{"id":"https://openalex.org/W3088969588","doi":"https://doi.org/10.1155/2021/5518528","title":"A Malicious URL Detection Model Based on Convolutional Neural Network","display_name":"A Malicious URL Detection Model Based on Convolutional Neural Network","publication_year":2021,"publication_date":"2021-05-15","ids":{"openalex":"https://openalex.org/W3088969588","doi":"https://doi.org/10.1155/2021/5518528","mag":"3088969588"},"language":"en","primary_location":{"id":"doi:10.1155/2021/5518528","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/5518528","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/5518528.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2021/5518528.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100404719","display_name":"Zhiqiang Wang","orcid":"https://orcid.org/0000-0002-1789-8414"},"institutions":[{"id":"https://openalex.org/I1302611135","display_name":"Ministry of Public Security of the People's Republic of China","ror":"https://ror.org/00bt9we26","country_code":"CN","type":"government","lineage":["https://openalex.org/I1302611135"]},{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiqiang Wang","raw_affiliation_strings":["Beijing Electronic Science and Technology Institute, Beijing 100071, China","Key Lab of Information Network Security, Ministry of Public Security, Shanghai 200000, China","State Information Center, Beijing 100032, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Beijing Electronic Science and Technology Institute, Beijing 100071, China","institution_ids":["https://openalex.org/I202334528"]},{"raw_affiliation_string":"Key Lab of Information Network Security, Ministry of Public Security, Shanghai 200000, China","institution_ids":["https://openalex.org/I1302611135"]},{"raw_affiliation_string":"State Information Center, Beijing 100032, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041490496","display_name":"Xiaorui Ren","orcid":"https://orcid.org/0000-0002-4931-4276"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaorui Ren","raw_affiliation_strings":["Beijing Electronic Science and Technology Institute, Beijing 100071, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Beijing Electronic Science and Technology Institute, Beijing 100071, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100706214","display_name":"Shuhao Li","orcid":"https://orcid.org/0000-0001-6071-5284"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuhao Li","raw_affiliation_strings":["Beijing Electronic Science and Technology Institute, Beijing 100071, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Beijing Electronic Science and Technology Institute, Beijing 100071, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030110303","display_name":"Bingyan Wang","orcid":"https://orcid.org/0000-0001-5110-4641"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bingyan Wang","raw_affiliation_strings":["Beijing Electronic Science and Technology Institute, Beijing 100071, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Beijing Electronic Science and Technology Institute, Beijing 100071, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101609539","display_name":"Jianyi Zhang","orcid":"https://orcid.org/0000-0001-8765-053X"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianyi Zhang","raw_affiliation_strings":["Beijing Electronic Science and Technology Institute, Beijing 100071, China"],"raw_orcid":"https://orcid.org/0000-0001-8765-053X","affiliations":[{"raw_affiliation_string":"Beijing Electronic Science and Technology Institute, Beijing 100071, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101991199","display_name":"Tao Yang","orcid":"https://orcid.org/0000-0003-2439-0579"},"institutions":[{"id":"https://openalex.org/I1302611135","display_name":"Ministry of Public Security of the People's Republic of China","ror":"https://ror.org/00bt9we26","country_code":"CN","type":"government","lineage":["https://openalex.org/I1302611135"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Yang","raw_affiliation_strings":["Key Lab of Information Network Security, Ministry of Public Security, Shanghai 200000, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Key Lab of Information Network Security, Ministry of Public Security, Shanghai 200000, China","institution_ids":["https://openalex.org/I1302611135"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101609539"],"corresponding_institution_ids":["https://openalex.org/I202334528"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":5.4036,"has_fulltext":true,"cited_by_count":25,"citation_normalized_percentile":{"value":0.95702545,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"2021","issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8868231773376465},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.7460013031959534},{"id":"https://openalex.org/keywords/pooling","display_name":"Pooling","score":0.6740045547485352},{"id":"https://openalex.org/keywords/word-embedding","display_name":"Word embedding","score":0.6453176736831665},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5999761819839478},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.49528566002845764},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.49007880687713623},{"id":"https://openalex.org/keywords/convolution","display_name":"Convolution (computer science)","score":0.4879092872142792},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4349881410598755},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4237465262413025},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3811894357204437},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.3791332244873047},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.36536669731140137}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8868231773376465},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.7460013031959534},{"id":"https://openalex.org/C70437156","wikidata":"https://www.wikidata.org/wiki/Q7228652","display_name":"Pooling","level":2,"score":0.6740045547485352},{"id":"https://openalex.org/C2777462759","wikidata":"https://www.wikidata.org/wiki/Q18395344","display_name":"Word embedding","level":3,"score":0.6453176736831665},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5999761819839478},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.49528566002845764},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.49007880687713623},{"id":"https://openalex.org/C45347329","wikidata":"https://www.wikidata.org/wiki/Q5166604","display_name":"Convolution (computer science)","level":3,"score":0.4879092872142792},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4349881410598755},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4237465262413025},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3811894357204437},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3791332244873047},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36536669731140137},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2021/5518528","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/5518528","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/5518528.