{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T01:34:03Z","timestamp":1776130443946,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T00:00:00Z","timestamp":1658448000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T00:00:00Z","timestamp":1658448000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the science and technology research program of chongqing municipal education commission","award":["Grant No.KJQN202000842"],"award-info":[{"award-number":["Grant No.KJQN202000842"]}]},{"name":"the social science planning program of chongqing social science planning office","award":["Grant No.2020YBGL76"],"award-info":[{"award-number":["Grant No.2020YBGL76"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s00500-022-07360-w","type":"journal-article","created":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T11:02:54Z","timestamp":1658487774000},"page":"9927-9935","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["RETRACTED ARTICLE: Evaluation of innovative enterprise\u2019s financing capability using BP neural network under the background of big-intelligence mobile cloud"],"prefix":"10.1007","volume":"26","author":[{"given":"Fan","family":"He","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3763-4926","authenticated-orcid":false,"given":"Shuang","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"LuQing","family":"Fan","sequence":"additional","affiliation":[]},{"given":"XiaoYu","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,22]]},"reference":[{"issue":"2","key":"7360_CR1","first-page":"396","volume":"2","author":"YL Cun","year":"1997","unstructured":"Cun YL, Boser B, Denker JS et al (1997) Handwritten digit recognition with a back-propagation network. Adv Neural Inf Process Syst 2(2):396\u2013404","journal-title":"Adv Neural Inf Process Syst"},{"key":"7360_CR2","first-page":"1","volume":"1","author":"Z Guo","year":"2021","unstructured":"Guo Z, Yu K, Li Y et al (2021a) Deep learning-embedded social internet of things for ambiguity-aware social recommendations. IEEE Trans Netw Sci Eng 1:1\u20131","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"7360_CR3","first-page":"1","volume":"1","author":"Z Guo","year":"2021","unstructured":"Guo Z, Yu K, Jolfaei A et al (2021b) A fuzzy detection system for rumors through explainable adaptive learning. IEEE Trans Fuzzy Syst 1:1\u20131","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"1","key":"7360_CR4","doi-asserted-by":"publisher","DOI":"10.1088\/1361-6420\/aa9a90","volume":"34","author":"E Haber","year":"2018","unstructured":"Haber E, Ruthotto L (2018) Stable architectures for deep neural networks. Inverse Prob 34(1):014004","journal-title":"Inverse Prob"},{"issue":"5","key":"7360_CR5","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1177\/0958305X18757766","volume":"29","author":"H Hu","year":"2018","unstructured":"Hu H, Chang CP, Dong M et al (2018) Does environmental information disclosure affect the performance of energy-intensive firms\u2019 borrowing ability? Evid China Energy Environ 29(5):685\u2013705","journal-title":"Evid China Energy Environ"},{"issue":"1","key":"7360_CR6","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/BF01307829","volume":"1","author":"BA Huberman","year":"1994","unstructured":"Huberman BA, Hogg T (1994) The communities of practice in an innovative enterprise. Comput Math Organ Theory 1(1):73\u201392","journal-title":"Comput Math Organ Theory"},{"issue":"83","key":"7360_CR7","first-page":"35","volume":"1","author":"T Kucherenko","year":"2019","unstructured":"Kucherenko T, Melnyk L, Ratushna O (2019) Accounting for financing of the enterprise\u2019s innovation activities. Account Financ 1(83):35\u201343","journal-title":"Account Financ"},{"issue":"1","key":"7360_CR8","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1093\/es\/3.1.3","volume":"3","author":"W Lazonick","year":"2002","unstructured":"Lazonick W (2002) Innovative enterprise and historical transformation. Enterp Soc 3(1):3\u201347","journal-title":"Enterp Soc"},{"issue":"1","key":"7360_CR9","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1108\/CFRI-03-2018-0026","volume":"9","author":"S Li","year":"2019","unstructured":"Li S, Gao N (2019) Housing price and enterprise financing: does mortgage effect exist? China Financ Rev Int 9(1):137\u2013152","journal-title":"China Financ Rev Int"},{"issue":"6","key":"7360_CR10","doi-asserted-by":"publisher","first-page":"1543","DOI":"10.1007\/s00521-019-04136-6","volume":"32","author":"L Liu","year":"2020","unstructured":"Liu L, Ran W (2020) Research on supply chain partner selection method based on BP neural network. Neural Comput Appl 32(6):1543\u20131553","journal-title":"Neural Comput Appl"},{"key":"7360_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103330","volume":"80","author":"P Liu","year":"2021","unstructured":"Liu P, Qing QW, Liu W (2021) Enterprise human resource management platform based on FPGA and data mining. Microprocess Microsyst 80:103330","journal-title":"Microprocess Microsyst"},{"issue":"1","key":"7360_CR12","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1002\/jsc.2243","volume":"28","author":"R Owen","year":"2019","unstructured":"Owen R, Deakins D, Savic M (2019) Finance pathways for young innovative small- and medium-sized enterprises: a demand-side examination of finance gaps and policy implications for the post-global financial crisis finance escalator. Strateg Chang 28(1):19\u201336","journal-title":"Strateg Chang"},{"key":"7360_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cam.2019.112630","volume":"369","author":"S Qi","year":"2020","unstructured":"Qi S, Jin K, Li B et al (2020) The exploration of internet finance by using neural network. J Comput Appl Math 369:112630","journal-title":"J Comput Appl Math"},{"key":"7360_CR14","unstructured":"Research seminar on financial aspects of profit planning for small business, Pfeffer, Irving (2012) The financing of small business: a current assessment. Canadian public administration 55(1): 125\u2013147."