{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,15]],"date-time":"2026-02-15T09:15:46Z","timestamp":1771146946766,"version":"3.50.1"},"reference-count":48,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.060318","type":"journal-article","created":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:56:20Z","timestamp":1742964980000},"page":"2555-2572","source":"Crossref","is-referenced-by-count":2,"title":["TIPS: Tailored Information Extraction in Public Security Using Domain-Enhanced Large Language Model"],"prefix":"10.32604","volume":"83","author":[{"given":"Yue","family":"Liu","sequence":"first","affiliation":[]},{"given":"Qinglang","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Chunyao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Liao","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1145\/234173.234209","article-title":"Information extraction","volume":"39","author":"Cowie","year":"1996 Jan","journal-title":"Commun ACM"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40537-019-0254-8","article-title":"An analytical study of information extraction from unstructured and multidimensional big data","volume":"6","author":"Adnan","year":"2019 Oct","journal-title":"J Big Data"},{"key":"ref3","first-page":"515","author":"Benkassioui","year":"2023","journal-title":"International Conference on Advanced Intelligent Systems for Sustainable Development"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"9691","DOI":"10.3390\/app12199691","article-title":"A survey of information extraction based on deep learning","volume":"12","author":"Yang","year":"2022","journal-title":"Appl Sci"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"6301","DOI":"10.1109\/TNNLS.2022.3213168","article-title":"A survey on deep learning event extraction: approaches and applications","volume":"35","author":"Li","year":"2024","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"ref6","doi-asserted-by":"crossref","unstructured":"Deng S, Ma Y, Zhang N, Cao Y, Hooi B. Information extraction in low-resource scenarios: survey and perspective. arXiv:2202.08063. 2023.","DOI":"10.1109\/ICKG63256.2024.00013"},{"key":"ref7","article-title":"Attention is all you need","volume":"30","author":"Vaswani","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref8","doi-asserted-by":"crossref","unstructured":"Hedderich MA, Lange L, Adel H, Str\u00f6tgen J, Klakow D. A survey on recent approaches for natural language processing in low-resource scenarios. arXiv:2010.12309. 2020.","DOI":"10.18653\/v1\/2021.naacl-main.201"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MC.2004.1297301","article-title":"Crime data mining: a general framework and some examples","volume":"37","author":"Chen","year":"2004","journal-title":"Computer"},{"key":"ref10","first-page":"15635","author":"Yang","year":"2023","journal-title":"Findings of the Association for Computational Linguistics: EMNLP 2023"},{"key":"ref11","first-page":"10372","author":"Amalvy","year":"2023","journal-title":"Proceedings of the 2023 Conference on Hods In Natural Language Processing"},{"key":"ref12","first-page":"8186","author":"Xu","journal-title":"Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers)"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"13249","DOI":"10.18653\/v1\/2023.acl-long.739","author":"Zhou","year":"2023","journal-title":"Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers)"},{"key":"ref14","first-page":"4537","author":"Gao","year":"2022","journal-title":"Findings of the Association for Computational Linguistics: EMNLP 2022"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1666","DOI":"10.18653\/v1\/2023.acl-short.143","author":"Lu","year":"2023","journal-title":"Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers)"},{"key":"ref16","first-page":"4904","author":"Ye","journal-title":"Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers)"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"14541","DOI":"10.18653\/v1\/2023.acl-long.813","author":"Zheng","year":"2023","journal-title":"Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers)"},{"key":"ref18","unstructured":"Hu EJ, Shen Y, Wallis P, Allen-Zhu Z, Li Y, Wang S, et al. LoRA: low-rank adaptation of large language models. arXiv:2106.09685. 2021."},{"key":"ref19","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/j.ins.2016.09.005","article-title":"Intelligent cryptography approach for secure distributed big data storage in cloud computing","volume":"387","author":"Li","year":"2017","journal-title":"Inf Sci"},{"key":"ref20","first-page":"135","article-title":"Research on Chinese event detection method based on BERT-CRF model","volume":"57","author":"Tian","year":"2021","journal-title":"Comput Eng Appl"},{"key":"ref21","series-title":"Proceedings of the 2008 International Conference on Digital Government Research","first-page":"162","article-title":"Natural language processing and e-government: crime information extraction from heterogeneous data sources","author":"Ku","year":"2008"},{"key":"ref22","series-title":"Proceedings of the 2002 Annual National Conference on Digital Government Research","first-page":"1","article-title":"Extracting meaningful entities from police narrative reports","author":"Chau","year":"2002"},{"key":"ref23","series-title":"2008 IEEE Conference on Technologies for Homeland Security","first-page":"193","article-title":"Crime information extraction from police and witness narrative reports","author":"Ku","year":"2008"},{"key":"ref24","first-page":"93","article-title":"An event extraction method for public security","volume":"36","author":"Deng","year":"2022","journal-title":"J Chin Inf Process"},{"key":"ref25","unstructured":"Devlin J, Chang MW, Lee K, Toutanova K. Pre-training of deep bidirectional transformers for language understanding. arXiv:1810.04805. 