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:72cfd70d2b0c40f3a03c7a09d1cc9211","is_oa":true,"landing_page_url":"https://doaj.org/article/72cfd70d2b0c40f3a03c7a09d1cc9211","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2021 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2021/5518528","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/5518528","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/5518528.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3239145288","display_name":null,"funder_award_id":"3201012","funder_id":"https://openalex.org/F4320330913","funder_display_name":"Beijing Electronic Science and Technology Institute"},{"id":"https://openalex.org/G3896891874","display_name":null,"funder_award_id":"2019M650606","funder_id":"https://openalex.org/F4320330913","funder_display_name":"Beijing Electronic Science and Technology Institute"},{"id":"https://openalex.org/G525011749","display_name":null,"funder_award_id":"2019M650606","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G7274881760","display_name":null,"funder_award_id":"C19614","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G7623686304","display_name":null,"funder_award_id":"3201012","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"},{"id":"https://openalex.org/F4320326699","display_name":"Ministry of Public Security of the People's Republic of China","ror":"https://ror.org/00bt9we26"},{"id":"https://openalex.org/F4320330913","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3088969588.pdf","grobid_xml":"https://content.openalex.org/works/W3088969588.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W17316494","https://openalex.org/W24863754","https://openalex.org/W113692204","https://openalex.org/W1561983441","https://openalex.org/W1832693441","https://openalex.org/W2053774863","https://openalex.org/W2146729596","https://openalex.org/W2170240176","https://openalex.org/W2371282818","https://openalex.org/W2498359591","https://openalex.org/W2546910111","https://openalex.org/W2623845346","https://openalex.org/W2728121559","https://openalex.org/W2741113415","https://openalex.org/W2745040938","https://openalex.org/W2765438277","https://openalex.org/W2772269457","https://openalex.org/W2786906486","https://openalex.org/W2912761498","https://openalex.org/W2915384871","https://openalex.org/W2942245271","https://openalex.org/W2963012544","https://openalex.org/W2963801581","https://openalex.org/W2997301451","https://openalex.org/W3013149934","https://openalex.org/W3013839555","https://openalex.org/W3037265579","https://openalex.org/W3162677480","https://openalex.org/W6748304876","https://openalex.org/W6775212727"],"related_works":["https://openalex.org/W2953234277","https://openalex.org/W2626256601","https://openalex.org/W147410782","https://openalex.org/W2900413183","https://openalex.org/W3022252430","https://openalex.org/W4390975304","https://openalex.org/W4287804464","https://openalex.org/W4401096132","https://openalex.org/W2964954556","https://openalex.org/W4286432911"],"abstract_inverted_index":{"With":[0],"the":[1,51,98,105,109,113,117,123,128,133,142,145,149,152,189,211,236,242,268,275],"development":[2],"of":[3,119,144,151,192,200],"Internet":[4],"technology,":[5],"network":[6,85,213,253,258],"security":[7],"is":[8,37,95,157,185,259],"under":[9],"diverse":[10],"threats.":[11],"In":[12,112,168],"particular,":[13],"attackers":[14],"can":[15,229],"spread":[16],"malicious":[17,34,56,75,281],"uniform":[18],"resource":[19],"locators":[20],"(URL)":[21],"to":[22,68,87,97,141,159,187,255],"carry":[23],"out":[24],"attacks":[25],"such":[26],"as":[27],"phishing":[28],"and":[29,148,215,250],"spam.":[30],"The":[31,219],"research":[32],"on":[33,80,127,182,226],"URL":[35,76,146,282],"detection":[36,64,77],"significant":[38],"for":[39,262],"defending":[40],"against":[41],"these":[42,89,284],"attacks.":[43],"However,":[44],"there":[45],"are":[46,66,137],"still":[47],"some":[48],"problems":[49],"in":[50,122,164,177,247,271,279],"current":[52,153],"research.":[53],"For":[54],"instance,":[55],"features":[57,163],"cannot":[58],"be":[59],"extracted":[60],"efficiently.":[61],"Some":[62],"existing":[63],"methods":[65],"easy":[67],"evade":[69],"by":[70],"attackers.":[71],"We":[72,233,265],"design":[73],"a":[74,81,165,173,193],"model":[78,269],"based":[79,181,225],"dynamic":[82,114],"convolutional":[83],"neural":[84],"(DCNN)":[86],"solve":[88],"problems.":[90],"A":[91],"new":[92,174],"folding":[93],"layer":[94,107,125,135],"added":[96],"original":[99],"multilayer":[100],"convolution":[101,115,154],"network.":[102],"It":[103],"replaces":[104],"pooling":[106,134],"with":[108],"k-max-pooling":[110],"layer.":[111],"algorithm,":[116],"width":[118],"feature":[120],"mapping":[121],"middle":[124],"depends":[126],"vector":[129,190],"input":[130,147],"dimension.":[131],"Moreover,":[132],"parameters":[136],"dynamically":[138],"adjusted":[139],"according":[140],"length":[143],"depth":[150],"layer,":[155],"which":[156,178,209,240,257],"beneficial":[158],"extracting":[160],"more":[161],"in-depth":[162],"wider":[166],"range.":[167],"this":[169,248,272],"paper,":[170],"we":[171,196,204],"propose":[172],"embedding":[175,180,184,217,224,228,244],"method":[176,245],"word":[179,223],"character":[183,227],"leveraged":[186],"learn":[188],"representation":[191],"URL.":[194],"Meanwhile,":[195],"conduct":[197,205,235],"two":[198],"groups":[199],"comparative":[201],"experiments.":[202],"First,":[203],"three":[206,238],"contrast":[207],"experiments,":[208],"adopt":[210],"same":[212,243],"structure":[214],"different":[216,252],"methods.":[218],"results":[220],"prove":[221],"that":[222,267],"achieve":[230],"higher":[231],"accuracy.":[232],"then":[234],"other":[237],"experiences,":[239],"use":[241,251],"proposed":[246],"paper":[249,273],"structures":[254],"determine":[256],"most":[260],"suitable":[261],"our":[263],"model.":[264],"verify":[266],"designed":[270],"has":[274],"highest":[276],"accuracy":[277],"(98%)":[278],"detecting":[280],"through":[283],"experiences.":[285]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
