{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:15:06Z","timestamp":1750220106686,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,1,21]],"date-time":"2022-01-21T00:00:00Z","timestamp":1642723200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,1,21]]},"DOI":"10.1145\/3520084.3520101","type":"proceedings-article","created":{"date-parts":[[2022,4,18]],"date-time":"2022-04-18T23:40:54Z","timestamp":1650325254000},"page":"106-112","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Law Recommendation Based on Self - Attention Mechanism and Feature Fusion"],"prefix":"10.1145","author":[{"given":"Lei","family":"Liu","sequence":"first","affiliation":[{"name":"School of Cyber Security, Gansu University of Political Science and Law, China"}]},{"given":"Dezhi","family":"An","sequence":"additional","affiliation":[{"name":"School of Cyber Security, Gansu University of Political Science and Law, China"}]}],"member":"320","published-online":{"date-parts":[[2022,4,18]]},"reference":[{"issue":"1","key":"e_1_3_2_1_1_1","first-page":"1","article-title":"\u201cRight to Counsel","volume":"51","author":"Fred Kort A","year":"1957","unstructured":"Fred Kort . Predicting Supreme Court Decisions Mathematically: A Quantitative Analysis of the \u201cRight to Counsel \u201d Cases[J]. American Political Science Review , 1957 , 51 ( 1 ): 1 - 12 . Fred Kort. Predicting Supreme Court Decisions Mathematically: A Quantitative Analysis of the \u201cRight to Counsel\u201d Cases[J]. American Political Science Review, 1957, 51(1): 1-12.","journal-title":"Cases[J]. American Political Science Review"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.2307\/1955796"},{"key":"e_1_3_2_1_3_1","volume-title":"Computer Science","author":"Bahdanau D","year":"2014","unstructured":"Bahdanau D , Cho K , Bengio Y. Neural Machine Translation by Jointly Learning to Align and Translate[J] . Computer Science , 2014 . Bahdanau D, Cho K, Bengio Y. Neural Machine Translation by Jointly Learning to Align and Translate[J]. Computer Science, 2014."},{"key":"e_1_3_2_1_4_1","first-page":"1","article-title":"A Convolutional Neural Network for Modelling Sentences[J]","author":"Kalchbrenner N","year":"2014","unstructured":"Kalchbrenner N , Grefenstette E , Blunsom P . A Convolutional Neural Network for Modelling Sentences[J] . Eprint Arxiv , 2014 , 1 . Kalchbrenner N, Grefenstette E, Blunsom P. A Convolutional Neural Network for Modelling Sentences[J]. Eprint Arxiv, 2014, 1.","journal-title":"Eprint Arxiv"},{"key":"e_1_3_2_1_5_1","volume-title":"Recurrent convolutional neural networks for text classification[C]\/\/Twenty-ninth AAAI Conference on Artificial Intelligence","author":"Lai S","year":"2015","unstructured":"Lai S , Xu L , Liu , K , Recurrent convolutional neural networks for text classification[C]\/\/Twenty-ninth AAAI Conference on Artificial Intelligence . 2015 . Lai S, Xu L, Liu, K, Recurrent convolutional neural networks for text classification[C]\/\/Twenty-ninth AAAI Conference on Artificial Intelligence. 2015."},{"key":"e_1_3_2_1_6_1","volume-title":"Semi-Supervised Classification with Graph Convolutional Networks[J]","author":"Kip F T N","year":"2016","unstructured":"Kip F T N , Welling M. Semi-Supervised Classification with Graph Convolutional Networks[J] . 2016 . Kip F T N, Welling M. Semi-Supervised Classification with Graph Convolutional Networks[J]. 2016."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2014.07.003"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing. arXiv","author":"Luo B","year":"2017","unstructured":"Luo B , Feng Y , Xu J , Learning to Predict Charges for Criminal Cases with Legal Basis[C]\/\/ Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing. arXiv , 2017 . Luo B, Feng Y, Xu J, Learning to Predict Charges for Criminal Cases with Legal Basis[C]\/\/ Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing. arXiv, 2017."