{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:13:24Z","timestamp":1775067204229,"version":"3.50.1"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3305259","type":"journal-article","created":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T17:56:40Z","timestamp":1692035800000},"page":"87571-87582","source":"Crossref","is-referenced-by-count":12,"title":["Knowledge-Enriched Multi-Cross Attention Network for Legal Judgment Prediction"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8361-8938","authenticated-orcid":false,"given":"Congqing","family":"He","sequence":"first","affiliation":[{"name":"School of Computer Sciences, Universiti Sains Malaysia, Penang, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4154-4747","authenticated-orcid":false,"given":"Tien-Ping","family":"Tan","sequence":"additional","affiliation":[{"name":"School of Computer Sciences, Universiti Sains Malaysia, Penang, Malaysia"}]},{"given":"Xiaobo","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Sciences, Universiti Sains Malaysia, Penang, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8127-0031","authenticated-orcid":false,"given":"Sheng","family":"Xue","sequence":"additional","affiliation":[{"name":"Guangdong Research Institute, China Telecom Corporation Ltd. Research Institute, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3462826"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018628609742"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1289"},{"key":"ref34","article-title":"Distributed representations of words and phrases and their compositionality","author":"mikolov","year":"2013","journal-title":"arXiv 1310 4546"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2945771"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-1174"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.280"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/473"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D15-1166"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3114093"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2307\/1955796"},{"key":"ref33","article-title":"CAIL2018: A large-scale legal dataset for judgment prediction","author":"xiao","year":"2018","journal-title":"arXiv 1807 02478"},{"key":"ref10","first-page":"829","article-title":"Mathematical models for legal prediction","volume":"2","author":"keown","year":"1980","journal-title":"Comput \/LJ"},{"key":"ref32","article-title":"Feed-forward networks with attention can solve some long-term memory problems","author":"raffel","year":"2015","journal-title":"arXiv 1512 08756"},{"key":"ref2","first-page":"1802","article-title":"Learning to predict charges for legal judgment via self-attentive capsule network","author":"le","year":"2020","journal-title":"Proc ECAI"},{"key":"ref1","first-page":"487","article-title":"Few-shot charge prediction with discriminative legal attributes","author":"hu","year":"2018","journal-title":"Proc 27th Int Conf Comput Linguistics"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0174698"},{"key":"ref39","article-title":"Open Chinese language pre-trained model zoo","author":"zhong","year":"2019"},{"key":"ref16","first-page":"783","article-title":"Case instance generation and refinement for case-based criminal summary judgments in Chinese","volume":"20","author":"liu","year":"2004","journal-title":"J Inf Sci Eng"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2021.3124365"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10506-019-09255-y"},{"key":"ref18","article-title":"Exploring the use of text classification in the legal domain","author":"sulea","year":"2017","journal-title":"arXiv 1710 09306"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3331184.3331223"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/567"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3580489"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107960"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.45"},{"key":"ref41","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014","journal-title":"arXiv 1412 6980"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1390"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3091323"},{"key":"ref28","first-page":"4171","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","volume":"1","author":"devlin","year":"2019","journal-title":"Proc Conf North Amer Chapter Assoc Comput Linguistics Hum Lang Technol"},{"key":"ref27","first-page":"1","article-title":"Attention is all you need","volume":"30","author":"vaswani","year":"2017","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33016252"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2307\/1951767"},{"key":"ref7","first-page":"49","article-title":"Exploiting machine learning models for Chinese legal documents labeling, case classification, and sentencing prediction","volume":"17","author":"lin","year":"2012","journal-title":"Comput Linguist Chinese Lang Process"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.2307\/1190728"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1667"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.540"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i17.17742"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2020.06787"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1162\/coli.2009.35.4.35403"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10216994.pdf?arnumber=10216994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T18:20:39Z","timestamp":1694456439000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10216994\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3305259","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}