{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:30:47Z","timestamp":1771065047888,"version":"3.50.1"},"reference-count":30,"publisher":"Informa UK Limited","issue":"1","license":[{"start":{"date-parts":[[2024,11,17]],"date-time":"2024-11-17T00:00:00Z","timestamp":1731801600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Applied Artificial Intelligence"],"published-print":{"date-parts":[[2024,12,31]]},"DOI":"10.1080\/08839514.2024.2428552","type":"journal-article","created":{"date-parts":[[2024,11,18]],"date-time":"2024-11-18T05:45:23Z","timestamp":1731908723000},"update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":3,"title":["Crime Type Identification Using High-Order Deep Residual Network with Multiple Attention Algorithm"],"prefix":"10.1080","volume":"38","author":[{"given":"Dawei","family":"Qiu","sequence":"first","affiliation":[{"name":"State Key Lab of Processors, Institute of Computing Technology, CAS, Beijing, China"},{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"},{"name":"Beijing Key Laboratory of Mobile Computing and Pervasive Device, Institute of Computing Technology, CAS, Beijing, China"}]},{"given":"Chang","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Lab of Processors, Institute of Computing Technology, CAS, Beijing, China"},{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"},{"name":"Beijing Key Laboratory of Mobile Computing and Pervasive Device, Institute of Computing Technology, CAS, Beijing, China"}]},{"given":"Yuangfeng","family":"Shang","sequence":"additional","affiliation":[{"name":"State Key Lab of Processors, Institute of Computing Technology, CAS, Beijing, China"},{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"},{"name":"Beijing Key Laboratory of Mobile Computing and Pervasive Device, Institute of Computing Technology, CAS, Beijing, China"}]},{"given":"Zixu","family":"Zhao","sequence":"additional","affiliation":[{"name":"State Key Lab of Processors, Institute of Computing Technology, CAS, Beijing, China"},{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"},{"name":"Beijing Key Laboratory of Mobile Computing and Pervasive Device, Institute of Computing Technology, CAS, Beijing, China"},{"name":"University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Jinlin","family":"Shi","sequence":"additional","affiliation":[{"name":"State Key Lab of Processors, Institute of Computing Technology, CAS, Beijing, China"},{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"},{"name":"Beijing Key Laboratory of Mobile Computing and Pervasive Device, Institute of Computing Technology, CAS, Beijing, China"}]}],"member":"301","published-online":{"date-parts":[[2024,11,17]]},"reference":[{"key":"e_1_3_5_2_1","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2021.014113"},{"key":"e_1_3_5_3_1","first-page":"20","volume-title":"Data science approach for crime analysis and prediction: Saudi Arabia use-case","author":"Aldossari N.","year":"2022","unstructured":"Aldossari, N., A. Algefes, F. Masmoudi, and E. Kariri. 2022. 2022 Fifth International Conference of Women in Data Science at Prince Sultan University (WiDS PSU), 20\u201325, Riyadh, Saudi Arabia. Data science approach for crime analysis and prediction: Saudi Arabia use-case."},{"key":"e_1_3_5_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2018.00060"},{"key":"e_1_3_5_5_1","doi-asserted-by":"publisher","DOI":"10.33889\/IJMEMS.2019.4.2-030"},{"key":"e_1_3_5_6_1","doi-asserted-by":"publisher","DOI":"10.3390\/socsci10010004"},{"key":"e_1_3_5_7_1","first-page":"249","volume-title":"Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics","volume":"9","author":"Glorot X.","year":"2010","unstructured":"Glorot, X., and Y. Bengio. 2010. Understanding the difficulty of training deep feedforward neural networks. Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, Sardinia, Italy, vol. 9, 249\u201356."},{"key":"e_1_3_5_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3041924"},{"key":"e_1_3_5_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_5_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-6648-6_22"},{"key":"e_1_3_5_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00745"},{"key":"e_1_3_5_12_1","first-page":"201","article-title":"Une am\u00e9lioration de la m\u00e9thode de Runge-Kutta-Nystr\u00f4m pour la r\u00e9solution num\u00e9rique des \u00e9quations diff\u00e9rentielles du premier ordre","volume":"1","author":"Huta A.","year":"1956","unstructured":"Huta, A. 1956. Une am\u00e9lioration de la m\u00e9thode de Runge-Kutta-Nystr\u00f4m pour la r\u00e9solution num\u00e9rique des \u00e9quations diff\u00e9rentielles du premier ordre. Acta Mathematica Universitatis Comenianae 1:201\u201324.","journal-title":"Acta Mathematica Universitatis Comenianae"},{"key":"e_1_3_5_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2916280"},{"key":"e_1_3_5_14_1","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO48935.2020.9245120"},{"key":"e_1_3_5_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-022-00671-3"},{"key":"e_1_3_5_16_1","doi-asserted-by":"publisher","DOI":"10.5121\/mlaij.2015.2101"},{"key":"e_1_3_5_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/507533.507538"},{"key":"e_1_3_5_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC4ME2.2018.8465583"},{"key":"e_1_3_5_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSDET.2018.8821168"},{"key":"e_1_3_5_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108319"},{"key":"e_1_3_5_21_1","first-page":"1","volume-title":"The power of predictive analytics: forecasting crime trends in high-risk areas for crime prevention using machine learning","author":"Saini S.","year":"2023","unstructured":"Saini, S., and N. Kaur. 2023. 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT), 1\u201310, Delhi, India. The power of predictive analytics: forecasting crime trends in high-risk areas for crime prevention using machine learning."},{"key":"e_1_3_5_22_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxac053"},{"key":"e_1_3_5_23_1","first-page":"1047","volume-title":"Exploring the potential of AI for urban crime prediction in India: a case study of Indian metropolitan cities","author":"Sharma H. K.","year":"2023","unstructured":"Sharma, H. K., and R. M. Tailor. 2023. 2023 6th International Conference on Contemporary Computing and Informatics (IC3I), 1047\u201351, India: Gautam Buddha Nagar. Exploring the potential of AI for urban crime prediction in India: a case study of Indian metropolitan cities."},{"key":"e_1_3_5_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESCI53509.2022.9758281"},{"key":"e_1_3_5_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOEI.2018.8553904"},{"key":"e_1_3_5_26_1","first-page":"1","volume-title":"HDLCP: experimental analysis and development of hybrid deep learning methodology for crime scenario assesment and prediction","author":"Tamilselvi M.","year":"2024","unstructured":"Tamilselvi, M., C. N. Ravi, S. Jayasudha, P. Shahad, S. Karthikeyan, and V. S. Pandi. 2024. 2024 1st International Conference on Cognitive, Green and Ubiquitous Computing (IC-CGU), 1\u20136, Bhubaneswar, India. HDLCP: experimental analysis and development of hybrid deep learning methodology for crime scenario assesment and prediction."},{"key":"e_1_3_5_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3171843"},{"key":"e_1_3_5_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2018.8555604"},{"key":"e_1_3_5_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2022.3207987"},{"key":"e_1_3_5_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA52953.2021.00277"},{"key":"e_1_3_5_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2020.05.003"}],"container-title":["Applied Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08839514.2024.2428552","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T16:19:12Z","timestamp":1734365952000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08839514.2024.2428552"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,17]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,12,31]]}},"alternative-id":["10.1080\/08839514.2024.2428552"],"URL":"https:\/\/doi.org\/10.1080\/08839514.2024.2428552","relation":{},"ISSN":["0883-9514","1087-6545"],"issn-type":[{"value":"0883-9514","type":"print"},{"value":"1087-6545","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,17]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uaai20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uaai20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2024-05-14","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-08-22","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-19","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"2428552"}}