},{"key":"e_1_3_2_1_9_1","volume-title":"Few-shot charge prediction with discriminative legal attributes [C] \/\/Proceedings of COLINU","author":"Hu Zikun","year":"2018","unstructured":"Hu Zikun , Li Xiang, Tu Cunchao , Few-shot charge prediction with discriminative legal attributes [C] \/\/Proceedings of COLINU , 2018 . Hu Zikun, Li Xiang, Tu Cunchao, Few-shot charge prediction with discriminative legal attributes [C] \/\/Proceedings of COLINU, 2018."},{"key":"e_1_3_2_1_10_1","volume-title":"CAIL2018: A Large-Scale Legal Dataset for Judgment Prediction[J]. arXiv","author":"Xiao C","year":"2018","unstructured":"Xiao C , Zhong H , Guo Z , CAIL2018: A Large-Scale Legal Dataset for Judgment Prediction[J]. arXiv , 2018 . Xiao C, Zhong H, Guo Z, CAIL2018: A Large-Scale Legal Dataset for Judgment Prediction[J]. arXiv, 2018."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2006.18.7.1527"},{"key":"e_1_3_2_1_12_1","first-page":"1","volume-title":"Proceedings of the International Conference on Learning Representations (ICLR 2013","author":"Mikolov T.","year":"2013","unstructured":"Mikolov , T. , Chen , K. , Corrado , G. , ( 2013 ) Efficient Estimation of Word Representations in Vector Space . Proceedings of the International Conference on Learning Representations (ICLR 2013 ), Scottsdale, AZ , 2-4 May 2013, 1 - 12 . Mikolov, T., Chen, K., Corrado, G., (2013) Efficient Estimation of Word Representations in Vector Space. Proceedings of the International Conference on Learning Representations (ICLR 2013), Scottsdale, AZ, 2-4 May 2013, 1-12."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"e_1_3_2_1_14_1","volume-title":"Computer Science","author":"Zhang Y","year":"2015","unstructured":"Zhang Y , Wallace B. A Sensitivity Analysis of (and Practitioners' Guide to) Convolutional Neural Networks for Sentence Classification[J] . Computer Science , 2015 . Zhang Y, Wallace B. A Sensitivity Analysis of (and Practitioners' Guide to) Convolutional Neural Networks for Sentence Classification[J]. Computer Science, 2015."},{"key":"e_1_3_2_1_15_1","volume-title":"Eprint Arxiv","author":"Zaremba W","year":"2014","unstructured":"Zaremba W , Sutskever I , Vinyals O. Recurrent Neural Network Regularization[J] . Eprint Arxiv , 2014 . Zaremba W, Sutskever I, Vinyals O. Recurrent Neural Network Regularization[J]. Eprint Arxiv, 2014."},{"key":"e_1_3_2_1_16_1","volume-title":"Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling[J]. Eprint Arxiv","author":"Chung J","year":"2014","unstructured":"Chung J , Gulcehre C , Cho K H , Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling[J]. Eprint Arxiv , 2014 . Chung J, Gulcehre C, Cho K H, Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling[J]. Eprint Arxiv, 2014."},{"key":"e_1_3_2_1_17_1","volume-title":"Attention Is All You Need[J]. arXiv","author":"Vaswani A","year":"2017","unstructured":"Vaswani A , Shazeer N , Parmar N , Attention Is All You Need[J]. arXiv , 2017 . Vaswani A, Shazeer N, Parmar N, Attention Is All You Need[J]. arXiv, 2017."}],"event":{"name":"ICSIM 2022: 2022 The 5th International Conference on Software Engineering and Information Management","acronym":"ICSIM 2022","location":"Yokohama Japan"},"container-title":["2022 The 5th International Conference on Software Engineering and Information Management (ICSIM)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3520084.3520101","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3520084.3520101","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:31Z","timestamp":1750183831000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3520084.3520101"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,21]]},"references-count":17,"alternative-id":["10.1145\/3520084.3520101","10.1145\/3520084"],"URL":"https:\/\/doi.org\/10.1145\/3520084.3520101","relation":{},"subject":[],"published":{"date-parts":[[2022,1,21]]},"assertion":[{"value":"2022-04-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}