{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:21:02Z","timestamp":1750220462713,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,10]],"date-time":"2020-07-10T00:00:00Z","timestamp":1594339200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7,10]]},"DOI":"10.1145\/3417188.3417193","type":"proceedings-article","created":{"date-parts":[[2020,9,21]],"date-time":"2020-09-21T17:25:52Z","timestamp":1600709152000},"page":"99-103","source":"Crossref","is-referenced-by-count":0,"title":["A Two-Stage Dynamic Credit Risk Assessment System"],"prefix":"10.1145","author":[{"given":"Rui","family":"Li","sequence":"first","affiliation":[{"name":"Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Shizhe","family":"Deng","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Jianquan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Hao","family":"He","sequence":"additional","affiliation":[{"name":"Shanghai Institute for Advanced Communication and Data Science, Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Yaohui","family":"Jin","sequence":"additional","affiliation":[{"name":"MoE Key Lab of Artifcial Intelligence, AI Institute, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Jiangang","family":"Duan","sequence":"additional","affiliation":[{"name":"Seassoon Technology, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2020,9,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.08.029"},{"volume-title":"Intelligent Systems Design and Applications","author":"Chen Keqin","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","first-page":"8","article-title":"Credit Risk Evaluating System Using Decision Tree - Neuro Based Model","volume":"2","author":"Kabari L G","year":"2013","journal-title":"International Journal of Engineering Research"},{"key":"e_1_3_2_1_4_1","unstructured":"Durand D. 1941. Risk elements in consumer installment financing[M]. National Bureau of Economic Research New York.  Durand D. 1941. Risk elements in consumer installment financing[M]. National Bureau of Economic Research New York."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2887138"},{"volume-title":"Intelligent Computing Theories and Application","author":"Zhang Yishen","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.3390\/risks6020038"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41019-019-0085-9"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIBD.2018.8396195"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330693"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/70405.70408"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation 9 8 (1997) 1735 - 1780.  Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation 9 8 (1997) 1735 - 1780.","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.12.020"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622407.1622416"},{"key":"e_1_3_2_1_15_1","first-page":"1","article-title":"Dropout: a simple way to prevent neural networks from overfitting","volume":"15","author":"Srivastava Nitish","year":"2014","journal-title":"J. Mach. Learn. Res."}],"event":{"name":"ICDLT 2020: 2020 4th International Conference on Deep Learning Technologies","sponsor":["Beijing University of Technology"],"location":"Beijing China","acronym":"ICDLT 2020"},"container-title":["Proceedings of the 2020 4th International Conference on Deep Learning Technologies (ICDLT)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3417188.3417193","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:13Z","timestamp":1750193293000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3417188.3417193"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,10]]},"references-count":15,"alternative-id":["10.1145\/3417188.3417193","10.1145\/3417188"],"URL":"https:\/\/doi.org\/10.1145\/3417188.3417193","relation":{},"subject":[],"published":{"date-parts":[[2020,7,10]]}}}