{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:53Z","timestamp":1750220873569,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,16]],"date-time":"2019-11-16T00:00:00Z","timestamp":1573862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,16]]},"DOI":"10.1145\/3378065.3378126","type":"proceedings-article","created":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T10:42:21Z","timestamp":1586342541000},"page":"315-319","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["DGA domain name detection based on BiGRU-MCNN"],"prefix":"10.1145","author":[{"given":"ChaoQuan","family":"Chen","sequence":"first","affiliation":[{"name":"College of Information Science and Engineering, Guilin University of Technology"}]},{"given":"LeiLei","family":"Pan","sequence":"additional","affiliation":[{"name":"College of Information Science and Engineering, Guilin University of Technology"}]},{"given":"XiaoLan","family":"Xie","sequence":"additional","affiliation":[{"name":"College of Information Science and Engineering, Guilin University of Technology, Guilin, Guangxi Zhuang Autonomous Region, China"}]}],"member":"320","published-online":{"date-parts":[[2020,4,8]]},"reference":[{"issue":"05","key":"e_1_3_2_1_1_1","first-page":"111","article-title":"Comparison of DGA Domain Detection Models Using Deep Learning[J]","volume":"46","author":"PEI L Z","year":"2019","journal-title":"Computer Science"},{"key":"e_1_3_2_1_2_1","unstructured":"ZHOU K WAN L YU H W. Detection of Malicious Domain Names Based on AN and LSTM[JOL]. Computer Engineering and Applications 20190326.  ZHOU K WAN L YU H W. Detection of Malicious Domain Names Based on AN and LSTM[JOL]. Computer Engineering and Applications 20190326."},{"key":"e_1_3_2_1_3_1","article-title":"Video colorization based on a hybrid network model of LSTM and CNN[J\/OL]","author":"ZHANG Z","year":"2019","journal-title":"Journal of Computer Applications:1--6"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.11648\/j.ijiis.20170606.11"},{"key":"e_1_3_2_1_5_1","first-page":"0531","article-title":"Network intrusion detection model based on improved convolutional neural network[J\/OL]","author":"YANG H Y","year":"2019","journal-title":"Journal of Computer Applications:1--8"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-018-1177-7"},{"volume-title":"Beijing University Of Posts and Telecommunications","year":"2019","author":"HUANG S Q","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","first-page":"10","article-title":"Multi-level Attention-based Bidirectional Long Short-Term Memory Networks for Relation Extract[J]","volume":"2019","author":"ZHOU W Y","journal-title":"Software Guide"},{"key":"e_1_3_2_1_9_1","unstructured":"XU B Y GAO M T. Hybrid Recommendation Algorithm Based on GRU Network and Matrix Decomposition[J]. Modern Computer (Professional Edition) 2018(26):13--17+42.  XU B Y GAO M T. Hybrid Recommendation Algorithm Based on GRU Network and Matrix Decomposition[J]. Modern Computer (Professional Edition) 2018(26):13--17+42."},{"issue":"10","key":"e_1_3_2_1_10_1","first-page":"10","article-title":"DGA domain ensemble detection method based on deep learning[J]","volume":"37","author":"LUO Y Q","year":"2018","journal-title":"Information Technology And Network Security"},{"key":"e_1_3_2_1_11_1","first-page":"0322","article-title":"Hidden Markov Model Research and Application in the detection of malicious domain names[J\/OL]","author":"BAI L L","year":"2019","journal-title":"Computer Engineering: 1--9"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1087.2010.00227"},{"volume-title":"Journal of Pure and Applied Algebra","year":"2018","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","first-page":"1011","article-title":"Text sentiment classification model based on BiGRU-Attention neural network[J\/OL]","author":"WANG W","year":"2018","journal-title":"Journal of Computer Applications:1--10"}],"event":{"name":"ICIIP 2019: 2019 4th International Conference on Intelligent Information Processing","sponsor":["Guilin Guilin University of Technology, Guilin, China","Wuhan University of Technology Wuhan University of Technology, Wuhan, China","International Engineering and Technology Institute, Hong Kong International Engineering and Technology Institute, Hong Kong"],"location":"China China","acronym":"ICIIP 2019"},"container-title":["Proceedings of the 2019 4th International Conference on Intelligent Information Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378065.3378126","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3378065.3378126","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:24:00Z","timestamp":1750202640000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378065.3378126"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,16]]},"references-count":14,"alternative-id":["10.1145\/3378065.3378126","10.1145\/3378065"],"URL":"https:\/\/doi.org\/10.1145\/3378065.3378126","relation":{},"subject":[],"published":{"date-parts":[[2019,11,16]]},"assertion":[{"value":"2020-04-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}