{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T06:39:09Z","timestamp":1763102349415,"version":"3.45.0"},"reference-count":31,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":88,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.059784","type":"journal-article","created":{"date-parts":[[2025,2,10]],"date-time":"2025-02-10T02:53:32Z","timestamp":1739156012000},"page":"1471-1489","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Institution Attribute Mining Technology for Access Control Based on Hybrid Capsule Network"],"prefix":"10.32604","volume":"83","author":[{"given":"Aodi","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xuehui","family":"Du","sequence":"additional","affiliation":[]},{"given":"Na","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiangyu","family":"Wu","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"18976","DOI":"10.1109\/JIOT.2024.3353727","article-title":"Privacy-preserving and secure industrial big data analytics: a survey and the research framework","volume":"11","author":"Liu","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1109\/TDSC.2023.3261309","article-title":"Anonymity in attribute-based access control: framework and metric","volume":"21","author":"Zhang","year":"2024","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1109\/TNSE.2023.3296329","article-title":"ACKS-IA: an access control and key agreement scheme for securing Industry 4.0 applications","volume":"11","author":"Mishra","year":"2024","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"102625","DOI":"10.1016\/j.sysarc.2022.102625","article-title":"Semantic attribute-based access control: a review on current status and future perspectives","volume":"129","author":"Arshad","year":"2022","journal-title":"J Syst Archit"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1868","DOI":"10.1109\/TIFS.2022.3173412","article-title":"Attribute-based hierarchical access control with extendable policy","volume":"17","author":"Xiao","year":"2022","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1109\/TETC.2022.3193577","article-title":"Enabling attribute-based access control in NoSQL databases","volume":"11","author":"Gupta","year":"2023","journal-title":"IEEE Trans Emerg Top Comput"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"989","DOI":"10.1007\/s10462-019-09685-9","article-title":"The state of the art and taxonomy of big data analytics: view from new big data framework","volume":"53","author":"Mohamed","year":"2020","journal-title":"Artif Intell Rev"},{"key":"ref8","unstructured":"The Evolution of Data to Life-Critical Don\u2019t Focus on Big Data; Focus on the Data That\u2019s Big; [cited 2024 Oct 10]. Available from: https:\/\/www.import.io\/wp-content\/uploads\/2017\/04\/Seagate-WP-DataAge2025-March-2017.pdf."},{"key":"ref9","doi-asserted-by":"crossref","first-page":"43031","DOI":"10.1109\/ACCESS.2019.2907815","article-title":"Unstructured text resource access control attribute mining technology based on convolutional neural network","volume":"7","author":"Liu","year":"2019","journal-title":"IEEE Access"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1186\/s42400-018-0019-2","article-title":"Automated extraction of attributes from natural language attribute-based access control (ABAC) policies","volume":"2","author":"Alohaly","year":"2019","journal-title":"Cybersecurity"},{"key":"ref11","series-title":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies","first-page":"137","article-title":"A deep learning approach for extracting attributes of ABAC policies","author":"Alohaly","year":"2018 Jun 13\u201315"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"108049","DOI":"10.1016\/j.engappai.2024.108049","article-title":"An entropy-based corpus method for improving keyword extraction: an example of sustainability corpus","volume":"133","author":"Chen","year":"2024","journal-title":"Eng Appl Artif Intell"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1349","DOI":"10.3390\/math12091349","article-title":"A graph-based keyword extraction method for academic literature knowledge graph construction","volume":"12","author":"Zhang","year":"2024","journal-title":"Mathematics"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1186\/s40537-023-00833-1","article-title":"Contextual topic discovery using unsupervised keyphrase extraction and hierarchical semantic graph model","volume":"10","author":"Du","year":"2023","journal-title":"J Big Data"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"2765","DOI":"10.1007\/s12652-020-02439-4","article-title":"An ensemble topic extraction approach based on optimization clusters using hybrid multi-verse optimizer for scientific publications","volume":"12","author":"Abasi","year":"2021","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"101929","DOI":"10.1016\/j.aei.2023.101929","article-title":"Automatic classification of construction safety reports using semi-supervised YAKE-Guided LDA approach","volume":"56","author":"Gadekar","year":"2023","journal-title":"Adv Eng Inform"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"4349","DOI":"10.1007\/s11192-023-04774-7","article-title":"A hybrid strategy to extract metadata from scholarly articles by utilizing support vector machine and heuristics","volume":"128","author":"Waqas","year":"2023","journal-title":"Scientometrics"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"2435","DOI":"10.3390\/app14062435","article-title":"Multistage mixed-attention unsupervised keyword extraction for summary generation","volume":"14","author":"Wu","year":"2024","journal-title":"Appl Sci"},{"key":"ref19","series-title":"Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics","first-page":"808","article-title":"De-bias for generative extraction in unified NER task","author":"Zhang","year":"2022 May 22\u201327"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"121925","DOI":"10.1016\/j.eswa.2023.121925","article-title":"Chinese engineering geological named entity recognition by fusing multi-features and data enhancement using deep learning","volume":"238","author":"Qiu","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref21","series-title":"Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP)","article-title":"Convolutional neural networks for sentence classification","author":"Kim","year":"2014 Oct 25\u201329"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"2505","DOI":"10.1109\/TKDE.2019.2959991","article-title":"Hierarchical taxonomy-aware and attentional graph capsule RCNNs for large-scale multi-label text classification","volume":"33","author":"Peng","year":"2021","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"4324","DOI":"10.1109\/TSMC.2019.2932436","article-title":"A novel fuzzy logic-based text classification method for tracking rare events on twitter","volume":"51","author":"Lu","year":"2021","journal-title":"IEEE Trans Syst Man Cybern: Syst"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1016\/j.neucom.2021.12.064","article-title":"HSAN-capsule: a novel text classification model","volume":"489","author":"Cheng","year":"2022","journal-title":"Neurocomputing"},{"key":"ref25","first-page":"62","article-title":"Deep learning-based text classification: a comprehensive review","volume":"54","author":"Minaee","year":"2021","journal-title":"ACM Comput Surv"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"321","DOI":"10.32604\/iasc.2023.026235","article-title":"Language-independent text tokenization using unsupervised deep learning","volume":"35","author":"Mahmoud","year":"2023","journal-title":"Intell Autom Soft Comput"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"7895","DOI":"10.1007\/s00500-023-08018-x","article-title":"A novel capsule network based on deep routing and residual learning","volume":"27","author":"Zhang","year":"2023","journal-title":"Soft Comput"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.neucom.2022.04.088","article-title":"Memristive residual CapsNet: a hardware friendly multi-level capsule network","volume":"496","author":"He","year":"2022","journal-title":"Neurocomputing"},{"key":"ref29","series-title":"Proceedings of NAACL-HLT","first-page":"2","article-title":"Bert: pre-training of deep bidirectional transformers for language understanding","author":"Kenton","year":"2019 Jun 2\u20137"},{"key":"ref30","first-page":"10","article-title":"Knowledge enhancement for pre-trained language models: a survey","volume":"35","author":"Sun","year":"2021","journal-title":"J Chin Inf Process"},{"key":"ref31","unstructured":"Medical referral text resource dataset [Online] [cited 2025 Jan 01]. Available from: https:\/\/pan.baidu.com\/s\/1UDqILTUCAGacMPZ3h-VyuA?pwd=z12b."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-1\/TSP_CMC_59784\/TSP_CMC_59784.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T06:34:52Z","timestamp":1763102092000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n1\/60077"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":31,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.059784","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2024-10-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-01-14","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-26","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}