Home > Research > Researchers > Dr Jeff Yan > Publications

Dr Jeff Yan

Formerly at Lancaster University

  1. 2010
  2. Published

    The robustness of a new CAPTCHA

    El, A. S., Yan, J. & Marshall, L., 2010, Proceedings of the 3rd European Workshop on System Security, EUROSEC'10. New York: ACM, p. 36-41 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. 2009
  4. Published

    CAPTCHA security: a case study

    Yan, J. & El Ahmad, A. S., 07/2009, In: IEEE Security and Privacy Magazine. 7, 4, p. 22-28 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    An investigation of cheating in online games

    Yan, J. & Randell, B., 05/2009, In: IEEE Security and Privacy Magazine. 7, 3, p. 37-44 8 p., 5054908.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Bot, cyborg and automated turing test: (or "putting the humanoid in the protocol")

    Yan, J., 2009, Security protocols: 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Berlin: Springer Verlag, p. 190-197 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5087 ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Magic Bullet: a dual-purpose computer game

    Yan, J. & Yu, S., 2009, HCOMP '09 Proceedings of the ACM SIGKDD Workshop on Human Computation. New York: ACM, p. 32-33 2 p. 1600161

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Streamlining attacks on CAPTCHAs with a computer game

    Yan, J. & Yu, S. Y., 2009, IJCAI--09, proceedings of the Tweny-First International Joint Conference on Artificial Intelligence: Pasadena, California, USA, 11-17 July 2009. Menlo Park, Calif.: AAAI, p. 2095-2100 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. 2008
  10. Published

    A low-cost attack on a Microsoft captcha

    Yan, J. & El Ahmad, A. S., 2008, Proceedings of the 15th ACM conference on Computer and communications security - CCS '08. New York: ACM, p. 543-554 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Usability of CAPTCHAs or usability issues in CAPTCHA design

    Yan, J. & El Ahmad, A. S., 2008, SOUPS 2008 - Proceedings of the 4th Symposium on Usable Privacy and Security. New York: ACM, p. 44-52 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. 2007
  13. Published

    Breaking visual CAPTCHAs with naive pattern recognition algorithms

    Yan, J. & El Ahmad, A. S., 12/2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007). IEEE, p. 279-291 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  14. Published

    Do background images improve "draw a secret" graphical passwords?

    Dunphy, P. & Yan, J., 2007, CCS '07 Proceedings of the 14th ACM conference on Computer and communications security - CCS '07. New York: ACM, p. 36-47 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top