{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T12:53:42Z","timestamp":1763643222484,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,1,16]],"date-time":"2021-01-16T00:00:00Z","timestamp":1610755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,1,16]]},"DOI":"10.1145\/3451471.3451491","type":"proceedings-article","created":{"date-parts":[[2021,7,13]],"date-time":"2021-07-13T22:20:59Z","timestamp":1626214859000},"page":"118-123","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Web Access Log Anomaly Detection Based on Deep Learning"],"prefix":"10.1145","author":[{"given":"Quan","family":"Liu","sequence":"first","affiliation":[{"name":"China Institute of Atomic Energy, China"}]}],"member":"320","published-online":{"date-parts":[[2021,7,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Zhiqiong Liang and Xiaohong Zhang. 2018. Discuss on the Problem of Computer Network Information Security in the Age of Big Data.  Zhiqiong Liang and Xiaohong Zhang. 2018. Discuss on the Problem of Computer Network Information Security in the Age of Big Data."},{"key":"e_1_3_2_1_2_1","unstructured":"Chen Xi. 2019. Analysis of Computer Network Information Security in the Age of Big Data.  Chen Xi. 2019. Analysis of Computer Network Information Security in the Age of Big Data."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1610252.1610289"},{"key":"e_1_3_2_1_4_1","unstructured":"Barbachowska Bo\u017cenna. 2012. Information security in the company.\u00a0Journal of Modern ence(13) 20.  Barbachowska Bo\u017cenna. 2012. Information security in the company.\u00a0Journal of Modern ence(13) 20."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Basheer I. A. and Hajmeer M. N. . 2000. Artificial neural networks: fundamentals computing design and application.\u00a0Journal of Microbiological Methods \u00a043(1) 3-31.  Basheer I. A. and Hajmeer M. N. . 2000. Artificial neural networks: fundamentals computing design and application.\u00a0Journal of Microbiological Methods \u00a043(1) 3-31.","DOI":"10.1016\/S0167-7012(00)00201-3"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/646943.712093"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Rumelhart D. E. Hinton G. E. and Williams R. J. . 1986. Learning representations by back-propagating errors.\u00a0Nature \u00a0323(6088) 533-536.  Rumelhart D. E. Hinton G. E. and Williams R. J. . 1986. Learning representations by back-propagating errors.\u00a0Nature \u00a0323(6088) 533-536.","DOI":"10.1038\/323533a0"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/363347.363387"},{"volume-title":"Xu Yang and Enhong Wu","year":"2019","author":"Yuchen Qiao","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","unstructured":"Ioffe S. and Szegedy C. . 2015. Batch normalization: accelerating deep network training by reducing internal covariate shift.  Ioffe S. and Szegedy C. . 2015. Batch normalization: accelerating deep network training by reducing internal covariate shift."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Dahl G. E. Sainath T. N. and Hinton G. E. . 2013. Improving deep neural networks for LVCSR using rectified linear units and dropout.\u00a0IEEE International Conference on Acoustics. IEEE.  Dahl G. E. Sainath T. N. and Hinton G. E. . 2013. Improving deep neural networks for LVCSR using rectified linear units and dropout.\u00a0IEEE International Conference on Acoustics. IEEE.","DOI":"10.1109\/ICASSP.2013.6639346"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Gardner W. A. . 1984. Learning characteristics of stochastic-gradient-descent algorithms: a general study analysis and critique.\u00a0Signal Processing \u00a06(2) 113-133.  Gardner W. A. . 1984. Learning characteristics of stochastic-gradient-descent algorithms: a general study analysis and critique.\u00a0Signal Processing \u00a06(2) 113-133.","DOI":"10.1016\/0165-1684(84)90013-6"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/646815.708603"},{"first-page":"2999","volume-title":"Focal Loss for Dense Object Detection.\u00a02017 IEEE International Conference on Computer Vision (ICCV)\u00a0(Vol.PP","author":"Lin T. Y.","key":"e_1_3_2_1_14_1"}],"event":{"name":"ICSIM 2021: 2021 The 4th International Conference on Software Engineering and Information Management","acronym":"ICSIM 2021","location":"Yokohama Japan"},"container-title":["2021 The 4th International Conference on Software Engineering and Information Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3451471.3451491","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3451471.3451491","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:59Z","timestamp":1750197779000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3451471.3451491"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,16]]},"references-count":14,"alternative-id":["10.1145\/3451471.3451491","10.1145\/3451471"],"URL":"https:\/\/doi.org\/10.1145\/3451471.3451491","relation":{},"subject":[],"published":{"date-parts":[[2021,1,16]]},"assertion":[{"value":"2021-07-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}