{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T14:12:23Z","timestamp":1777126343690,"version":"3.51.4"},"reference-count":95,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71371181"],"award-info":[{"award-number":["71371181"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71672193"],"award-info":[{"award-number":["71672193"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Foundation of Xi\u2019an International Studies University","award":["BSZA2019003"],"award-info":[{"award-number":["BSZA2019003"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3036469","type":"journal-article","created":{"date-parts":[[2020,11,6]],"date-time":"2020-11-06T20:56:32Z","timestamp":1604696192000},"page":"203876-203889","source":"Crossref","is-referenced-by-count":17,"title":["A Novel End-to-End Corporate Credit Rating Model Based on Self-Attention Mechanism"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3540-1053","authenticated-orcid":false,"given":"Binbin","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1869-320X","authenticated-orcid":false,"given":"Shengjie","family":"Long","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1088\/1674-4527\/19\/9\/135"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-017-9636-0"},{"key":"ref71","doi-asserted-by":"crossref","first-page":"406","DOI":"10.3390\/en10030406","article-title":"Research on unstructured text data mining and fault classification based on RNN-LSTM with malfunction inspection report","volume":"10","author":"wei","year":"2017","journal-title":"Energies"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-2009"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.3390\/s18114019"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.3390\/rs11141639"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-019-1485-0"},{"key":"ref39","article-title":"Neural machine translation by jointly learning to align and translate","author":"bahdanau","year":"2014","journal-title":"arXiv 1409 0473"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1093\/sleep\/zsaa048"},{"key":"ref38","first-page":"2204","article-title":"Recurrent models of visual attention","author":"mnih","year":"2014","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-019-01530-8"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-019-10125-6"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.04.018"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2011.06.023"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1025\/1\/012114"},{"key":"ref30","first-page":"1","article-title":"Improved of k-nearest neighbor techniques in credit scoring","volume":"1","author":"babu","year":"2013","journal-title":"International Journal for Development of Computer Science & Technology"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1061\/9780784482292.432"},{"key":"ref36","article-title":"An empirical comparison of decision trees and other classification methods","author":"lim","year":"1997"},{"key":"ref35","author":"breiman","year":"1984","journal-title":"Classification and Regression Trees"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.07.007"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D16-1058"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1179"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2582924"},{"key":"ref63","article-title":"Empirical evaluation of gated recurrent neural networks on sequence modeling","author":"chung","year":"2014","journal-title":"arXiv 1412 3555"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1093\/imaman\/8.4.305"},{"key":"ref64","first-page":"3104","article-title":"Sequence to sequence learning with neural networks","author":"sutskever","year":"2014","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref27","first-page":"2731","article-title":"Fuzzy cluster in credit scoring","volume":"5","author":"luo","year":"2003","journal-title":"Proc Int Conf Mach Learn Cybern"},{"key":"ref65","first-page":"2773","article-title":"Grammar as a foreign language","author":"vinyals","year":"2015","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref66","article-title":"Recurrent neural network regularization","author":"zaremba","year":"2014","journal-title":"arXiv 1409 2329"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2009.261"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D15-1075"},{"key":"ref68","first-page":"2335","article-title":"Relation classification via convolutional deep neural network","author":"zeng","year":"2014","journal-title":"Proc 25th Int Conf Comput Linguistics"},{"key":"ref69","article-title":"Classifying relations by ranking with convolutional neural networks","author":"nogueira dos santos","year":"2015","journal-title":"arXiv 1504 06580"},{"key":"ref2","article-title":"The effect of credit assessment process on repayment of bank loans in commercial banks in Kenya","author":"chepkoech","year":"2014"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.2307\/2490171"},{"key":"ref20","author":"trippi","year":"1992","journal-title":"Neural Networks in Finance and Investing Using Artificial Intelligence to Improve Real World Performance"},{"key":"ref22","first-page":"985","article-title":"Extreme learning machine: A new learning scheme of feedforward neural networks","volume":"2","author":"huang","year":"2004","journal-title":"Proc IEEE Int Joint Conf Neural Netw"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.2307\/3665934"},{"key":"ref24","first-page":"25","article-title":"Cluster analysis in credit scoring","author":"lundy","year":"1993","journal-title":"Credit Scoring and Credit Control"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11897-0_44"},{"key":"ref26","first-page":"64","article-title":"Cluster