{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T11:42:26Z","timestamp":1767008546882,"version":"3.37.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,8,23]],"date-time":"2024-08-23T00:00:00Z","timestamp":1724371200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,23]],"date-time":"2024-08-23T00:00:00Z","timestamp":1724371200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100008118","name":"Shandong Academy of Sciences","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008118","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,8,23]]},"DOI":"10.1109\/dsc63484.2024.00092","type":"proceedings-article","created":{"date-parts":[[2025,2,4]],"date-time":"2025-02-04T18:29:38Z","timestamp":1738693778000},"page":"621-628","source":"Crossref","is-referenced-by-count":1,"title":["Text Information Mining in Cyberspace: An Information Extraction Method Based on T5 and KeyBERT"],"prefix":"10.1109","author":[{"given":"Kuan","family":"Liu","sequence":"first","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences),Information Research Institute of Shandong Academy of Sciences,Jinan,China"}]},{"given":"Yumei","family":"Li","sequence":"additional","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences) Shandong Institute of Economy and Informatization Development,Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan),Jinan,China"}]},{"given":"Yuanhua","family":"Qi","sequence":"additional","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks, Shandong Fundamental Research Center for Computer Science,Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan),Jinan,China"}]},{"given":"Ning","family":"Qi","sequence":"additional","affiliation":[{"name":"SHANDONG SCICOM Information and Economy Research Institute Co., Ltd,Jinan,China"}]},{"given":"Mengran","family":"Zhai","sequence":"additional","affiliation":[{"name":"Shandong Institute of Economy and Informatization Development,Jinan,China"}]}],"member":"263","reference":[{"author":"Tan","key":"ref1","article-title":"Text Mining: The state of the art and the challenges"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-018-0562-0"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.111447"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4149\/cai_2018_2_509"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121364"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3934\/math.2024616"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-023-00967-y"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117777"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3110143"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-015-0747-x"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2023.01.008"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3352742"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-18110-5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/math12071068"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.120889"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.967"},{"key":"ref17","article-title":"Exploring the Limits of Transfer Learning with a Unified Text-to-Text Transformer","volume-title":"arXiv","author":"Raffel","year":"2023"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.20944\/preprints201908.0073.v1","article-title":"Self-supervised Contextual Keyword and Keyphrase Retrieval with Self-Labelling","author":"Sharma","year":"2019"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1162\/089976603321780272"},{"author":"Lin","key":"ref20","article-title":"ROUGE: A Package for Automatic Evaluation of Summaries"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/cplx.21529"}],"event":{"name":"2024 IEEE 9th International Conference on Data Science in Cyberspace (DSC)","start":{"date-parts":[[2024,8,23]]},"location":"Jinan, China","end":{"date-parts":[[2024,8,26]]}},"container-title":["2024 IEEE 9th International Conference on Data Science in Cyberspace (DSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10858864\/10858687\/10858927.pdf?arnumber=10858927","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T06:07:03Z","timestamp":1738735623000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10858927\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,23]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/dsc63484.2024.00092","relation":{},"subject":[],"published":{"date-parts":[[2024,8,23]]}}}