{"id":"https://openalex.org/W6888571777","doi":"https://doi.org/10.21227/css6-ds36","title":"Detecting XSS attacks by combining CNN with LSTM","display_name":"Detecting XSS attacks by combining CNN with LSTM","publication_year":2019,"publication_date":"2019-12-03","ids":{"openalex":"https://openalex.org/W6888571777","doi":"https://doi.org/10.21227/css6-ds36"},"language":"en","primary_location":{"id":"doi:10.21227/css6-ds36","is_oa":true,"landing_page_url":"https://doi.org/10.21227/css6-ds36","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"dataset"},"type":"dataset","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.21227/css6-ds36","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Zhang, Boyu","orcid":"https://orcid.org/0000-0003-1604-0552"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhang, Boyu","raw_affiliation_strings":["Guangzhou University"],"affiliations":[{"raw_affiliation_string":"Guangzhou University","institution_ids":["https://openalex.org/I37987034"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I37987034"],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":null,"topics":[],"keywords":[{"id":"https://openalex.org/keywords/cross-site-scripting","display_name":"Cross-site scripting","score":0.8016999959945679},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.602400004863739},{"id":"https://openalex.org/keywords/word2vec","display_name":"Word2vec","score":0.5922999978065491},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.36410000920295715},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.3587000072002411},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.3528999984264374}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8521000146865845},{"id":"https://openalex.org/C39569185","wikidata":"https://www.wikidata.org/wiki/Q371199","display_name":"Cross-site scripting","level":5,"score":0.8016999959945679},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.602400004863739},{"id":"https://openalex.org/C2776461190","wikidata":"https://www.wikidata.org/wiki/Q22673982","display_name":"Word2vec","level":3,"score":0.5922999978065491},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5324000120162964},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.36410000920295715},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.3587000072002411},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3528999984264374},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3450999855995178},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.34470000863075256},{"id":"https://openalex.org/C90805587","wikidata":"https://www.wikidata.org/wiki/Q10944557","display_name":"Word (group theory)","level":2,"score":0.3231000006198883},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2770000100135803},{"id":"https://openalex.org/C147168706","wikidata":"https://www.wikidata.org/wiki/Q1457734","display_name":"Recurrent neural network","level":3,"score":0.27399998903274536},{"id":"https://openalex.org/C2777530160","wikidata":"https://www.wikidata.org/wiki/Q41796","display_name":"Sentence","level":2,"score":0.2678999900817871},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.26249998807907104},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2551000118255615},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.25060001015663147}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.21227/css6-ds36","is_oa":true,"landing_page_url":"https://doi.org/10.21227/css6-ds36","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"dataset"}],"best_oa_location":{"id":"doi:10.21227/css6-ds36","is_oa":true,"landing_page_url":"https://doi.org/10.21227/css6-ds36","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"dataset"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"XSS":[0,55,68,104,114],"is":[1,149,170],"a":[2,49,91,136,142],"common":[3],"attack":[4],"that":[5,97],"has":[6,64],"been":[7],"in":[8,29,113],"the":[9,18,41,86,124,127,152,158,161,174],"OWAP":[10],"Top":[11],"10":[12],"project":[13],"for":[14],"many":[15],"years.":[16],"With":[17],"development":[19],"of":[20,51,139,145,154,160,176],"deep":[21,23],"learning,":[22],"neural":[24,59,82],"networks":[25],"are":[26],"gradually":[27],"applied":[28],"various":[30],"fields":[31],"such":[32],"as":[33],"finance,":[34],"medical":[35],"treatment":[36],"and":[37,76,122,131,141],"so":[38],"on.":[39],"At":[40],"same":[42],"time,":[43],"security":[44],"researchers":[45],"have":[46],"also":[47],"proposed":[48,162,177],"series":[50],"methods":[52],"to":[53,66,102,110,156,172],"detect":[54,67,103],"attacks":[56,69],"based":[57],"on":[58,85],"networks,":[60],"but":[61],"no":[62],"one":[63],"tried":[65],"by":[70,126],"combining":[71,129],"Convolutional":[72],"Neural":[73],"Network":[74],"(CNN)":[75],"Long":[77],"Short":[78],"Term":[79],"Memory(LSTM)":[80],"recurrent":[81],"network.":[83],"Based":[84],"fact,":[87],"this":[88],"paper":[89],"proposes":[90],"new":[92],"model":[93,128],"which":[94],"called":[95],"3C-LSTM":[96],"combines":[98],"CNN":[99,130],"with":[100,151],"LSTM":[101],"attacks.":[105],"Firstly,":[106],"it":[107,120],"applies":[108],"word2vec":[109],"convert":[111],"words":[112],"payloads":[115],"into":[116],"word":[117],"vectors.":[118],"Then":[119],"trains":[121],"tests":[123],"data":[125],"LSTM.":[132],"The":[133,164],"method":[134],"gets":[135],"precision":[137],"rate":[138,144],"99.88%":[140],"recall":[143],"99.04%.":[146],"Our":[147],"work":[148,153],"compared":[150],"other":[155],"show":[157],"excellence":[159],"method.":[163,178],"receiver":[165],"operating":[166],"characteristic":[167],"(ROC)":[168],"curve":[169],"plotted":[171],"demonstrate":[173],"effectiveness":[175]},"counts_by_year":[{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
