{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:04:41Z","timestamp":1750309481699,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T00:00:00Z","timestamp":1733443200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Strengthening Plan of National Defense Science and Technology Foundation of China","award":["2021-JCJQ-JJ-0059"],"award-info":[{"award-number":["2021-JCJQ-JJ-0059"]}]},{"name":"Natural Science Foundation of China","award":["U2003207"],"award-info":[{"award-number":["U2003207"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,6]]},"DOI":"10.1145\/3709026.3709106","type":"proceedings-article","created":{"date-parts":[[2025,2,15]],"date-time":"2025-02-15T10:05:41Z","timestamp":1739613941000},"page":"399-405","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Chinese Named Entity Recognition Based on Adversarial Training and Deep Multi-Granularity Dilated Convolutions"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-5786-5673","authenticated-orcid":false,"given":"Qiuyan","family":"Ji","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Xinjiang University, Urumqi, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-8548-678X","authenticated-orcid":false,"given":"Hankiz","family":"Yilahun","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xinjiang University, Urumqi, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2135-0091","authenticated-orcid":false,"given":"Seyyare","family":"Imam","sequence":"additional","affiliation":[{"name":"School of National Security Studies, Xinjiang University, Urumqi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2321-308X","authenticated-orcid":false,"given":"Askar","family":"Hamdulla","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xinjiang University, Urumqi, China"}]}],"member":"320","published-online":{"date-parts":[[2025,2,15]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"Giannis Bekoulis Johannes Deleu Thomas Demeester and Chris Develder. 2018. Adversarial training for multi-context joint entity and relation extraction. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1808.06876 (2018).","DOI":"10.18653\/v1\/D18-1307"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Xilun Chen and Claire Cardie. 2018. Multinomial adversarial networks for multi-domain text classification. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1802.05694 (2018).","DOI":"10.18653\/v1\/N18-1111"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Minsoo Cho Jihwan Ha Chihyun Park and Sanghyun Park. 2020. Combinatorial feature embedding based on CNN and LSTM for biomedical named entity recognition. Journal of biomedical informatics 103 (2020) 103381.","DOI":"10.1016\/j.jbi.2020.103381"},{"key":"e_1_3_3_1_5_2","unstructured":"T Dozat. 2016. Deep Biaffine Attention for Neural Dependency Parsing. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1611.01734 (2016)."},{"key":"e_1_3_3_1_6_2","unstructured":"Imed Keraghel Stanislas Morbieu and Mohamed Nadif. 2024. A survey on recent advances in named entity recognition. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2401.10825 (2024)."},{"key":"e_1_3_3_1_7_2","first-page":"108","volume-title":"Proceedings of the Fifth SIGHAN workshop on Chinese language processing","author":"Levow Gina-Anne","year":"2006","unstructured":"Gina-Anne Levow. 2006. The third international Chinese language processing bakeoff: Word segmentation and named entity recognition. In Proceedings of the Fifth SIGHAN workshop on Chinese language processing. 108\u2013117."},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i10.21344"},{"key":"e_1_3_3_1_9_2","unstructured":"Xiaonan Li Hang Yan Xipeng Qiu and Xuanjing Huang. 2020. FLAT: Chinese NER using flat-lattice transformer. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2004.11795 (2020)."},{"key":"e_1_3_3_1_10_2","unstructured":"Qiao Liu Yang Li Hong Duan Yao Liu and Zhiguang Qin. 2016. Knowledge graph construction techniques. Journal of computer research and development 53 3 (2016) 582\u2013600."},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"crossref","unstructured":"Ruibo Liu Jason Wei Chenyan Jia and Soroush Vosoughi. 2021. Modulating language models with emotions. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2108.07886 (2021).","DOI":"10.18653\/v1\/2021.findings-acl.379"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Ling Luo Zhihao Yang Pei Yang Yin Zhang Lei Wang Hongfei Lin and Jian Wang. 2018. An attention-based BiLSTM-CRF approach to document-level chemical named entity recognition. Bioinformatics 34 8 (2018) 1381\u20131388.","DOI":"10.1093\/bioinformatics\/btx761"},{"key":"e_1_3_3_1_13_2","unstructured":"Ruotian Ma Minlong Peng Qi Zhang and Xuanjing Huang. 2019. Simplify the usage of lexicon in Chinese NER. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1908.05969 (2019)."},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Cheoneum Park Seohyeong Jeong and Juae Kim. 2023. ADMit: Improving NER in automotive domain with domain adversarial training and multi-task learning. Expert Systems with Applications 225 (2023) 120007.","DOI":"10.1016\/j.eswa.2023.120007"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D15-1064"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"crossref","unstructured":"Ya Qin Guo-wei Shen Wen-bo Zhao Yan-ping Chen Miao Yu and Xin Jin. 2019. A network security entity recognition method based on feature template and CNN-BiLSTM-CRF. Frontiers of Information Technology & Electronic Engineering 20 6 (2019) 872\u2013884.","DOI":"10.1631\/FITEE.1800520"},{"key":"e_1_3_3_1_17_2","unstructured":"R Weischedel M Palmer M Marcus et\u00a0al. 2011. Ontonotes release 4.0. LDC2011T03 Philadelphia Penn.: Linguistic Data Consortium. LDC2011T03 Philadel-phia Penn.: Linguistic Data Consortium (2011)."},{"key":"e_1_3_3_1_18_2","unstructured":"YOU Xindong GE Haojie HAN Junmei and L\u00dc Xueqiang. 2022. Recognition of Complex Entities in Weapons and Equipment Field. Acta Scientiarum Naturalium Universitatis Pekinensis 58 3 (2022) 391\u2013404."},{"key":"e_1_3_3_1_19_2","unstructured":"Conglei Xu Kun Shen and Hongguang Sun. 2023. Supplementary features of BiLSTM for enhanced sequence labeling. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2305.19928 (2023)."},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"crossref","unstructured":"Kai Xu Zhenguo Yang Peipei Kang Qi Wang and Wenyin Liu. 2019. Document-level attention-based BiLSTM-CRF incorporating disease dictionary for disease named entity recognition. Computers in biology and medicine 108 (2019) 122\u2013132.","DOI":"10.1016\/j.compbiomed.2019.04.002"},{"key":"e_1_3_3_1_21_2","unstructured":"QI Yudong DING Haiqiang WU Jinyu and SI Weichao. 2020. Military Named Entity Identification Method Combining Ontology and BiLSTM-CRF. Journal of Ordnance Equipment Engineering 41 5 (2020) 118\u2013123."},{"key":"e_1_3_3_1_22_2","unstructured":"Yue Zhang and Jie Yang. 2018. Chinese NER using lattice LSTM. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1805.02023 (2018)."}],"event":{"name":"CSAI 2024: 2024 8th International Conference on Computer Science and Artificial Intelligence (CSAI)","acronym":"CSAI 2024","location":"Beijing China"},"container-title":["Proceedings of the 2024 8th International Conference on Computer Science and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3709026.3709106","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3709026.3709106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:31Z","timestamp":1750295851000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3709026.3709106"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,6]]},"references-count":21,"alternative-id":["10.1145\/3709026.3709106","10.1145\/3709026"],"URL":"https:\/\/doi.org\/10.1145\/3709026.3709106","relation":{},"subject":[],"published":{"date-parts":[[2024,12,6]]},"assertion":[{"value":"2025-02-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}