{"id":"https://openalex.org/W2981809210","doi":"https://doi.org/10.1109/access.2019.2947527","title":"SQL Injection Detection for Web Applications Based on Elastic-Pooling CNN","display_name":"SQL Injection Detection for Web Applications Based on Elastic-Pooling CNN","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2981809210","doi":"https://doi.org/10.1109/access.2019.2947527","mag":"2981809210"},"language":"en","primary_location":{"id":"doi:10.1109/access.2019.2947527","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2947527","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08877739.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08877739.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006725776","display_name":"Xin Xie","orcid":"https://orcid.org/0000-0002-8909-3105"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xin Xie","raw_affiliation_strings":["School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019325315","display_name":"Chunhui Ren","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunhui Ren","raw_affiliation_strings":["School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088807907","display_name":"Yusheng Fu","orcid":"https://orcid.org/0000-0002-6786-874X"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yusheng Fu","raw_affiliation_strings":["School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100639068","display_name":"Jie Xu","orcid":"https://orcid.org/0000-0001-6632-7629"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Xu","raw_affiliation_strings":["School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024638568","display_name":"Jinhong Guo","orcid":"https://orcid.org/0000-0003-2659-3150"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinhong Guo","raw_affiliation_strings":["School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5006725776"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":9.1482,"has_fulltext":true,"cited_by_count":67,"citation_normalized_percentile":{"value":0.97873721,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"7","issue":null,"first_page":"151475","last_page":"151481"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8347862958908081},{"id":"https://openalex.org/keywords/sql-injection","display_name":"SQL injection","score":0.820533037185669},{"id":"https://openalex.org/keywords/pooling","display_name":"Pooling","score":0.7085138559341431},{"id":"https://openalex.org/keywords/sql","display_name":"SQL","score":0.6590375304222107},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.6562650799751282},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.5492463707923889},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.41946470737457275},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36905521154403687},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.19740504026412964},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19349628686904907},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.19303283095359802},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.17341271042823792},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.15953633189201355},{"id":"https://openalex.org/keywords/query-by-example","display_name":"Query by Example","score":0.15185734629631042}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8347862958908081},{"id":"https://openalex.org/C150451098","wikidata":"https://www.wikidata.org/wiki/Q506059","display_name":"SQL injection","level":5,"score":0.820533037185669},{"id":"https://openalex.org/C70437156","wikidata":"https://www.wikidata.org/wiki/Q7228652","display_name":"Pooling","level":2,"score":0.7085138559341431},{"id":"https://openalex.org/C510870499","wikidata":"https://www.wikidata.org/wiki/Q47607","display_name":"SQL","level":2,"score":0.6590375304222107},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.6562650799751282},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.5492463707923889},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.41946470737457275},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36905521154403687},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.19740504026412964},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19349628686904907},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.19303283095359802},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.17341271042823792},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.15953633189201355},{"id":"https://openalex.org/C194222762","wikidata":"https://www.wikidata.org/wiki/Q114486","display_name":"Query by Example","level":4,"score":0.15185734629631042},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.0},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2019.2947527","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2947527","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08877739.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:1b07d7924644483a94319872ff0a6724","is_oa":true,"landing_page_url":"https://doaj.org/article/1b07d7924644483a94319872ff0a6724","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 7, Pp 151475-151481 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2019.2947527","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2947527","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08877739.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2981809210.pdf","grobid_xml":"https://content.openalex.org/works/W2981809210.grobid-xml"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W1662341371","https://openalex.org/W2011026590","https://openalex.org/W2109255472","https://openalex.org/W2129413220","https://openalex.org/W2339647006","https://openalex.org/W2517299529","https://openalex.org/W2534651220","https://openalex.org/W2547833391","https://openalex.org/W2584488748","https://openalex.org/W2590205279","https://openalex.org/W2736668610","https://openalex.org/W2755399248","https://openalex.org/W2780468994","https://openalex.org/W2782994466","https://openalex.org/W2785432546","https://openalex.org/W2800472070","https://openalex.org/W2804345915","https://openalex.org/W2811049446","https://openalex.org/W2911964244","https://openalex.org/W3100321043","https://openalex.org/W4254288529","https://openalex.org/W6729459295","https://openalex.org/W6785474550"],"related_works":["https://openalex.org/W3107810407","https://openalex.org/W4298018373","https://openalex.org/W2571113418","https://openalex.org/W2359391484","https://openalex.org/W4206678297","https://openalex.org/W3196457791","https://openalex.org/W2133089983","https://openalex.org/W4256450364","https://openalex.org/W4385706035","https://openalex.org/W4238821156"],"abstract_inverted_index":{"An":[0],"enterprise's":[1],"data":[2,81],"can":[3,73,98],"be":[4],"one":[5],"of":[6,55,88],"its":[7],"most":[8],"important":[9],"assets":[10],"and":[11,18,45,64,82,102],"often":[12],"critical":[13],"to":[14,31,105],"the":[15,27,35,85,93],"firm's":[16],"development":[17],"survival.":[19],"SQL":[20,56,86],"injection":[21,57,87],"attack":[22],"is":[23,103],"ranked":[24],"first":[25],"in":[26],"top":[28],"ten":[29],"risks":[30],"network":[32],"applications":[33],"by":[34],"Open":[36],"Web":[37],"Application":[38],"Security":[39],"Project":[40],"(OWASP).":[41],"Its":[42],"harmfulness,":[43],"universality,":[44],"severe":[46],"situation":[47],"are":[48],"self-evident.":[49],"This":[50,71],"paper":[51],"presents":[52],"a":[53,75],"method":[54,72],"detection":[58,69],"based":[59],"on":[60,92],"Elastic-Pooling":[61],"CNN":[62],"(EP-CNN)":[63],"compares":[65],"it":[66,97],"with":[67],"traditional":[68],"methods.":[70],"output":[74],"fixed":[76],"two-dimensional":[77],"matrix":[78],"without":[79],"truncating":[80],"effectively":[83],"detects":[84],"web":[89],"applications.":[90],"Based":[91],"irregular":[94],"matching":[95],"characteristics,":[96],"identify":[99],"new":[100],"attacks":[101],"harder":[104],"bypass.":[106]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":19},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":6}],"updated_date":"2026-03-22T08:09:32.410652","created_date":"2025-10-10T00:00:00"}
