch Tokens in Large Language Models via Gradient-based Discrete Optimization. CoRR abs/2410.15052 (2024) - 2023
- [j23]Ping Wang, Haichang Gao, Xiaoyan Guo, Chenxuan Xiao, Fuqi Qi, Zheng Yan:
An Experimental Investigation of Text-based CAPTCHA Attacks and Their Robustness. ACM Comput. Surv. 55(9): 196:1-196:38 (2023) - [j22]Guoqin Chang, Haichang Gao, Zhou Yao, Haoquan Xiong:
TextGuise: Adaptive adversarial example attacks on text classification model. Neurocomputing 529: 190-203 (2023) - [j21]Yier Wei, Haichang Gao, Yufei Wang, Yipeng Gao, Huan Liu:
A lightweight backdoor defense framework based on image inpainting. Neurocomputing 537: 22-36 (2023) - [j20]Ke Cheng, Jiaxuan Fu, Yulong Shen, Haichang Gao, Ning Xi, Zhiwei Zhang, Xinghui Zhu:
Manto: A Practical and Secure Inference Service of Convolutional Neural Networks for IoT. IEEE Internet Things J. 10(16): 14856-14872 (2023) - [j19]Ke Cheng, Ning Xi, Ximeng Liu, Xinghui Zhu, Haichang Gao, Zhiwei Zhang, Yulong Shen:
Private Inference for Deep Neural Networks: A Secure, Adaptive, and Efficient Realization. IEEE Trans. Computers 72(12): 3519-3531 (2023) - [j18]Ping Wang, Haichang Gao, Chenxuan Xiao, Xiaoyan Guo, Yipeng Gao, Yang Zi:
Extended Research on the Security of Visual Reasoning CAPTCHA. IEEE Trans. Dependable Secur. Comput. 20(6): 4976-4992 (2023) - [c27]Yier Wei, Haichang Gao, Yufei Wang, Huan Liu, Yipeng Gao, Sainan Luo, Qianwen Guo:
TransNoise: Transferable Universal Adversarial Noise for Adversarial Attack. ICANN (5) 2023: 193-205 - [i10]Zihui Wu, Haichang Gao, Bingqian Zhou, Ping Wang:
AdvFunMatch: When Consistent Teaching Meets Adversarial Robustness. CoRR abs/2305.14700 (2023) - [i9]Ping Wang, Shishir Nagaraja, Aurélien Bourquard, Haichang Gao, Jeff Yan:
SoK: Acoustic Side Channels. CoRR abs/2308.03806 (2023) - 2022
- [j17]Jiawei Nian, Ping Wang, Haichang Gao, Xiaoyan Guo:
A deep learning-based attack on text CAPTCHAs by using object detection techniques. IET Inf. Secur. 16(2): 97-110 (2022) - [c26]Shudong Zhang, Haichang Gao, Yunyi Zhou, Zihui Wu, Yiwen Tang:
Consistency Regularization Helps Mitigate Robust Overfitting in Adversarial Training. KSEM (3) 2022: 734-746 - [i8]Shudong Zhang, Haichang Gao, Tianwei Zhang, Yunyi Zhou, Zihui Wu:
Alleviating Robust Overfitting of Adversarial Training With Consistency Regularization. CoRR abs/2205.11744 (2022) - [i7]Zihui Wu, Haichang Gao, Bingqian Zhou, Xiaoyan Guo, Shudong Zhang:
Lower Difficulty and Better Robustness: A Bregman Divergence Perspective for Adversarial Training. CoRR abs/2208.12511 (2022) - 2021
- [j16]Ziyu Shi, Haichang Gao, Yiwen Tang, Han Zheng, Shuai Kang, Yi Liu:
Universal Optimization Strategies for Object Detection Networks. Int. J. Pattern Recognit. Artif. Intell. 35(5): 2155005:1-2155005:26 (2021) - [j15]Ping Wang, Haichang Gao, Qingxun Rao, Sainan Luo, Zhongni Yuan, Ziyu Shi:
A Security Analysis of Captchas With Large Character Sets. IEEE Trans. Dependable Secur. Comput. 18(6): 2953-2968 (2021) - [j14]Shudong Zhang, Haichang Gao, Qingxun Rao:
Defense Against Adversarial Attacks by Reconstructing Images. IEEE Trans. Image Process. 30: 6117-6129 (2021) - [c25]Yipeng Gao, Haichang Gao, Sainan Luo, Yang Zi, Shudong Zhang, Wenjie Mao, Ping Wang, Yulong Shen, Jeff Yan:
Research on the Security of Visual Reasoning CAPTCHA. USENIX Security Symposium 2021: 3291-3308 - 2020
- [j13]Ping Wang, Haichang Gao, Ziyu Shi, Zhongni Yuan, Jiangping Hu:
