{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T11:05:59Z","timestamp":1774868759270,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Science and Technology Program of Guangxi","award":["AB25069135"],"award-info":[{"award-number":["AB25069135"]}]},{"name":"Science and Technology Project of Gansu","award":["24YFGA003"],"award-info":[{"award-number":["24YFGA003"]}]},{"name":"Education Development Foundation of Lanzhou University","award":["24-1407"],"award-info":[{"award-number":["24-1407"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1007\/s10489-025-07064-2","type":"journal-article","created":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T12:33:07Z","timestamp":1767961987000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Attentive Q-matrix learning for knowledge tracing"],"prefix":"10.1007","volume":"56","author":[{"given":"Zhongfeng","family":"Jia","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7516-1699","authenticated-orcid":false,"given":"Wei","family":"Su","sequence":"additional","affiliation":[]},{"given":"Jiamin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wenli","family":"Yue","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,9]]},"reference":[{"key":"7064_CR1","doi-asserted-by":"publisher","unstructured":"Abdelrahman G, Wang Q, Nunes B (2023) Knowledge tracing: A survey. ACM Comput Surv 55(11). https:\/\/doi.org\/10.1145\/3569576","DOI":"10.1145\/3569576"},{"key":"7064_CR2","doi-asserted-by":"publisher","unstructured":"Ali A, Zhu Y, Zakarya M (2022) Exploiting dynamic spatio-temporal graph convolutional neural networks for citywide traffic flows prediction. Neural Netw 145:233\u2013247. https:\/\/doi.org\/10.1016\/j.neunet.2021.10.021, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0893608021004123","DOI":"10.1016\/j.neunet.2021.10.021"},{"key":"7064_CR3","doi-asserted-by":"publisher","unstructured":"Anderson JR, Boyle C, Corbett AT et al (1990) Cognitive modeling and intelligent tutoring. Artif Intell 42(1):7\u201349. https:\/\/doi.org\/10.1016\/0004-3702(90)90093-F, https:\/\/www.sciencedirect.com\/science\/article\/pii\/000437029090093F","DOI":"10.1016\/0004-3702(90)90093-F"},{"key":"7064_CR4","unstructured":"Ba JL, Kiros JR, Hinton GE (2016) Layer normalization arXiv:1607.06450 [stat.ML]"},{"key":"7064_CR5","unstructured":"Bahdanau D, Cho K, Bengio Y (2014) Neural machine translation by jointly learning to align and translate. Comput Sci"},{"key":"7064_CR6","first-page":"1","volume-title":"American association for artificial intelligence 2005 educational data mining workshop","author":"T Barnes","year":"2005","unstructured":"Barnes T (2005) The q-matrix method: Mining student response data for knowledge. American association for artificial intelligence 2005 educational data mining workshop. AAAI Press, Pittsburgh, PA, USA, pp 1\u20138"},{"key":"7064_CR7","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1007\/11425274_62","volume-title":"Foundations of Intelligent Systems","author":"T Barnes","year":"2005","unstructured":"Barnes T, Bitzer D, Vouk M (2005) Experimental analysis of the q-matrix method in knowledge discovery. In: Hacid MS, Murray NV, Ra\u015b ZW et al (eds) Foundations of Intelligent Systems. Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 603\u2013611"},{"key":"7064_CR8","unstructured":"Chang HS, Hsu HJ, Chen KT (2015) Modeling exercise relationships in e-learning: A unified approach. In: Educational Data Mining"},{"key":"7064_CR9","doi-asserted-by":"publisher","unstructured":"Cho K, van Merri\u00ebnboer B, Gulcehre C et\u00a0al (2014) Learning phrase representations using RNN encoder\u2013decoder for statistical machine translation. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP). Association for Computational Linguistics, Doha, Qatar, pp 1724\u20131734. https:\/\/doi.org\/10.3115\/v1\/D14-1179, https:\/\/aclanthology.org\/D14-1179","DOI":"10.3115\/v1\/D14-1179"},{"key":"7064_CR10","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/BF01099821","volume":"4","author":"AT Corbett","year":"1994","unstructured":"Corbett AT, Anderson JR (1994) Knowledge tracing: Modeling the acquisition of procedural knowledge. User Modeling And User-adapted Interaction 4:253\u2013278","journal-title":"User Modeling And User-adapted Interaction"},{"key":"7064_CR11","doi-asserted-by":"publisher","unstructured":"De La Torre J (2008) An empirically based method of q-matrix validation for the dina model: Development and applications. J Educ Meas 45(4):343\u2013362. https:\/\/doi.org\/10.1111\/j.1745-3984.2008.00069.x, https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1111\/j.1745-3984.2008.00069.x, https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/j.1745-3984.2008.00069.x","DOI":"10.1111\/j.1745-3984.2008.00069.x"},{"issue":"2","key":"7064_CR12","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/2207243.2207248","volume":"13","author":"MC Desmarais","year":"2012","unstructured":"Desmarais MC (2012) Mapping question items to skills with non-negative matrix factorization. SIGKDD Explor Newsl 13(2):30\u201336. https:\/\/doi.org\/10.1145\/2207243.2207248","journal-title":"SIGKDD Explor Newsl"},{"key":"7064_CR13","doi-asserted-by":"publisher","unstructured":"Elman JL (1990) Finding structure in time Cognitive Sci 14(2):179\u2013211. https:\/\/doi.org\/10.1016\/0364-0213(90)90002-E, https:\/\/www.sciencedirect.com\/science\/article\/pii\/036402139090002E","DOI":"10.1016\/0364-0213(90)90002-E"},{"issue":"2\u20133","key":"7064_CR14","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1023\/A:1007465528199","volume":"29","author":"N Friedman","year":"1997","unstructured":"Friedman N, Geiger D, Goldszmidt M (1997) Bayesian network classifiers. Mach Learn 29(2\u20133):131\u2013163. https:\/\/doi.org\/10.1023\/A:1007465528199","journal-title":"Mach Learn"},{"key":"7064_CR15","doi-asserted-by":"crossref","unstructured":"Ghosh A, Heffernan N, Lan AS (2020) Context-aware attentive knowledge tracing. In: Proceedings of the 26th ACM SIGKDD international conference on knowledge discovery & data mining, pp 2330\u20132339","DOI":"10.1145\/3394486.3403282"},{"key":"7064_CR16","doi-asserted-by":"publisher","unstructured":"Graves A, Mohamed Ar, Hinton G (2013) Speech recognition with deep recurrent neural networks. In: 2013 IEEE International conference on acoustics, speech and signal processing, pp 6645\u20136649. https:\/\/doi.org\/10.1109\/ICASSP.2013.6638947","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"7064_CR17","doi-asserted-by":"publisher","unstructured":"Li L, Wang Z (2023) Calibrated q-matrix-enhanced deep knowledge tracing with relational attention mechanism. Appl Sci 13(4). https:\/\/doi.org\/10.3390\/app13042541, https:\/\/www.mdpi.com\/2076-3417\/13\/4\/2541","DOI":"10.3390\/app13042541"},{"key":"7064_CR18","doi-asserted-by":"publisher","unstructured":"LIU Heng-yu WPwYGZHANG Tian-cheng (2019) A review of knowledge tracking. Journal of East China Normal University(Natural Science) 2019(5):1. https:\/\/doi.org\/10.3969\/j.issn.1000-5641.2019.05.001, https:\/\/xblk.ecnu.edu.cn\/EN\/abstract\/article_25656.shtml","DOI":"10.3969\/j.issn.1000-5641.2019.05.001"},{"key":"7064_CR19","unstructured":"Matsuda N, Furukawa T, Bier NL et\u00a0al (2015) Machine beats experts: Automatic discovery of skill models for data-driven online courseware refinement. In: Educational Data Mining"},{"key":"7064_CR20","doi-asserted-by":"crossref","unstructured":"Minn S, Vie JJ, Takeuchi K et\u00a0al (2022) Interpretable knowledge tracing: Simple and efficient student modeling with causal relations. In: Proceedings of the AAAI conference on artificial intelligence, pp 12810\u201312818","DOI":"10.1609\/aaai.v36i11.21560"},{"key":"7064_CR21","doi-asserted-by":"crossref","unstructured":"Nakagawa H, Iwasawa Y, Matsuo Y (2018) End-to-end deep knowledge tracing by learning binary question-embedding. In: 2018 IEEE International conference on data mining workshops (ICDMW), IEEE, pp 334\u2013342","DOI":"10.1109\/ICDMW.2018.00055"},{"key":"7064_CR22","volume-title":"PyTorch: An Imperative Style, High-Performance Deep Learning Library","author":"A Paszke","year":"2019","unstructured":"Paszke A, Gross S, Massa F et al (2019) PyTorch: An Imperative Style, High-Performance Deep Learning Library. Curran Associates Inc., Red Hook, NY, USA"},{"key":"7064_CR23","unstructured":"Piech C, Bassen J, Huang J et\u00a0al (2015) Deep knowledge tracing. In: Proceedings of the 28th international conference on neural information processing systems - Volume 1. MIT Press, Cambridge, MA, USA, NIPS\u201915, p 505\u2013513"},{"key":"7064_CR24","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-023-02126-0","author":"H Qin","year":"2023","unstructured":"Qin H, Guo L (2023) Using machine learning to improve q-matrix validation. Behavior Res Methods. https:\/\/doi.org\/10.3758\/s13428-023-02126-0","journal-title":"Behavior Res Methods"},{"issue":"2","key":"7064_CR25","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"L Rabiner","year":"1989","unstructured":"Rabiner L (1989) A tutorial on hidden markov models and selected applications in speech recognition. Proceed IEEE 77(2):257\u2013286. https:\/\/doi.org\/10.1109\/5.18626","journal-title":"Proceed IEEE"},{"key":"7064_CR26","unstructured":"Rasch G (1981) Probabilistic models for some intelligence and attainment tests. The SAGE Encyclopedia of Research Design"},{"key":"7064_CR27","unstructured":"Sun Y, Ye S, Inoue S et\u00a0al (2014) Alternating recursive method for q-matrix learning. In: Educational data mining"},{"key":"7064_CR28","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1111\/j.1745-3984.1983.tb00212.x","volume":"20","author":"KK Tatsuoka","year":"1983","unstructured":"Tatsuoka KK (1983) Rule space: An approach for dealing with misconceptions based on item response theory. J Educ Measurement 20:345\u2013354","journal-title":"J Educ Measurement"},{"key":"7064_CR29","unstructured":"Tatsuoka KK, Boodoo GM (2000) Subgroup differences on the gre quantitative test based on the underlying cognitive processes and knowledge"},{"key":"7064_CR30","unstructured":"bigdata ustc (2021) Edudata. https:\/\/github.com\/bigdata-ustc\/EduData"},{"key":"7064_CR31","unstructured":"Vaswani A, Shazeer N, Parmar N et\u00a0al (2017) Attention is all you need. Adv Neural Inf Process Syst 30"},{"key":"7064_CR32","doi-asserted-by":"publisher","unstructured":"Wang W, Ma H, Zhao Y et al (2022) Tracking knowledge proficiency of students with calibrated q-matrix. Expert Syst Appl 192:116454. https:\/\/doi.org\/10.1016\/j.eswa.2021.116454, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0957417421017383","DOI":"10.1016\/j.eswa.2021.116454"},{"issue":"3","key":"7064_CR33","doi-asserted-by":"publisher","first-page":"2850","DOI":"10.1007\/s10489-022-03621-1","volume":"53","author":"X Wang","year":"2023","unstructured":"Wang X, Zheng Z, Zhu J et al (2023) What is wrong with deep knowledge tracing? attention-based knowledge tracing. Appl Intell 53(3):2850\u20132861. https:\/\/doi.org\/10.1007\/s10489-022-03621-1","journal-title":"Appl Intell"},{"issue":"2","key":"7064_CR34","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1162\/neco.1989.1.2.270","volume":"1","author":"RJ Williams","year":"1989","unstructured":"Williams RJ, Zipser D (1989) A learning algorithm for continually running fully recurrent neural networks. Neural Comput 1(2):270\u2013280. https:\/\/doi.org\/10.1162\/neco.1989.1.2.270","journal-title":"Neural Comput"},{"key":"7064_CR35","doi-asserted-by":"publisher","unstructured":"Zakarya M, Khan AA, Qazani MRC et al (2024) Sustainable computing across datacenters: A review of enabling models and techniques. Comput Sci Rev 52:100620. https:\/\/doi.org\/10.1016\/j.cosrev.2024.100620, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1574013724000042","DOI":"10.1016\/j.cosrev.2024.100620"},{"key":"7064_CR36","doi-asserted-by":"crossref","unstructured":"Zhang J, Shi X, King I et\u00a0al (2017) Dynamic key-value memory networks for knowledge tracing. In: Proceedings of the 26th international conference on World Wide Web, pp 765\u2013774","DOI":"10.1145\/3038912.3052580"},{"key":"7064_CR37","doi-asserted-by":"publisher","unstructured":"Zhao W, Xia J, Jiang X et al (2023) A novel framework for deep knowledge tracing via gating-controlled forgetting and learning mechanisms. Inf Process Management 60(1):103114. https:\/\/doi.org\/10.1016\/j.ipm.2022.103114, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0306457322002151","DOI":"10.1016\/j.ipm.2022.103114"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-025-07064-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-025-07064-2","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-025-07064-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T10:17:22Z","timestamp":1774865842000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-025-07064-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1]]}},"alternative-id":["7064"],"URL":"https:\/\/doi.org\/10.1007\/s10489-025-07064-2","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1]]},"assertion":[{"value":"2 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"A preprint version of this work has been made available in an open preprint repository, accessible via the link:\n                      \n                      . The content of this manuscript may differ from the preprint version.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Preprint Declaration"}}],"article-number":"40"}}