analysis for weight of credit risk evaluation index","volume":"10","author":"chi","year":"2001","journal-title":"Syst Eng -Theory Methodol Appl"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1093\/imaman\/4.1.81"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1285"},{"key":"ref51","article-title":"Weighted transformer network for machine translation","author":"ahmed","year":"2017","journal-title":"arXiv 1711 02132"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766500"},{"key":"ref94","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014","journal-title":"arXiv 1412 6980"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.2753\/CLG0009-4609430304"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1458"},{"key":"ref91","article-title":"Layer normalization","author":"lei ba","year":"2016","journal-title":"arXiv 1607 06450"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1002\/9781118182635.efm0074"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/S17-2126"},{"key":"ref58","article-title":"Joint language and translation modeling with recurrent neural networks","author":"auli","year":"2013","journal-title":"Proc EMNLP"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1088\/0256-307X\/17\/2\/004"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.3115\/1218955.1218990"},{"key":"ref55","article-title":"Relation classification via recurrent neural network","author":"zhang","year":"2015","journal-title":"arXiv 1508 01006"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2020.2978004"},{"key":"ref53","article-title":"Self-attention generative adversarial networks","author":"zhang","year":"2018","journal-title":"arXiv 1805 08318"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-1166"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.2307\/2978933"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/0378-4266(85)90021-4"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D15-1166"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-1809.1936.tb02137.x"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/0378-4266(77)90022-X"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2307\/2490395"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.2307\/2490859"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2967103"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.2307\/2329209"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.11.084"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(03)00086-1"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-020-09510-6"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.1990.137710"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-1174"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.38.7.926"},{"key":"ref80","first-page":"1","article-title":"Chinese text classification based on attention mechanism and feature-enhanced fusion neural network","volume":"102","author":"xie","year":"2019","journal-title":"Computing"},{"key":"ref89","first-page":"1","article-title":"Credit scoring model by analytic hierarchy process (AHP)","author":"saardchom","year":"2006","journal-title":"Proc World Business Econ Res Conf"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/0378-4266(77)90017-6"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-4266(97)00036-8"},{"key":"ref6","first-page":"5998","article-title":"Attention is all you need","author":"vaswani","year":"2017","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref5","author":"schmid","year":"2012","journal-title":"Credit Risk Pricing Models Theory and Practice"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.03.020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-26336-6"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966407"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008231027420"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33013159"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.26599\/BDMA.2018.9020022"},{"key":"ref88","first-page":"1893","article-title":"Financial reporting: Long-term change of financial ratios","volume":"8","author":"laitinen","year":"2018","journal-title":"Management"},{"key":"ref9","first-page":"1","article-title":"A dynamic financial ratio adjustment model","volume":"4","author":"yang","year":"2010","journal-title":"Global J Bus Res"},{"key":"ref46","first-page":"2870","article-title":"Reading and thinking: Re-read LSTM unit for textual entailment recognition","author":"sha","year":"2016","journal-title":"Proc Int Conf on Computational Linguistics (COLING)"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D16-1244"},{"key":"ref48","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","author":"devlin","year":"2018","journal-title":"arXiv 1810 04805"},{"key":"ref47","article-title":"A structured self-attentive sentence embedding","author":"lin","year":"2017","journal-title":"arXiv 1703 03130"},{"key":"ref42","first-page":"1243","article-title":"Convolutional sequence to sequence learning","volume":"70","author":"gehring","year":"2017","journal-title":"Proc 34th Int Conf Mach Learn"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-1070"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D16-1053"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2913394"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09250432.pdf?arnumber=9250432","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:57:04Z","timestamp":1639771024000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9250432\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":95,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3036469","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}