},{"key":"7360_CR15","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1038\/323533a0","volume":"323","author":"DE Rumelhart","year":"1986","unstructured":"Rumelhart DE, Hinton GE, Williams RJ (1986) Learning internal representation by back-propagation errors. Nature 323:533\u2013536","journal-title":"Nature"},{"key":"7360_CR16","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.neucom.2017.02.029","volume":"241","author":"S Scardapane","year":"2017","unstructured":"Scardapane S, Comminiello D, Hussain A et al (2017) Group sparse regularization for deep neural networks. Neurocomputing 241:81\u201389","journal-title":"Neurocomputing"},{"issue":"15","key":"7360_CR17","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1016\/j.energy.2016.02.046","volume":"101","author":"W Sun","year":"2016","unstructured":"Sun W, Xu Y (2016) Financial security evaluation of the electric power industry in China based on a backpropagation neural network optimized by genetic algorithm. Energy 101(15):366\u2013379","journal-title":"Energy"},{"key":"7360_CR18","doi-asserted-by":"crossref","unstructured":"Tan L, Yu K, Bashir A K, et al. (2021) Toward real-time and efficient cardiovascular monitoring for COVID-19 patients by 5G-enabled wearable medical devices: a deep learning approach. Neural Comput Appl 1\u201314","DOI":"10.1007\/s00521-021-06219-9"},{"issue":"2","key":"7360_CR19","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1504\/IJCSM.2020.111112","volume":"12","author":"XT Xie","year":"2020","unstructured":"Xie XT (2020) Technology enterprise value assessment based on BP neural network. Int J Comput Sci Math 12(2):192\u2013203","journal-title":"Int J Comput Sci Math"},{"issue":"4","key":"7360_CR20","first-page":"264","volume":"145","author":"Y Xu","year":"1998","unstructured":"Xu Y, Lai MK (1998) Restoration of images contaminated by mixed Gaussian and impulse noise using a recursive minimum-maximum method. IEEE Proc Part K 145(4):264\u2013270","journal-title":"IEEE Proc Part K"},{"key":"7360_CR21","first-page":"1","volume":"1","author":"K Yu","year":"2021","unstructured":"Yu K, Guo Z, Shen Y et al (2021a) Secure artificial intelligence of things for implicit group recommendations. IEEE Internet Things J 1:1\u20131","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"7360_CR22","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MWC.001.2000374","volume":"28","author":"K Yu","year":"2021","unstructured":"Yu K, Tan L, Lin L et al (2021b) Deep-learning-empowered breast cancer auxiliary diagnosis for 5GB remote E-health. IEEE Wirel Commun 28(3):54\u201361","journal-title":"IEEE Wirel Commun"},{"issue":"3","key":"7360_CR23","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0229739","volume":"15","author":"Y Zhong","year":"2020","unstructured":"Zhong Y, Wu X (2020) Effects of cost-benefit analysis under back propagation neural network on financial benefit evaluation of investment projects. PLoS ONE 15(3):e0229739","journal-title":"PLoS ONE"},{"issue":"6158","key":"7360_CR24","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1038\/331679a0","volume":"331","author":"D Zipser","year":"1988","unstructured":"Zipser D, Andersen RA (1988) A back-propagation programmed network that simulates response properties of a subset of posterior parietal neurons. Nature 331(6158):679\u2013684","journal-title":"Nature"}],"updated-by":[{"DOI":"10.1007\/s00500-026-11324-9","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T00:00:00Z","timestamp":1773273600000}},{"DOI":"10.1007\/s00500-026-11324-9","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T00:00:00Z","timestamp":1773273600000},"record-id":"70151"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-022-07360-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-022-07360-w","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-022-07360-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T10:44:53Z","timestamp":1773312293000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-022-07360-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,22]]},"references-count":24,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["7360"],"URL":"https:\/\/doi.org\/10.1007\/s00500-022-07360-w","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,22]]},"assertion":[{"value":"11 April 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2026","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This article has been retracted. Please see the Retraction Notice for more detail:","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s00500-026-11324-9","URL":"https:\/\/doi.org\/10.1007\/s00500-026-11324-9","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All Authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}