Simple and Easy: Transfer Learning-Based Attacks to Text CAPTCHA. IEEE Access 8: 59044-59058 (2020) - [j12]Nuo Cheng, Guoqin Chang, Haichang Gao, Ge Pei, Yang Zhang:
WordChange: Adversarial Examples Generation Approach for Chinese Text Classification. IEEE Access 8: 79561-79572 (2020) - [j11]Ge Pei, Haichang Gao, Xin Zhou, Nuo Cheng:
Feature Pooling - A Feature Compression Method Used in Convolutional Neural Networks. J. Inf. Sci. Eng. 36(3): 577-596 (2020) - [j10]Yang Zi, Haichang Gao, Zhouhang Cheng, Yi Liu:
An End-to-End Attack on Text CAPTCHAs. IEEE Trans. Inf. Forensics Secur. 15: 753-766 (2020)
2010 – 2019
- 2019
- [j9]Zhouhang Cheng, Haichang Gao, Zhongyu Liu, Huaxi Wu, Yang Zi, Ge Pei:
Image-based CAPTCHAs based on neural style transfer. IET Inf. Secur. 13(6): 519-529 (2019) - [j8]Xiyang Liu, Yang Zhang, Jing Hu, Mengyun Tang, Haichang Gao:
Breaking Text-based CAPTCHAs using Average Vertical Partition. J. Inf. Sci. Eng. 35(3): 611-634 (2019) - [c24]Shuai Kang, Haichang Gao, Yiwen Tang, Yi Liu, Jiaming Chen:
Is Satellite Image Target Camouflage Still Valid Under Deep Learning Target Detection? ICAIP 2019: 10-14 - [c23]Yang Zhang, Haichang Gao, Ge Pei, Sainan Luo, Guoqin Chang, Nuo Cheng:
A Survey of Research on CAPTCHA Designing and Breaking Techniques. TrustCom/BigDataSE 2019: 75-84 - 2018
- [j7]Mengyun Tang, Haichang Gao, Yang Zhang, Yi Liu, Ping Zhang, Ping Wang:
Research on Deep Learning Techniques in Breaking Text-Based Captchas and Designing Image-Based Captcha. IEEE Trans. Inf. Forensics Secur. 13(10): 2522-2537 (2018) - [c22]Yang Zhang, Haichang Gao, Ge Pei, Shuai Kang, Xin Zhou:
Effect of Adversarial Examples on the Robustness of CAPTCHA. CyberC 2018 - [c21]Ping Zhang, Ziyu Shi, Haichang Gao:
Research on Text Location and Recognition in Natural Images with Deep Learning. ICAAI 2018: 1-6 - 2017
- [j6]Haichang Gao, Mengyun Tang, Yi Liu, Ping Zhang, Xiyang Liu:
Research on the Security of Microsoft's Two-Layer Captcha. IEEE Trans. Inf. Forensics Secur. 12(7): 1671-1685 (2017) - [c20]Ping Zhang, Haichang Gao, Zhouhang Cheng, Fang Cao:
Two Novel Image-Based CAPTCHA Schemes Based on Visual Effects. CCCV (3) 2017: 14-25 - 2016
- [j5]Haichang Gao, Xuqin Wang, Fang Cao, Zhengya Zhang, Lei Lei, Jiao Qi, Xiyang Liu:
Robustness of text-based completely automated public turing test to tell computers and humans apart. IET Inf. Secur. 10(1): 45-52 (2016) - [c19]Haichang Gao, Jeff Yan, Fang Cao, Zhengya Zhang, Lei Lei, Mengyun Tang, Ping Zhang, Xin Zhou, Xuqin Wang, Jiawei Li:
A Simple Generic Attack on Text Captchas. NDSS 2016 - 2015
- [c18]Haichang Gao, Lei Lei, Xin Zhou, Jiawei Li, Xiyang Liu:
The Robustness of Face-Based CAPTCHAs. CIT/IUCC/DASC/PICom 2015: 2248-2255 - 2014
- [j4]Haichang Gao, Wei Wang, Ye Fan, Jiao Qi, Xiyang Liu:
The Robustness of "Connecting Characters Together" CAPTCHAs. J. Inf. Sci. Eng. 30(2): 347-369 (2014) - 2013
- [j3]Haichang Gao, Wei Jia, Fei Ye, Licheng Ma:
A survey on the use of graphical passwords in security. J. Softw. 8(7): 1678-1698 (2013) - [c17]Haichang Gao, Wei Wang, Jiao Qi, Xuqin Wang, Xiyang Liu, Jeff Yan:
The robustness of hollow CAPTCHAs. CCS 2013: 1075-1086 - [c16]Haichang Gao, Wei Jia, Ning Liu, Kaisheng Li:
The Hot-Spots Problem in Windows 8 Graphical Password Scheme. CSS 2013: 349-362 - [c15]Haichang Gao, Ning Liu, Kaisheng Li, Jinhua Qiu:
Usability and Security of the Recall-Based Graphical Password Schemes. HPCC/EUC 2013: 2237-2244 - [i6]Xiyang Liu, Zhongjie Ren, Xiuling Chang, Haichang Gao, Uwe Aickelin:
Draw a line on your PDA to authenticate. CoRR abs/1305.7482 (2013) - [i5]Liming Wang, Xiuling Chang, Zhongjie Ren, Haichang Gao, Xiyang Liu, Uwe Aickelin:
Against Spyware Using CAPTCHA in Graphical Password Scheme. CoRR abs/1305.7485 (2013) - [i4]Haichang Gao, Zhongjie Ren, Xiuling Chang, Xiyang Liu, Uwe Aickelin:
A New Graphical Password Scheme Resistant to Shoulder-Surfing. CoRR abs/1306.2882 (2013) - [i3]Haichang Gao, Honggang Liu, Dan Yao, Xiyang Liu, Uwe Aickelin:
An audio CAPTCHA to distinguish humans from computers. CoRR abs/1306.2885 (2013) - [i2]Haichang Gao, Zhongjie Ren, Xiuling Chang, Xiyang Liu, Uwe Aickelin:
The effect of baroque music on the PassPoints graphical password. CoRR abs/1306.3054 (2013) - [i1]Haichang Gao, Xiuling Chang, Zhongjie Ren, Uwe Aickelin, Liming Wang:
Can background baroque music help to improve the memorability of graphical passwords? CoRR abs/1306.3055 (2013) - 2012
- [j2]Haichang Gao, Licheng Ma, Wei Jia, Fei Ye:
Multiple password interference in graphical passwords. Int. J. Inf. Comput. Secur. 5(1): 11-27 (2012) - [c14]Haichang Gao, Wei Wang, Ye Fan:
Divide and Conquer: An Efficient Attack on Yahoo! CAPTCHA. TrustCom 2012: 9-16 - 2011
- [j1]Xiyang Liu, Haichang Gao, Liming Wang, Xiuling Chang:
An Enhanced Drawing Reproduction Graphical Password Strategy. J. Comput. Sci. Technol. 26(6): 988-999 (2011) - [c13]Xiyang Liu, Jinhua Qiu, Licheng Ma, Haichang Gao, Zhongjie Ren:
A Novel Cued-recall Graphical Password Scheme. ICIG 2011: 949-956 - [c12]Haichang Gao, Licheng Ma, Jinhua Qiu, Xiyang Liu:
Exploration of a hand-based graphical password scheme. SIN 2011: 143-150 - 2010
- [c11]Liming Wang, Xiuling Chang, Zhongjie Ren, Haichang Gao, Xiyang Liu, Uwe Aickelin:
Against Spyware Using CAPTCHA in Graphical Password Scheme. AINA 2010: 760-767 - [c10]Haichang Gao, Zhongjie Ren, Xiuling Chang, Xiyang Liu, Uwe Aickelin:
The effect of baroque music on the PassPoints graphical password. CIVR 2010: 129-134 - [c9]Haichang Gao, Dan Yao, Honggang Liu, Xiyang Liu, Liming Wang:
A Novel Image Based CAPTCHA Using Jigsaw Puzzle. CSE 2010: 351-356 - [c8]Haichang Gao, Zhongjie Ren, Xiuling Chang, Xiyang Liu, Uwe Aickelin:
A New Graphical Password Scheme Resistant to Shoulder-Surfing. CW 2010: 194-199 - [c7]Haichang Gao, Xiuling Chang, Zhongjie Ren, Uwe Aickelin, Liming Wang:
Can Background Baroque Music Help to Improve the Memorability of Graphical Passwords? ICIAR (2) 2010: 378-387
2000 – 2009
- 2009
- [c6]Hong Xia, Yan Chen, Zengzhi Li, Haichang Gao, Yanping Chen:
Web Service Selection Algorithm Based on Particle Swarm Optimization. DASC 2009: 467-472 - [c5]Haichang Gao, Xiyang Liu, Ruyi Dai, Sidong Wang, Xiuling Chang:
Analysis and Evaluation of the ColorLogin Graphical Password Scheme. ICIG 2009: 722-727 - [c4]Haichang Gao, Xiyang Liu:
A new graphical password scheme against spyware by using CAPTCHA. SOUPS 2009 - 2008
- [c3]Haichang Gao, Xuewu Guo, Xiaoping Chen, Liming Wang, Xiyang Liu:
YAGP: Yet Another Graphical Password Strategy. ACSAC 2008: 121-129 - [c2]Haichang Gao, Weizhou Zhong:
Multiobjective Optimization Using Clustering Based Two Phase PSO. ICNC (6) 2008: 520-524 - 2006
- [c1]Haichang Gao, Boqin Feng, Yun Hou, Li Zhu:
Training RBF Neural Network with Hybrid Particle Swarm Optimization. ISNN (1) 2006: 577-583
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint