{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:10:11Z","timestamp":1757617811432,"version":"3.44.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T00:00:00Z","timestamp":1744761600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T00:00:00Z","timestamp":1744761600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"National the Natural Science Foundation of China","award":["61272260 and 61273320"],"award-info":[{"award-number":["61272260 and 61273320"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s13042-025-02649-2","type":"journal-article","created":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T04:19:11Z","timestamp":1744777151000},"page":"6857-6867","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Document-level event extraction combined with writing style and argument role relation"],"prefix":"10.1007","volume":"16","author":[{"given":"Jingsheng","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Shuai","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Qihui","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Yongzheng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qiaoming","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,16]]},"reference":[{"key":"2649_CR1","unstructured":"Doddington G, Mitchell A, Przybocki M, Ramshaw L, Strassel S, Weischedel R (2004) The automatic content extraction (ace) program-tasks, data, and evaluation. In: LREC 2(1):837\u2013840"},{"key":"2649_CR2","unstructured":"Xu Z, Wang Y, Bai L, Cui L (2022) Writing Style Aware Document-level Event Extraction. arXiv: 2201.03188"},{"key":"2649_CR3","doi-asserted-by":"crossref","unstructured":"Zheng S, Cao W, Xu W, Bian J (2019) Doc2EDAG: An End-to-End Document-level Framework for Chinese Financial Event Extraction. In: EMNLP-IJCNLP, pp 337\u2013346","DOI":"10.18653\/v1\/D19-1032"},{"key":"2649_CR4","unstructured":"Xu R, Liu T, Li L, Chang B (2019) Document-level Event Extraction via Heterogeneous Graph-based Interaction Model with a Tracker. In: ACL-IJCNLP, pp 3533\u20133546"},{"key":"2649_CR5","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/2742796","author":"J Li","year":"2022","unstructured":"Li J, Hu R, Zhang K, Liu H, Ma Y (2022) DEERE: document-level event extraction as relation extraction. Mob Inf Syst. https:\/\/doi.org\/10.1155\/2022\/2742796","journal-title":"Mob Inf Syst"},{"key":"2649_CR6","unstructured":"Huang Z, Xu W, Yu K (2015) Bidirectional LSTM-CRF models for sequence tagging. arXiv:1508.01991"},{"key":"2649_CR7","doi-asserted-by":"crossref","unstructured":"Li J, Fei H, Liu J et al (2022) Unified named entity recognition as word-word relation classification[C]\/\/proceedings of the AAAI conference on artificial intelligence. 36(10): 10965\u201310973","DOI":"10.1609\/aaai.v36i10.21344"},{"key":"2649_CR8","doi-asserted-by":"crossref","unstructured":"Nguyen TH, Grishman R (2015) Relation extraction: Perspective from convolutional neural networks[C]\/\/Proceedings of the 1st workshop on vector space modeling for natural language processing. 39\u201348","DOI":"10.3115\/v1\/W15-1506"},{"key":"2649_CR9","doi-asserted-by":"crossref","unstructured":"Fei H, Ren Y, Wu S et al (2021) Latent target-opinion as prior for document-level sentiment classification: a variational approach from fine-grained perspective[C]\/\/Proceedings of the web conference 2021. 553\u2013564","DOI":"10.1145\/3442381.3449789"},{"key":"2649_CR10","doi-asserted-by":"crossref","unstructured":"Wang F, Li F, Fei H et al (2022) Entity-centered cross-document relation extraction[J]. arXiv preprint arXiv:2210.16541","DOI":"10.18653\/v1\/2022.emnlp-main.671"},{"key":"2649_CR11","unstructured":"Riloff E (1993) Automatically constructing a dictionary for information extraction tasks. In: AAAI"},{"issue":"5","key":"2649_CR12","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1109\/69.469825","volume":"7","author":"JT Kim","year":"1995","unstructured":"Kim JT, Moldovan DI (1995) Acquisition of linguistic patterns for knowledge-based information extraction. IEEE Trans Knowl Data Eng 7(5):713\u2013724. https:\/\/doi.org\/10.1109\/69.469825","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"2649_CR13","doi-asserted-by":"crossref","unstructured":"Ahn D (2006) The stages of event extraction.In: Proceedings of the Workshop on Annotating and Reasoning about Time and Events, pp 1\u20138","DOI":"10.3115\/1629235.1629236"},{"key":"2649_CR14","first-page":"300","volume":"2016","author":"TH Nguyen","year":"2019","unstructured":"Nguyen TH, Cho K, Grishman R (2019) Joint event extraction via recurrent neural networks. NAACL HLT 2016:300\u2013309","journal-title":"NAACL HLT"},{"key":"2649_CR15","doi-asserted-by":"crossref","unstructured":"Liu