共 50 条
- [1] LogBERT-BiLSTM: Detecting Malicious Web Requests [J]. ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING - ICANN 2022, PT III, 2022, 13531 : 704 - 715
- [2] Detecting Malicious Web Requests Using an Enhanced TextCNN [J]. 2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 768 - 777
- [3] Query or Spam: Detecting fraudulent web requests using stream clustering [J]. 2015 2ND INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED ENGINEERING AND INNOVATION (KBEI), 2015, : 853 - 859
- [4] Crafting universal adversarial perturbations with output vectors [J]. NEUROCOMPUTING, 2022, 501 : 294 - 305
- [5] Crafting universal adversarial perturbations with output vectors [J]. Neurocomputing, 2022, 501 : 294 - 305
- [6] Crafting Adversarial Examples for Neural Machine Translation [J]. 59TH ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS AND THE 11TH INTERNATIONAL JOINT CONFERENCE ON NATURAL LANGUAGE PROCESSING, VOL 1 (ACL-IJCNLP 2021), 2021, : 1967 - 1977
- [7] Detecting timed-out client requests for avoiding livelock and improving Web server performance [J]. ISCC 2000: FIFTH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2000, : 2 - 7
- [8] Classification on Web Application Requests [J]. 2020 11TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2020, : 033 - 037
- [9] Dynamic prediction of Web requests [J]. CEC: 2003 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-4, PROCEEDINGS, 2003, : 2034 - 2041
- [10] Crafting Adversarial Input Sequences for Recurrent Neural Networks [J]. MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 49 - 54