{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:25:15Z","timestamp":1740101115071,"version":"3.37.3"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,19]],"date-time":"2022-10-19T00:00:00Z","timestamp":1666137600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,19]],"date-time":"2022-10-19T00:00:00Z","timestamp":1666137600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100016643","name":"Japan Advanced Institute of Science and Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100016643","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,19]]},"DOI":"10.1109\/kse56063.2022.9953788","type":"proceedings-article","created":{"date-parts":[[2022,11,21]],"date-time":"2022-11-21T21:25:53Z","timestamp":1669065953000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Deep Models with Differential Privacy for Distributed Web Attack Detection"],"prefix":"10.1109","author":[{"given":"Anh-Tu","family":"Tran","sequence":"first","affiliation":[{"name":"Academy of Cryptography Techniques,Hanoi,Vietnam"}]},{"given":"The Dung","family":"Luong","sequence":"additional","affiliation":[{"name":"Academy of Cryptography Techniques,Hanoi,Vietnam"}]},{"given":"Xuan Sang","family":"Pham","sequence":"additional","affiliation":[{"name":"Hanoi University of Science &#x0026; Technology,Hanoi,Vietnam"}]},{"given":"Thi Luong","family":"Tran","sequence":"additional","affiliation":[{"name":"Academy of Cryptography Techniques,Hanoi,Vietnam"}]}],"member":"263","reference":[{"journal-title":"Feder-ated learning of deep networks using model averaging","year":"2016","author":"mcmahan","key":"ref10"},{"key":"ref11","article-title":"Federated learning: strategies for improving communication efficiency","author":"konec?ny\u00b4","year":"2016","journal-title":"NIPS Workshop on Private Multi-Party Machine Learning PMPML '16"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134077"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"dwork","year":"2014","journal-title":"Found Trends Theor Comput Sci"},{"key":"ref16","article-title":"Concentrated differential privacy","volume":"abs 1603 1887","author":"dwork","year":"2016","journal-title":"CoRR"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32692-0_16"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3171592.3171594"},{"key":"ref3","article-title":"Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks","author":"melicher","year":"2016","journal-title":"26th USENIX Security Symposium"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-169431"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/656"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102662"},{"key":"ref7","article-title":"HTTP data set CSIC 2010","author":"gimen\u00e9z","year":"2010","journal-title":"Information Security Institute of CSIC (Spanish Research National Council)"},{"key":"ref2","first-page":"1","article-title":"Efficient detection of anomalous HTTP payloads in networks","author":"zhang","year":"2016","journal-title":"Southeastcon"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2014.7064617"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2938778"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2021.102298"},{"key":"ref21","article-title":"eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs","author":"saxe","year":"2017","journal-title":"File Paths and Registry Keys [J]"}],"event":{"name":"2022 14th International Conference on Knowledge and Systems Engineering (KSE)","start":{"date-parts":[[2022,10,19]]},"location":"Nha Trang, Vietnam","end":{"date-parts":[[2022,10,21]]}},"container-title":["2022 14th International Conference on Knowledge and Systems Engineering (KSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9953734\/9953612\/09953788.pdf?arnumber=9953788","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T19:52:57Z","timestamp":1670874777000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9953788\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,19]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/kse56063.2022.9953788","relation":{},"subject":[],"published":{"date-parts":[[2022,10,19]]}}}