{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T05:15:36Z","timestamp":1734153336216,"version":"3.30.2"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T00:00:00Z","timestamp":1723766400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T00:00:00Z","timestamp":1723766400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,8,16]]},"DOI":"10.1109\/besc64747.2024.10780447","type":"proceedings-article","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T19:07:29Z","timestamp":1734030449000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["F-BBT: An Industrial Risk Detection Model Based on Feature Fusion"],"prefix":"10.1109","author":[{"given":"Junwei","family":"Zhang","sequence":"first","affiliation":[{"name":"China Cybersecurity Review, Certification and Market Regulation Big Data Center,Beijing,China"}]},{"given":"Jiayu","family":"Liu","sequence":"additional","affiliation":[{"name":"Harbin Engineering University,Harbin,China"}]},{"given":"Dongxin","family":"Xv","sequence":"additional","affiliation":[{"name":"Harbin Engineering University,Harbin,China"}]},{"given":"Minqing","family":"Tan","sequence":"additional","affiliation":[{"name":"China Cybersecurity Review, Certification and Market Regulation Big Data Center,Beijing,China"}]},{"given":"Zhiyuan","family":"Ma","sequence":"additional","affiliation":[{"name":"China Cybersecurity Review, Certification and Market Regulation Big Data Center,Beijing,China"}]}],"member":"263","reference":[{"issue":"8","key":"ref1","first-page":"376","article-title":"Credit card fraud detection based on support vector machine[J]","volume":"28","author":"Xu","year":"2011","journal-title":"Computer Simulation"},{"issue":"06","key":"ref2","first-page":"69","article-title":"Credit card fraud detection based on support vector machine [J]","volume":"26","author":"Li","year":"2010","journal-title":"Microcomputer Information"},{"issue":"06","key":"ref3","first-page":"76","article-title":"Application of multimodal fusion of CCU data in dynamic mortality risk prediction [J]","volume":"41","author":"Ran","year":"2022","journal-title":"Journal of Tianjin University of Technology"},{"issue":"02","key":"ref4","first-page":"49","article-title":"Research on dynamic detection technology of ma-licious APP software based on fuzzy neural network [J]","volume":"43","author":"Peng","year":"2020","journal-title":"Modern Electronic Technology"},{"journal-title":"Research on algorithm of fuzzy neural network in aircraft skin defect detection[J]","author":"Pan","key":"ref5"},{"issue":"11","key":"ref6","first-page":"3075","article-title":"Text sentiment analysis based on CNN and BiLSTM network feature fusion [J]","volume":"38","author":"Li","year":"2018","journal-title":"Computer Applications"},{"issue":"06","key":"ref7","first-page":"502","article-title":"Research on multimodal fake news detection method integrating BERT and VGG models [J]","volume":"8","author":"Zeng","year":"2023","journal-title":"Knowledge Management Forum"},{"issue":"S2","key":"ref8","first-page":"122","article-title":"Malicious traffic detection method based on multi-model parallel fusion network [J]","volume":"43","author":"Li","year":"2023","journal-title":"Computer Applications"},{"issue":"01","key":"ref9","first-page":"70","article-title":"A multivariate time series prediction method that integrates global and sequence features [J]","volume":"46","author":"Li","year":"2023","journal-title":"Journal of Computer Science"},{"key":"ref10","article-title":"Distilling the Knowledge in a Neural Network[J]","author":"GeoffreyE","year":"2015","journal-title":"arXiv: Machine Learning, arXiv: Machine Learning"},{"key":"ref11","article-title":"BERT: Pretraining of Deep Bidirectional Transformers for Language Understanding[C\/OL]","volume-title":"Proceedings of the 2019 Conference of the North, Minneapolis, Minnesota","author":"J","year":"2019"},{"journal-title":"ITRANSFORMER: INVERTED TRANSFORMERS ARE EFFECTIVE FOR TIME SERIES FORE-CASTING[J]","author":"Y","key":"ref12"},{"key":"ref13","article-title":"Attention is All you Need[J]","author":"A","year":"2017","journal-title":"Neural Information Processing Systems,Neural Information Processing Systems"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/d14-1181"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/d14-1179"},{"journal-title":"Sequence to Sequence Learning with Neural Networks[J]","year":"2014","author":"I","key":"ref16"},{"key":"ref17","article-title":"Deep Residual Learning for Image Recognition[C\/OL]","volume-title":"2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA","author":"K","year":"2016"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref19","article-title":"The Technical Writer\u2019s Handbook","volume-title":"Mill Valley, CA:Univer-sity Science","author":"Young","year":"1989"}],"event":{"name":"2024 11th International Conference on Behavioural and Social Computing (BESC)","start":{"date-parts":[[2024,8,16]]},"location":"Harbin, China","end":{"date-parts":[[2024,8,18]]}},"container-title":["2024 11th International Conference on Behavioural and Social Computing (BESC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10779601\/10780446\/10780447.pdf?arnumber=10780447","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T06:29:27Z","timestamp":1734071367000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10780447\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,16]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/besc64747.2024.10780447","relation":{},"subject":[],"published":{"date-parts":[[2024,8,16]]}}}