{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:02:09Z","timestamp":1750309329804,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T00:00:00Z","timestamp":1729987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["92267203","62076146","U20A6003","62021002","6212780016"],"award-info":[{"award-number":["92267203","62076146","U20A6003","62021002","6212780016"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2022YFB4301202","2023YFB3307500"],"award-info":[{"award-number":["2022YFB4301202","2023YFB3307500"]}]},{"name":"Industrial Technology Infrastructure Public Service Platform Project Public Service Platform for Urban Rail Transit Equipment Signal System Testing and Safety Evaluation","award":["2022-233-225"],"award-info":[{"award-number":["2022-233-225"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,27]]},"DOI":"10.1145\/3691620.3695289","type":"proceedings-article","created":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T15:39:19Z","timestamp":1729265959000},"page":"2225-2229","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Trident: Detecting SQL Injection Attacks via Abstract Syntax Tree-based Neural Network"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-6707-0919","authenticated-orcid":false,"given":"Yuanlin","family":"Li","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4430-3727","authenticated-orcid":false,"given":"Zhiwei","family":"Xu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4679-0488","authenticated-orcid":false,"given":"Min","family":"Zhou","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9608-5808","authenticated-orcid":false,"given":"Hai","family":"Wan","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6168-7016","authenticated-orcid":false,"given":"Xibin","family":"Zhao","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.3390\/app13074365"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/jcp2040039"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1179"},{"key":"e_1_3_2_1_4_1","volume-title":"Support-vector networks. Machine learning 20","author":"Cortes Corinna","year":"1995","unstructured":"Corinna Cortes and Vladimir Vapnik. 1995. Support-vector networks. Machine learning 20 (1995), 273--297."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103093"},{"key":"e_1_3_2_1_6_1","volume-title":"client9","author":"User GitHub","year":"2018","unstructured":"GitHub User: client9. 2018. libinjection. https:\/\/github.com\/client9\/libinjection. Accessed on: 2024-01-30."},{"key":"e_1_3_2_1_7_1","unstructured":"H. Guan et al. 2022. An algorithm of SQL injection attack detection based on improved TF-IDF. Computer and Modernization (Jan. 2022) 122--126."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380326"},{"key":"e_1_3_2_1_9_1","volume-title":"2021 International conference on computational intelligence and knowledge economy (ICCIKE). IEEE, 442--445","author":"Jothi KR","year":"2021","unstructured":"KR Jothi, Nishant Pandey, Pradyumn Beriwal, Abhinandan Amarajan, et al. 2021. An efficient SQL injection detection system using deep learning. In 2021 International conference on computational intelligence and knowledge economy (ICCIKE). IEEE, 442--445."},{"key":"e_1_3_2_1_10_1","volume-title":"syedsaqlainhussain","author":"User Kaggle","year":"2023","unstructured":"Kaggle User: syedsaqlainhussain. 2023. sql injection dataset. https:\/\/www.kaggle.com\/datasets\/syedsaqlainhussain\/sql-injection-dataset. Accessed on: 2024-01-30."},{"key":"e_1_3_2_1_11_1","first-page":"108","article-title":"SQL injection attack detection method based on improved TFIDF algorithm","volume":"21","author":"Y. Li","year":"2020","unstructured":"Y. Li et al. 2020. SQL injection attack detection method based on improved TFIDF algorithm. Journal of Information Engineering University 21, 1 (2020), 108--114.","journal-title":"Journal of Information Engineering University"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2021.1995537"},{"key":"e_1_3_2_1_13_1","unstructured":"OWASP. 2021. OWASP Top 10 - 2021. https:\/\/owasp.org\/Top10\/. Accessed on: 2024-01-30."},{"key":"e_1_3_2_1_14_1","unstructured":"L. Su et al. 2021. SQL injection detection method based on N-Gram and TFIDF. Computer and Digital Engineering 49 (Jan. 2021) 1177--1181."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.105528"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2947527"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639215"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3613869"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00086"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00164"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1049\/sfw2.12018"}],"event":{"name":"ASE '24: 39th IEEE\/ACM International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Sacramento CA USA","acronym":"ASE '24"},"container-title":["Proceedings of the 39th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691620.3695289","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3691620.3695289","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:04:07Z","timestamp":1750291447000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691620.3695289"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,27]]},"references-count":21,"alternative-id":["10.1145\/3691620.3695289","10.1145\/3691620"],"URL":"https:\/\/doi.org\/10.1145\/3691620.3695289","relation":{},"subject":[],"published":{"date-parts":[[2024,10,27]]},"assertion":[{"value":"2024-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}