{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T20:01:55Z","timestamp":1773777715114,"version":"3.50.1"},"reference-count":27,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.063319","type":"journal-article","created":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T04:20:53Z","timestamp":1748319653000},"page":"1145-1167","source":"Crossref","is-referenced-by-count":4,"title":["Research on SQL Injection Detection Technology Based on Content Matching and Deep Learning"],"prefix":"10.32604","volume":"84","author":[{"given":"Yuqi","family":"Chen","sequence":"first","affiliation":[]},{"given":"Guangjun","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Qun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"1138","DOI":"10.1109\/TIFS.2019.2936913","article-title":"Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-based steganalysis","volume":"15","author":"Zhang","year":"2019","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref2","first-page":"1184","article-title":"Research on a high robust detection model for malicious software","volume":"24","author":"Xu","year":"2024","journal-title":"Netinfo Secur"},{"key":"ref3","series-title":"2024 IEEE International Students\u2019 Conference on Electrical, Electronics and Computer Science (SCEECS)","first-page":"1","article-title":"A diligent survey of SQL injection attacks, detection and evaluation of mitigation techniques","author":"Bobade","year":"2024 Feb 24\u201325"},{"key":"ref4","series-title":"2024 2nd International Conference on Sustainable Computing and Smart Systems (ICSCSS)","first-page":"606","article-title":"Mitigation of SQL injection attacks through machine learning classifier","author":"Anu","year":"2024 Jul 10\u201312"},{"key":"ref5","series-title":"2024 10th International Conference on Advanced Computing and Communication Systems (ICACCS)","first-page":"2602","article-title":"Shielding web data: mitigating SQL injection threats via hashing strategies","author":"Mohanraj","year":"2024 Mar 14\u201315"},{"key":"ref6","series-title":"2023 International Conference on Science, Engineering and Business for Sustainable Development Goals (SEB-SDG)","article-title":"Securing web applications against SQL injection attacks\u2014a Parameterised Query perspective","author":"Okesola","year":"2023 Apr 5\u20137"},{"key":"ref7","series-title":"2023 International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication Engineering (RMKMATE)","article-title":"Detection and analysis of port scanning and SQL injection vulnerabilities with correlating factors in web applications to enhance secure data transmission","author":"Abdullah","year":"2023 Nov 1\u20132"},{"key":"ref8","series-title":"2024 5th International Conference on Information Science, Parallel and Distributed Systems (ISPDS)","article-title":"Feature fusion-based detection of SQL injection and XSS attacks","author":"Guan","year":"2024 May 31\u2013Jun 2"},{"key":"ref9","series-title":"Neural Information Processing: 24th International Conference","first-page":"828","article-title":"A deep learning method to detect web attacks using a specially designed CNN","author":"Zhang","year":"2017 Nov 14\u201318"},{"key":"ref10","series-title":"2021 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)","first-page":"378","article-title":"A CNN-BiLSTM based approach for detection of SQL injection attacks","author":"Gandhi","year":"2021 Mar 17\u201318"},{"key":"ref11","series-title":"2023 9th International Conference on Optimization and Applications (ICOA)","article-title":"Automatic protection of web applications against SQL injections: an approach based on acunetix, burp suite and SQLMAP","author":"Bouafia","year":"2023 Oct 5\u20136"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1145\/2103621.2103678","article-title":"Defining code-injection attacks","volume":"47","author":"Ray","year":"2012","journal-title":"SIGPLAN Not"},{"key":"ref13","first-page":"257","article-title":"LsSQLIDP: literature survey on SQL injection detection and prevention techniques","volume":"22","author":"Varshney","year":"2019","journal-title":"J Stat Manag Syst"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"135507","DOI":"10.1109\/ACCESS.2023.3337645","article-title":"AE-net: novel autoencoder-based deep features for SQL injection attack detection","volume":"11","author":"Thalji","year":"2023","journal-title":"IEEE Access"},{"key":"ref15","unstructured":"Cao X. Research on SQL injection detection based on deep learning [dissertation]. Nanning, China: Guangxi University; 2020. (In Chinese)."},{"key":"ref16","article-title":"LSTM-based SQL injection detection method for intelligent transportation system","volume":"1","author":"Li","year":"2019","journal-title":"IEEE Trans Veh Technol"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1541","DOI":"10.1007\/s10207-023-00791-y","article-title":"A deep learning approach based on multi-view consensus for SQL injection detection","volume":"23","author":"Kakisim","year":"2024","journal-title":"Int J Inf Secur"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"5565950","DOI":"10.1049\/2024\/5565950","article-title":"Deep learning in cybersecurity: a hybrid BERT-LSTM network for SQL injection attack detection","volume":"2024","author":"Liu","year":"2024","journal-title":"IET Inf Secur"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"104391","DOI":"10.1016\/j.cose.2025.104391","article-title":"An effective SQL injection detection model using LSTM for imbalanced datasets","volume":"153","author":"Salah Fathi","year":"2025","journal-title":"Comput Secur"},{"key":"ref20","series-title":"Proceedings of the 2024 ACM Southeast Conference","first-page":"211","article-title":"Enhancing machine learning based SQL injection detection using contextualized word embedding","author":"Zulu","year":"2024 Apr 18\u201320"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"103","DOI":"10.5753\/jisa.2024.3799","article-title":"Combining regular expressions and machine learning for SQL injection detection in urban computing","volume":"15","author":"Souza","year":"2024","journal-title":"J Internet Serv Appl"},{"key":"ref22","series-title":"2022 IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON)","article-title":"Detecting SQL injection attack using natural language processing","author":"Lakhani","year":"2022 Dec 2\u20134"},{"key":"ref23","series-title":"2024 IEEE International Conference on Big Data (BigData)","first-page":"8774","article-title":"Causal tracing to identify hacking knowledge in large language models","author":"Marinelli","year":"2024 Dec 15\u201318"},{"key":"ref24","first-page":"84","article-title":"A large language model based SQL injection attack detection method","volume":"23","author":"Huang","year":"2023","journal-title":"Netinfo Security"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1016\/j.ipm.2018.10.010","article-title":"A tale of two epidemics: contextual Word2Vec for classifying twitter streams during outbreaks","volume":"56","author":"Khatua","year":"2019","journal-title":"Inf Process Manag"},{"key":"ref26","first-page":"4836289","article-title":"Deep Neural Network-Based SQL injection detection method","volume":"2022","author":"Zhang","year":"2022","journal-title":"Secur Commun Netw"},{"key":"ref27","first-page":"141","author":"Zheng","year":"2017","journal-title":"TensorFlow: practical google deep learning framework"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-1\/TSP_CMC_63319\/TSP_CMC_63319.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:37:02Z","timestamp":1763343422000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n1\/61735"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":27,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.063319","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}