{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:21:15Z","timestamp":1750220475707,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T00:00:00Z","timestamp":1632441600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,9,24]]},"DOI":"10.1145\/3482632.3487450","type":"proceedings-article","created":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T17:26:23Z","timestamp":1637601983000},"page":"2457-2461","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Analysis of Bank Loan Risk Management Based on BP Neural Network"],"prefix":"10.1145","author":[{"given":"Xianping","family":"Yuan","sequence":"first","affiliation":[{"name":"Xi'an University of Science and Technology, China"}]},{"given":"Yue","family":"Zhang","sequence":"additional","affiliation":[{"name":"Xi'an University of Science and Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2021,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"124","volume-title":"Analysis of Enterprise Internal Control Strategy Based on Risk Management. Enterprise technology development (academic edition),038, no. 008","author":"Gao Zhijun","year":"2019","unstructured":"Gao Zhijun . Analysis of Enterprise Internal Control Strategy Based on Risk Management. Enterprise technology development (academic edition),038, no. 008 , pp. 124 - 126 , 2019 . Gao Zhijun. Analysis of Enterprise Internal Control Strategy Based on Risk Management. Enterprise technology development (academic edition),038, no. 008, pp. 124-126, 2019."},{"issue":"2","key":"e_1_3_2_1_2_1","first-page":"83","volume":"31","author":"Li X F","year":"2020","unstructured":"Li X F , Zhang C , Lin X C , Research on Default Risk of Peer-To-Peer Online Lending Based on Data Mining Algorithm . Journal of Computer Science , 31 , no. 2 , pp. 83 - 100 , 2020 . Li X F, Zhang C, Lin X C, Research on Default Risk of Peer-To-Peer Online Lending Based on Data Mining Algorithm. Journal of Computer Science, 31, no. 2, pp. 83-100, 2020.","journal-title":"Journal of Computer Science"},{"volume-title":"Research on the Role and Limitation of Technical Experts in Food Safety Risk Management Based on Content Analysis","author":"Wujianxun","key":"e_1_3_2_1_3_1","unstructured":"Wujianxun . Research on the Role and Limitation of Technical Experts in Food Safety Risk Management Based on Content Analysis . Journal of Henan University of Technology (Social Science Edition) , 014, no. 002, pp. 36-43, 2018. Wujianxun. Research on the Role and Limitation of Technical Experts in Food Safety Risk Management Based on Content Analysis. Journal of Henan University of Technology (Social Science Edition), 014, no. 002, pp. 36-43, 2018."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1108\/JES-12-2018-0425"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.4236\/jfrm.2018.74021"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.3390\/jrfm14070322"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.17010\/ijrcm\/2019\/v6\/i1\/144039"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJDSRM.2019.106907"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.30525\/2256-0742\/2018-4-1-188-194"},{"volume-title":"Analysis of information technology service of Mandiri Bank by K- nearest neighbor algorithm based on ITSM criterion. ADI Journal on Recent Innovation (AJRI)","author":"Ramadhan F W","key":"e_1_3_2_1_10_1","unstructured":"Ramadhan F W , Sukmana H T , Oh L K , Analysis of information technology service of Mandiri Bank by K- nearest neighbor algorithm based on ITSM criterion. ADI Journal on Recent Innovation (AJRI) , vol. 1 , no. 1, pp. 14-19, 2019. Ramadhan F W, Sukmana H T, Oh L K, Analysis of information technology service of Mandiri Bank by K- nearest neighbor algorithm based on ITSM criterion. ADI Journal on Recent Innovation (AJRI), vol. 1, no. 1, pp. 14-19, 2019."}],"event":{"name":"ICISCAE 2021: 2021 IEEE 4th International Conference on Information Systems and Computer Aided Education","acronym":"ICISCAE 2021","location":"Dalian China"},"container-title":["2021 4th International Conference on Information Systems and Computer Aided Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3482632.3487450","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3482632.3487450","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:43Z","timestamp":1750193323000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3482632.3487450"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,24]]},"references-count":10,"alternative-id":["10.1145\/3482632.3487450","10.1145\/3482632"],"URL":"https:\/\/doi.org\/10.1145\/3482632.3487450","relation":{},"subject":[],"published":{"date-parts":[[2021,9,24]]},"assertion":[{"value":"2021-11-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}