{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T22:40:01Z","timestamp":1755902401759,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,25]]},"DOI":"10.1145\/3627341.3630377","type":"proceedings-article","created":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T12:07:01Z","timestamp":1702642021000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Research on xss Detection based on ALSTM Model and Traditional Feature Engineering"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-9480-3520","authenticated-orcid":false,"given":"Chenyang","family":"Ma","sequence":"first","affiliation":[{"name":"Dalian Polytechnic University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-0643-8245","authenticated-orcid":false,"given":"Jia","family":"Wang","sequence":"additional","affiliation":[{"name":"Experimental Instrument Center, Dalian Polytechnic University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3852-1305","authenticated-orcid":false,"given":"Zongting","family":"Li","sequence":"additional","affiliation":[{"name":"Dalian Polytechnic University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,12,15]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/2541315"},{"key":"e_1_3_2_1_2_1","first-page":"356","article-title":"XSS Attack detection Technology Based on SVM Classifier [J]","volume":"2018","author":"Cheng Zhao","unstructured":"Zhao Cheng, Chen Junxin, Yao Minghai. XSS Attack detection Technology Based on SVM Classifier [J]. Computer Science,2018,45(S2):356-360.","journal-title":"Computer Science"},{"key":"e_1_3_2_1_3_1","volume-title":"XSS Attack Detection Method Based on BiLSTM-Attention-CNN [J]. Journal of guizhou normal university (natural science edition)","author":"Kezi Li","year":"2022","unstructured":"Li Kezi, Xu Yang, Zhang Qingling, Zhang Sicong. XSS Attack Detection Method Based on BiLSTM-Attention-CNN [J]. Journal of guizhou normal university (natural science edition), 2022, 40 (4) : 76-83. The DOI: 10.16614 \/ j.g znuj. ZRB. 2022.04.013."},{"key":"e_1_3_2_1_4_1","first-page":"766","article-title":"Research on cross-site Scripting Attack Detection Based on SVM Classifier Optimized by FP-growth [J]","volume":"2020","author":"Renjie Li","unstructured":"Li Renjie, Hua Chi, Lu Zhiping. Research on cross-site Scripting Attack Detection Based on SVM Classifier Optimized by FP-growth [J]. Information Security Research,2020,6(09):766-774.","journal-title":"Information Security Research"},{"key":"e_1_3_2_1_5_1","volume-title":"Distributed representations of words and phrases and their compositionality[J]. Advances in neural information processing systems","author":"Mikolov","year":"2013","unstructured":"Mikolov T, Sutskever I, Chen K, Distributed representations of words and phrases and their compositionality[J]. Advances in neural information processing systems, 2013, 26."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1162\/neco_a_01199"},{"volume-title":"Robotics and Cybernetics (CRC). IEEE","year":"2020","unstructured":"Lei,Li, \"XSS detection technology based on LSTM-attention.\" 2020 5th International Conference on Control, Robotics and Cybernetics (CRC). IEEE, 2020.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","volume-title":"IEEE","author":"G.","year":"2023","unstructured":"Nilavarasan, G. S., and T. Balachander. \"XSS Attack Detection using Convolution Neural Network.\" 2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF). IEEE, 2023."},{"volume-title":"2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC, CSS, ICESS). IEEE","author":"Wang","unstructured":"Wang R, Jia X, Li Q, Machine learning based cross-site scripting detection in online social network[C]\/\/2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC, CSS, ICESS). IEEE, 2014: 823-826.","key":"e_1_3_2_1_9_1"}],"event":{"acronym":"ICCVIT 2023","name":"ICCVIT 2023: International Conference on Computer, Vision and Intelligent Technology","location":"Chenzhou China"},"container-title":["Proceedings of the 2023 International Conference on Computer, Vision and Intelligent Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627341.3630377","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3627341.3630377","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T21:59:39Z","timestamp":1755899979000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627341.3630377"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,25]]},"references-count":9,"alternative-id":["10.1145\/3627341.3630377","10.1145\/3627341"],"URL":"https:\/\/doi.org\/10.1145\/3627341.3630377","relation":{},"subject":[],"published":{"date-parts":[[2023,8,25]]},"assertion":[{"value":"2023-12-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}