2018."},{"key":"ref26","series-title":"2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS)","first-page":"1597","article-title":"Gate-variants of gated recurrent unit (GRU) neural networks","author":"Dey","year":"2017"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1146\/annurev.pharmtox.44.101802.121410","article-title":"CRF and CRF receptors: role in stress responsivity and other behaviors","volume":"44","author":"Bale","year":"2004","journal-title":"Annu Rev Pharmacol Toxicol"},{"key":"ref28","series-title":"2018 25th IEEE International Conference on Image Processing (ICIP)","first-page":"390","article-title":"DMCNN: dual-domain multi-scale convolutional neural network for compression artifacts removal","author":"Zhang","year":"2018"},{"key":"ref29","first-page":"127","article-title":"Automatic key information extraction of police records based on deep learning","volume":"8","author":"Cui","year":"2022","journal-title":"Big Data Res"},{"key":"ref30","first-page":"75","article-title":"Combination of pre-trained language model and label dependency for relation extraction","volume":"36","author":"Zhao","year":"2022","journal-title":"J Chin Inf Process"},{"key":"ref31","first-page":"1","article-title":"Harnessing the power of llms in practice: a survey on chatgpt and beyond","volume":"18","author":"Yang","year":"2024","journal-title":"ACM Trans Knowl Discov Data"},{"key":"ref32","unstructured":"Zhao WX, Zhou K, Li J, Tang T, Wang X, Hou Y, et al. A survey of large language models. arXiv:2303.18223. 2023."},{"key":"ref33","series-title":"Proceedings of the 18th Workshop on Innovative Use of NLP for Building Educational Applications (BEA 2023)","first-page":"610","article-title":"Evaluating reading comprehension exercises generated by LLMs: a showcase of ChatGPT in education applications","author":"Xiao","year":"2023"},{"key":"ref34","article-title":"Optimizing natural language processing, large language models (LLMs) for efficient customer service, and hyper-personalization to enable sustainable growth and revenue","volume":"4","author":"Kolasani","year":"2023","journal-title":"Trans Latest Trends Artif Intell"},{"key":"ref35","unstructured":"Zhu Y, Yuan H, Wang S, Liu J, Liu W, Deng C, et al. Large language models for information retrieval: a survey. arXiv:2308.07107. 2023."},{"key":"ref36","unstructured":"Lialin V, Deshpande V, Rumshisky A. Scaling down to scale up: a guide to parameter-efficient fine-tuning. arXiv:2303.15647. 2023."},{"key":"ref37","unstructured":"Zaken EB, Ravfogel S, Goldberg Y. Bitfit: simple parameter-efficient fine-tuning for transformer-based masked language-models. arXiv:2106.10199. 2021."},{"key":"ref38","doi-asserted-by":"crossref","unstructured":"Lester B, Al-Rfou R, Constant N. The power of scale for parameter-efficient prompt tuning. arXiv:2104.08691. 2021.","DOI":"10.18653\/v1\/2021.emnlp-main.243"},{"key":"ref39","doi-asserted-by":"crossref","unstructured":"Su Y, Wang X, Qin Y, Chan CM, Lin Y, Wang H, et al. On transferability of prompt tuning for natural language processing. arXiv:2111.06719. 2021.","DOI":"10.18653\/v1\/2022.naacl-main.290"},{"key":"ref40","unstructured":"Yang A, Yang B, Hui B, Zheng B, Yu B, Zhou C, et al. Qwen2 technical report. arXiv:2407.10671. 2024."},{"key":"ref41","unstructured":"T. GLM, Zeng A, Xu B, Wang B, Zhang C, Yin D, et al. ChatGLM: a family of large language models from GLM-130B to GLM-4 all tools. arXiv:2406.12793. 2024."},{"key":"ref42","unstructured":"AI@Meta. Llama 3 model card. 2024 [cited 2024 Jul 11]. Available from: https:\/\/github.com\/meta-llama\/llama3\/blob\/main\/MODEL_CARD.md."},{"key":"ref43","unstructured":"Jiang AQ, Sablayrolles A, Mensch A, Bamford C, Chaplot DS, Casas DDL, et al. Mistral 7B. arXiv:2310.06825. 2023."},{"key":"ref44","series-title":"Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics","first-page":"311","article-title":"Bleu: a method for automatic evaluation of machine translation","author":"Papineni","year":"2002"},{"key":"ref45","first-page":"74","author":"Lin","year":"2004","journal-title":"Text summarization branches out"},{"key":"ref46","unstructured":"Powers DM. Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation. arXiv:2010.16061. 2020."},{"key":"ref47","series-title":"Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 3: System Demonstrations)","article-title":"LlamaFactory: unified efficient fine-tuning of 100+ language models","author":"Zheng","year":"2024"},{"key":"ref48","unstructured":"Loshchilov I, Hutter F. Decoupled weight decay regularization. arXiv:1711.05101. 2017."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-2\/TSP_CMC_60318\/TSP_CMC_60318.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:04:25Z","timestamp":1763341465000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n2\/60528"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":48,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.060318","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}