[1] HERLEY C, VAN OORSCHOT P. A research agenda acknowledging the persistence of passwords[J]. IEEE Security & Privacy, 2012, 10(1): 28-36.
[2] FREEMAN D, JAIN S, DUERMUTH M, et al. Who are you? A statistical approach to measuring user authenticity[C]//Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016: 21-24.
[3] VERAS R, COLLINS C, THORPE J. On semantic patterns of passwords and their security impact[C]//Proceedings of the 21st Annual?Network and Distributed System Security Symposium, 2014: 1-16.
[4] WANG D, WANG P, HE D B, et al. Birthday, Name and bifacial-security: understanding passwords of Chinese web users[C]//Proceedings of the 28th USENIX Security Symposium. Berkeley: USENIX Association, 2019: 1537-1555.
[5] ELMAN J. Finding structure in time[J]. Cognitive Science, 1990, 14(2): 179-211.
[6] HOCHREITER S, SCHMIDHUBER J. Long short-term memory[J]. Neural Computation, 1997, 9(8): 1735-1780.
[7] GOODFELLOW IJ, POUGET-ABADIE J, MIRZA M, et al. Generative adversarial nets[C]//Proceedings of the 27th International Conference on Neural Information Processing Systems. Cambridge: MIT Press, 2014: 2672-2680.
[8] DEVLIN J, CHANG M W, LEE K, et al. BERT: pre-training of deep bidirectional transformers for language understanding[C]//Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. Stroudsburg: ACL, 2019: 4171-4186.
[9] BROWN T B, MANN B, RYDER N, et al. Language models are few-shot learners[C]//Proceedings of the 34th International Conference on Neural Information Processing Systems, 2020: 1877-1901.
[10] RANDO J, PEREZ-CRUZ F, HITAJ B. PassGPT: password modeling and (guided) generation with large language models[C]//Proceedings of the 28th European Symposium on Research in Computer Security. Cham: Springer, 2024: 164-183.
[11] PETRONI F, ROCKT?SCHEL T, RIEDEL S, et al. Language models as knowledge bases?[C]//Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing. Stroudsburg: ACL, 2019: 2463-2473.
[12] ROBERTS A, RAFFEL C, SHAZEER N. How much knowledge can you pack into the parameters of a language model?[C]//Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing. Stroudsburg: ACL, 2020: 5418-5426.
[13] MIKOLOV T, SUTSKEVER I, CHEN K, et al. Distributed representations of words and phrases and their compositionality[EB/OL]. [2024-05-10]. https://arxiv.org/abs/1310.4546.
[14] PENNINGTON J, SOCHER R, MANNING C. Glove: global vectors for word representation[C]//Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing. Stroudsburg: ACL, 2014: 1532-1543.
[15] VASWANI A, SHAZEER N, PARMAR N, et al. Attention is all you need[C]//Advances in Neural Information Processing Systems 30, 2017.
[16] WEIR M, AGGARWAL S, DE MEDEIROS B, et al. Password cracking using probabilistic context-free grammars[C]//Proceedings of the 2009 30th IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2009: 391-405.
[17] CASTELLUCCIA C, DüRMUTH M, PERITO D. Adaptive password-strength meters from Markov models[C]//Proceedings of the 19th Network and Distributed System Security Symposium, 2012.
[18] LI Y, WANG H N, SUN K. Personal information in passwords and its security implications[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(10): 2320-2333.
[19] LI W D, ZENG J P. Leet usage and its effect on password security[J]. IEEE Transactions on Information Forensics and Security, 2021, 16: 2130-2143. |