X, Luo Z, Huang H (2018) Jointly multiple events extraction via attention-based graph information aggregation. In: EMNLP, pp 1247\u20131256","DOI":"10.18653\/v1\/D18-1156"},{"key":"2649_CR16","doi-asserted-by":"publisher","unstructured":"Nguyen T, Grishman R (2018) Graph convolutional networks with argument-aware pooling for event detection. In: AAAI. https:\/\/doi.org\/10.1609\/aaai.v32i1.12039","DOI":"10.1609\/aaai.v32i1.12039"},{"key":"2649_CR17","doi-asserted-by":"crossref","unstructured":"Liu J, Chen Y, Liu K, Bi W, Liu X (2020) Event extraction as machine reading comprehension. In: EMNLP, pp 1641\u20131651","DOI":"10.18653\/v1\/2020.emnlp-main.128"},{"key":"2649_CR18","doi-asserted-by":"crossref","unstructured":"Du X, Cardie C (2020) Event extraction by answering (almost) natural questions. In: EMNLP, pp 671\u2013683","DOI":"10.18653\/v1\/2020.emnlp-main.49"},{"key":"2649_CR19","doi-asserted-by":"crossref","unstructured":"Sha L, Qian F, Chang B et al (2018) Jointly Extracting Event Triggers and Arguments by Dependency-Bridge RNN and Tensor-Based Argument Interaction.[C]\/\/ AAAI","DOI":"10.1609\/aaai.v32i1.12034"},{"key":"2649_CR20","doi-asserted-by":"crossref","unstructured":"Fei H, Zhang M, Ji D (2020) Cross-lingual semantic role labeling with high-quality translated training corpus[J]. arXiv preprint arXiv:2004.06295","DOI":"10.18653\/v1\/2020.acl-main.627"},{"key":"2649_CR21","doi-asserted-by":"crossref","unstructured":"Fei H, Li F, Li B et al (2021) Encoder-decoder based unified semantic role labeling with label-aware syntax[C]\/\/Proceedings of the AAAI conference on artificial intelligence. 35(14): 12794\u201312802","DOI":"10.1609\/aaai.v35i14.17514"},{"key":"2649_CR22","doi-asserted-by":"crossref","unstructured":"Yang H, Chen Y, Liu K, Xiao Y, Zhao J (2018) Dcfee: A document-level chinese financial event extraction system based on automatically labeled training data. In: ACL, pp 50\u201355","DOI":"10.18653\/v1\/P18-4009"},{"key":"2649_CR23","doi-asserted-by":"crossref","unstructured":"Yang H, Sui D, Chen Y, Liu K, Zhao J, Wang T (2021) Document-level event extraction via parallel prediction networks. In: ACL-IJCNLP, pp 6298\u20136308","DOI":"10.18653\/v1\/2021.acl-long.492"},{"key":"2649_CR24","unstructured":"Li J, Xu K, Li F et al. MRN: A locally and globally mention-based reasoning network for document-level relation extraction[C]\/\/Findings of the Association for Computational"},{"issue":"4","key":"2649_CR25","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1111\/j.2044-8279.1997.tb01259.x","volume":"67","author":"E Lavelle","year":"1997","unstructured":"Lavelle E (1997) Writing style and the narrative essay. Brit J Educ Psychol 67(4):475\u2013482","journal-title":"Brit J Educ Psychol"},{"key":"2649_CR26","doi-asserted-by":"crossref","unstructured":"Afroz S, Brennan M, Greenstadt R (2019) Detecting hoaxes, frauds, and deception in writing style online. In: IEEE, pp 461\u2013475","DOI":"10.1109\/SP.2012.34"},{"issue":"9","key":"2649_CR27","doi-asserted-by":"publisher","first-page":"3756","DOI":"10.1016\/j.eswa.2012.12.082","volume":"40","author":"G Oberreuter","year":"2013","unstructured":"Oberreuter G, Vel\u00e1squez JD (2013) Text mining applied to plagiarism detection: the use of words for detecting deviations in the writing style. Exp Syst Appl 40(9):3756\u20133763. https:\/\/doi.org\/10.1016\/j.eswa.2012.12.082","journal-title":"Exp Syst Appl"},{"key":"2649_CR28","unstructured":"Maupom\u00e9 D, Armstrong MD, Belbahar RM et al (2020) Early mental health risk assessment through writing styles, topics and neural models. In :CLEF"},{"key":"2649_CR29","unstructured":"Liu Y, Ott M, Goyal N et al (2019) Roberta: a robustly optimized bert pretraining approach. arXiv:1907.11692"},{"key":"2649_CR30","unstructured":"Vaswani A, Shazeer N, Parmar N et al (2017) Attention is all you need. In: NeuralPS"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02649-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-025-02649-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02649-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T11:00:33Z","timestamp":1757156433000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-025-02649-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,16]]},"references-count":30,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["2649"],"URL":"https:\/\/doi.org\/10.1007\/s13042-025-02649-2","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"type":"print","value":"1868-8071"},{"type":"electronic","value":"1868-808X"}],"subject":[],"published":{"date-parts":[[2025,4,16]]},"assertion":[{"value":"20 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}