{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T04:25:58Z","timestamp":1774499158295,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"25","license":[{"start":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T00:00:00Z","timestamp":1755043200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T00:00:00Z","timestamp":1755043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/100018693","name":"HORIZON EUROPE Framework Programme","doi-asserted-by":"publisher","award":["101073932"],"award-info":[{"award-number":["101073932"]}],"id":[{"id":"10.13039\/100018693","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s00521-025-11449-2","type":"journal-article","created":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T04:57:06Z","timestamp":1755061026000},"page":"21275-21296","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A novel NLP-driven approach for enriching artefact descriptions, provenance, and entities in cultural heritage"],"prefix":"10.1007","volume":"37","author":[{"given":"Sara","family":"Ferro","sequence":"first","affiliation":[]},{"given":"Riccardo","family":"Giovanelli","sequence":"additional","affiliation":[]},{"given":"Madison","family":"Leeson","sequence":"additional","affiliation":[]},{"given":"Michela","family":"De Bernardin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4508-1540","authenticated-orcid":false,"given":"Arianna","family":"Traviglia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,13]]},"reference":[{"key":"11449_CR1","doi-asserted-by":"crossref","unstructured":"Mishra S, Misra A (2017) Structured and unstructured big data analytics. In: Paper presented at the 2017 international conference on current trends in computer, electrical, electronics and communication (CTCEEC), pp 740\u2013746","DOI":"10.1109\/CTCEEC.2017.8454999"},{"key":"11449_CR2","volume-title":"Network science","author":"A Barab\u00e1si","year":"2016","unstructured":"Barab\u00e1si A, P\u00f3sfai M (2016) Network science. Cambridge University Press, Cambridge"},{"key":"11449_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3447772","volume":"54","author":"A Hogan","year":"2021","unstructured":"Hogan A et al (2021) Knowledge graphs. ACM Comput Surv 54:1\u201337","journal-title":"ACM Comput Surv"},{"key":"11449_CR4","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.idm.2017.02.001","volume":"2","author":"F Brauer","year":"2017","unstructured":"Brauer F (2017) Mathematical epidemiology: past, present, and future. Infect Disease Modell 2:113\u2013127","journal-title":"Infect Disease Modell"},{"key":"11449_CR5","doi-asserted-by":"publisher","first-page":"8794","DOI":"10.1038\/s41598-021-87987-1","volume":"11","author":"L Pio-Lopez","year":"2021","unstructured":"Pio-Lopez L, Valdeolivas A, Tichit L, Remy \u00c9, Baudot A (2021) Multiverse: a multiplex and multiplex-heterogeneous network embedding approach. Sci Rep 11:8794","journal-title":"Sci Rep"},{"key":"11449_CR6","volume-title":"Principles of semantic networks: explorations in the representation of knowledge","author":"JF Sowa","year":"2014","unstructured":"Sowa JF (2014) Principles of semantic networks: explorations in the representation of knowledge. Morgan Kaufmann, San Mateo"},{"key":"11449_CR7","unstructured":"Manola F, Miller E (2014) Rdf prime. https:\/\/www.w3.org\/TR\/rdf11-primer\/"},{"key":"11449_CR8","unstructured":"Chinchor N, Robinson P (1997) Muc-7 named entity task definition"},{"key":"11449_CR9","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/TKDE.2020.2981314","volume":"34","author":"J Li","year":"2020","unstructured":"Li J, Sun A, Han J, Li C (2020) A survey on deep learning for named entity recognition. IEEE Trans Knowl Data Eng 34:50\u201370","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"11449_CR10","doi-asserted-by":"publisher","first-page":"750","DOI":"10.1111\/j.1749-818X.2010.00230.x","volume":"4","author":"C Sporleder","year":"2010","unstructured":"Sporleder C (2010) Natural language processing for cultural heritage domains. Lang Linguist Compass 4:750\u2013768","journal-title":"Lang Linguist Compass"},{"key":"11449_CR11","doi-asserted-by":"crossref","unstructured":"Piskorski J, Yangarber R (2013) Information extraction: past, present and future. In: Multi-source, multilingual information extraction and summarization, pp 23\u201349","DOI":"10.1007\/978-3-642-28569-1_2"},{"key":"11449_CR12","doi-asserted-by":"crossref","unstructured":"Leeson M, Giovanelli R, De\u00a0Bernardin M, Traviglia A (2024) War, art, and sanctions: social network analysis on the nacp\u2019s databases of sanctioned russian individuals and art collectors. Int J Digital Humanit 1\u201327","DOI":"10.1007\/s42803-024-00089-y"},{"key":"11449_CR13","doi-asserted-by":"crossref","unstructured":"Leeson M, Giovanelli R, Ferro S, De\u00a0Bernardin M, Traviglia A (2025) Overcoming data siloes in cultural heritage crime research: a consolidated osint-derived dataset on art, antiquities, and the trade in cultural goods. Arch Sci","DOI":"10.1007\/s10502-025-09485-x"},{"key":"11449_CR14","unstructured":"Achiam J et\u00a0al (2023) Gpt-4 technical report"},{"key":"11449_CR15","unstructured":"Meta (2024) Introducing meta llama 3: The most capable openly available llm to date. https:\/\/ai.meta.com\/blog\/meta-llama-3\/"},{"key":"11449_CR16","doi-asserted-by":"publisher","unstructured":"Montani I, Honnibal M, Boyd A, Van\u00a0Landeghem S, Peters H (2023) explosion\/spacy: v3.7.2: fixes for apis and requirements (v3.7.2). https:\/\/doi.org\/10.5281\/zenodo.10009823","DOI":"10.5281\/zenodo.10009823"},{"key":"11449_CR17","unstructured":"Face H Hugging face homepage. https:\/\/huggingface.co\/"},{"key":"11449_CR18","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1162\/neco.1989.1.4.541","volume":"1","author":"Y LeCun","year":"1989","unstructured":"LeCun Y et al (1989) Backpropagation applied to handwritten zip code recognition. Neural Comput 1:541\u2013551","journal-title":"Neural Comput"},{"key":"11449_CR19","unstructured":"Waswani A et\u00a0al. (2017) Attention is all you need. In: Paper presented at the 31st conference on neural information processing systems (NIPS 2017), Long Beach"},{"key":"11449_CR20","unstructured":"Liu Y et\u00a0al (2019) Roberta: a robustly optimized bert pretraining approach"},{"key":"11449_CR21","doi-asserted-by":"crossref","unstructured":"Ushio A, Neves L, Silva V, Barbieri F, Camacho-Collados J (2022) Named entity recognition in twitter: a dataset and analysis on short-term temporal shifts","DOI":"10.18653\/v1\/2022.aacl-main.25"},{"key":"11449_CR22","doi-asserted-by":"crossref","unstructured":"Giovanelli R, Traviglia A (2024) Aikogam: an ai-driven knowledge graph of the antiquities market: toward automatised methods to identify illicit trafficking networks. J Comput Appl Archaeol 7","DOI":"10.5334\/jcaa.130"},{"key":"11449_CR23","doi-asserted-by":"crossref","unstructured":"Carriero VA et\u00a0al (2019) Arco: the Italian cultural heritage knowledge graph. CoRRabs\/1905.02840","DOI":"10.1007\/978-3-030-30796-7_3"},{"key":"11449_CR24","doi-asserted-by":"publisher","DOI":"10.1002\/ail2.23","volume":"2","author":"K Dutia","year":"2021","unstructured":"Dutia K, Stack J (2021) Heritage connector: a machine learning framework for building linked open data from museum collections. Appl AI Lett 2:e23","journal-title":"Appl AI Lett"},{"key":"11449_CR25","volume-title":"RITHMS digital platform: social network analysis for intelligence-led policing of cultural heritage crime","author":"M Leeson","year":"2025","unstructured":"Leeson M, Giovanelli R, De Bernardin M, Ferro S, Traviglia A (2025) RITHMS digital platform: social network analysis for intelligence-led policing of cultural heritage crime. Springer, Berlin"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-025-11449-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-025-11449-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-025-11449-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T21:22:44Z","timestamp":1757452964000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-025-11449-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,13]]},"references-count":25,"journal-issue":{"issue":"25","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["11449"],"URL":"https:\/\/doi.org\/10.1007\/s00521-025-11449-2","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,13]]},"assertion":[{"value":"3 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest. The funders had no role in the design of the study, in the collection, analyses, or interpretation of data, in the writing of the manuscript, or in the decision to publish the results.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The code is not publicly available, but the trained Natural Language Processing models can be accessed at: .","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}},{"value":"During the preparation of this work, the authors used ChatGPT to review grammar and enhance the overall reading experience. After using this service, the authors reviewed and edited the content as needed.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Use of AI tools"}}]}}