{"id":"https://openalex.org/W4312783147","doi":"https://doi.org/10.1007/978-981-19-8285-9_8","title":"Webpage Tampering Detection Method Based on BiGRU-CRF-RCNN","display_name":"Webpage Tampering Detection Method Based on BiGRU-CRF-RCNN","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4312783147","doi":"https://doi.org/10.1007/978-981-19-8285-9_8"},"language":"en","primary_location":{"id":"doi:10.1007/978-981-19-8285-9_8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-981-19-8285-9_8","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1007/978-981-19-8285-9_8","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101917606","display_name":"Xiangyu Fan","orcid":"https://orcid.org/0000-0001-6420-0683"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Xiangyu Fan","raw_affiliation_strings":["Beijing Knownsec Information Technology Co.,Ltd, Beijing, 100097, China"],"affiliations":[{"raw_affiliation_string":"Beijing Knownsec Information Technology Co.,Ltd, Beijing, 100097, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049646905","display_name":"Jilong Yang","orcid":"https://orcid.org/0000-0001-5162-3740"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jilong Yang","raw_affiliation_strings":["Beijing Knownsec Information Technology Co.,Ltd, Beijing, 100097, China"],"affiliations":[{"raw_affiliation_string":"Beijing Knownsec Information Technology Co.,Ltd, Beijing, 100097, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002311337","display_name":"Wei Zhao","orcid":"https://orcid.org/0000-0002-6268-2559"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wei Zhao","raw_affiliation_strings":["Beijing Knownsec Information Technology Co.,Ltd, Beijing, 100097, China"],"affiliations":[{"raw_affiliation_string":"Beijing Knownsec Information Technology Co.,Ltd, Beijing, 100097, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084888021","display_name":"Jincheng Deng","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jincheng Deng","raw_affiliation_strings":["Beijing Knownsec Information Technology Co.,Ltd, Beijing, 100097, China"],"affiliations":[{"raw_affiliation_string":"Beijing Knownsec Information Technology Co.,Ltd, Beijing, 100097, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048398271","display_name":"Fangming Liu","orcid":"https://orcid.org/0000-0002-8570-1345"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fangming Liu","raw_affiliation_strings":["Beijing Knownsec Information Technology Co.,Ltd, Beijing, 100097, China"],"affiliations":[{"raw_affiliation_string":"Beijing Knownsec Information Technology Co.,Ltd, Beijing, 100097, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101917606"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.8101,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.74582463,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"113","last_page":"126"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9779999852180481,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/web-page","display_name":"Web page","score":0.7996564507484436},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5941755771636963},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5834611058235168},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.5129730105400085},{"id":"https://openalex.org/keywords/precision-and-recall","display_name":"Precision and recall","score":0.4541061818599701},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4281049966812134},{"id":"https://openalex.org/keywords/recall","display_name":"Recall","score":0.4265725910663605},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.39370596408843994},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2924612760543823},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.1293632984161377},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.08082175254821777}],"concepts":[{"id":"https://openalex.org/C21959979","wikidata":"https://www.wikidata.org/wiki/Q36774","display_name":"Web page","level":2,"score":0.7996564507484436},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5941755771636963},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5834611058235168},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.5129730105400085},{"id":"https://openalex.org/C81669768","wikidata":"https://www.wikidata.org/wiki/Q2359161","display_name":"Precision and recall","level":2,"score":0.4541061818599701},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4281049966812134},{"id":"https://openalex.org/C100660578","wikidata":"https://www.wikidata.org/wiki/Q18733","display_name":"Recall","level":2,"score":0.4265725910663605},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39370596408843994},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2924612760543823},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.1293632984161377},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.08082175254821777},{"id":"https://openalex.org/C180747234","wikidata":"https://www.wikidata.org/wiki/Q23373","display_name":"Cognitive psychology","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-981-19-8285-9_8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-981-19-8285-9_8","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.1007/978-981-19-8285-9_8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-981-19-8285-9_8","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6299999952316284,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W2963625095","https://openalex.org/W3014343990"],"related_works":["https://openalex.org/W83344948","https://openalex.org/W2536723159","https://openalex.org/W2041190900","https://openalex.org/W2001121861","https://openalex.org/W2897178939","https://openalex.org/W2886703719","https://openalex.org/W3034643069","https://openalex.org/W2282329238","https://openalex.org/W3189089173","https://openalex.org/W3034659032"],"abstract_inverted_index":{"Abstract":[0],"With":[1],"the":[2,5,37,42,52,55,72,81,87,94,105],"development":[3],"of":[4],"Internet,":[6],"cyber":[7],"security":[8],"events":[9,15],"occur":[10],"frequently,":[11],"especially":[12],"webpage":[13,30,38,43,53,117,128],"tampering":[14,31,98,118,129],"account":[16],"for":[17,97],"a":[18,29],"high":[19],"proportion.":[20],"In":[21,131],"response":[22],"to":[23,39,51,74],"this":[24,26],"phenomenon,":[25],"paper":[27],"constructs":[28],"detection":[32],"framework":[33,106,126],"BCR.":[34],"Based":[35],"on":[36],"be":[40],"detected,":[41],"text":[44,56],"data":[45],"is":[46,84,121],"segmented":[47],"and":[48,68,91,113,139],"extracted":[49,59,88],"according":[50],"structure,":[54],"features":[57],"are":[58],"by":[60,86],"using":[61],"BiGRU":[62],"model":[63,96],"combined":[64,70],"with":[65,71],"context":[66],"dependence,":[67],"then":[69],"CRF":[73],"learn":[75],"sequence":[76],"state":[77],"labeling":[78],"named":[79,89],"entities,":[80],"word":[82],"vector":[83],"constructed":[85],"entity":[90],"brought":[92],"into":[93],"RCNN":[95,125],"detection.":[99,130],"The":[100],"experiment":[101],"results":[102],"show":[103],"that":[104],"has":[107],"achieved":[108,136],"95.37%":[109],"precision,":[110],"95.35%":[111],"recall":[112],"95.34%":[114],"F1-Score":[115],"in":[116,127],"detection,":[119],"which":[120],"better":[122],"than":[123],"Textrank":[124],"practical":[132],"application,":[133],"it":[134],"also":[135],"95.13%":[137],"precision":[138],"93.25%":[140],"recall.":[141]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
