{"id":"https://openalex.org/W3112347780","doi":"https://doi.org/10.1109/access.2020.3042672","title":"A Neural Relation Extraction Model for Distant Supervision in Counter-Terrorism Scenario","display_name":"A Neural Relation Extraction Model for Distant Supervision in Counter-Terrorism Scenario","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3112347780","doi":"https://doi.org/10.1109/access.2020.3042672","mag":"3112347780"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.3042672","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3042672","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09281299.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09281299.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035206957","display_name":"Jiaqi Hou","orcid":"https://orcid.org/0000-0002-7363-7753"},"institutions":[{"id":"https://openalex.org/I37448385","display_name":"China People's Public Security University","ror":"https://ror.org/05twya590","country_code":"CN","type":"education","lineage":["https://openalex.org/I37448385"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiaqi Hou","raw_affiliation_strings":["School of Information Technology and Cyber Security, People\u2019s Public Security University of China, Beijing, China","School of Information Technology and Cyber Security, People's Public Security University of China, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Information Technology and Cyber Security, People\u2019s Public Security University of China, Beijing, China","institution_ids":["https://openalex.org/I37448385"]},{"raw_affiliation_string":"School of Information Technology and Cyber Security, People's Public Security University of China, Beijing, China","institution_ids":["https://openalex.org/I37448385"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100726212","display_name":"Xin Li","orcid":"https://orcid.org/0000-0002-4976-9406"},"institutions":[{"id":"https://openalex.org/I37448385","display_name":"China People's Public Security University","ror":"https://ror.org/05twya590","country_code":"CN","type":"education","lineage":["https://openalex.org/I37448385"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Li","raw_affiliation_strings":["School of Information Technology and Cyber Security, People\u2019s Public Security University of China, Beijing, China","School of Information Technology and Cyber Security, People's Public Security University of China, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-1637-4747","affiliations":[{"raw_affiliation_string":"School of Information Technology and Cyber Security, People\u2019s Public Security University of China, Beijing, China","institution_ids":["https://openalex.org/I37448385"]},{"raw_affiliation_string":"School of Information Technology and Cyber Security, People's Public Security University of China, Beijing, China","institution_ids":["https://openalex.org/I37448385"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008588842","display_name":"Rongchen Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I37448385","display_name":"China People's Public Security University","ror":"https://ror.org/05twya590","country_code":"CN","type":"education","lineage":["https://openalex.org/I37448385"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rongchen Zhu","raw_affiliation_strings":["School of Information Technology and Cyber Security, People\u2019s Public Security University of China, Beijing, China","School of Information Technology and Cyber Security, People's Public Security University of China, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-8379-5579","affiliations":[{"raw_affiliation_string":"School of Information Technology and Cyber Security, People\u2019s Public Security University of China, Beijing, China","institution_ids":["https://openalex.org/I37448385"]},{"raw_affiliation_string":"School of Information Technology and Cyber Security, People's Public Security University of China, Beijing, China","institution_ids":["https://openalex.org/I37448385"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102284433","display_name":"Chongqiang Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126577","display_name":"Shanghai Public Security Bureau","ror":"https://ror.org/03cfv5b91","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210126577"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chongqiang Zhu","raw_affiliation_strings":["Technical Investigation Detachment, Lianyungang Public Security Bureau, Lianyungang, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Technical Investigation Detachment, Lianyungang Public Security Bureau, Lianyungang, China","institution_ids":["https://openalex.org/I4210126577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077467565","display_name":"Zeyu Wei","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126577","display_name":"Shanghai Public Security Bureau","ror":"https://ror.org/03cfv5b91","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210126577"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zeyu Wei","raw_affiliation_strings":["Patrol Special Police Brigade of Keqiao, Shaoxing Public Security Bureau, Shaoxing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Patrol Special Police Brigade of Keqiao, Shaoxing Public Security Bureau, Shaoxing, China","institution_ids":["https://openalex.org/I4210126577"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100460272","display_name":"Chao Zhang","orcid":"https://orcid.org/0000-0003-3009-598X"},"institutions":[{"id":"https://openalex.org/I4210126577","display_name":"Shanghai Public Security Bureau","ror":"https://ror.org/03cfv5b91","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210126577"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Zhang","raw_affiliation_strings":["Network Security Detachment, Lianyungang Public Security Bureau, Lianyungang, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Network Security Detachment, Lianyungang Public Security Bureau, Lianyungang, China","institution_ids":["https://openalex.org/I4210126577"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5035206957"],"corresponding_institution_ids":["https://openalex.org/I37448385"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.544,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.74841332,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"8","issue":null,"first_page":"225088","last_page":"225096"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13083","display_name":"Advanced Text Analysis Techniques","score":0.9800000190734863,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9794999957084656,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8127618432044983},{"id":"https://openalex.org/keywords/relationship-extraction","display_name":"Relationship extraction","score":0.7695035934448242},{"id":"https://openalex.org/keywords/terrorism","display_name":"Terrorism","score":0.6716355085372925},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5969951748847961},{"id":"https://openalex.org/keywords/annotation","display_name":"Annotation","score":0.5213602781295776},{"id":"https://openalex.org/keywords/relation","display_name":"Relation (database)","score":0.503621518611908},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.49625760316848755},{"id":"https://openalex.org/keywords/sentence","display_name":"Sentence","score":0.4710302948951721},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.4709549844264984},{"id":"https://openalex.org/keywords/transformer","display_name":"Transformer","score":0.4373724162578583},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.411738783121109},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3931904435157776}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8127618432044983},{"id":"https://openalex.org/C153604712","wikidata":"https://www.wikidata.org/wiki/Q7310755","display_name":"Relationship extraction","level":3,"score":0.7695035934448242},{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.6716355085372925},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5969951748847961},{"id":"https://openalex.org/C2776321320","wikidata":"https://www.wikidata.org/wiki/Q857525","display_name":"Annotation","level":2,"score":0.5213602781295776},{"id":"https://openalex.org/C25343380","wikidata":"https://www.wikidata.org/wiki/Q277521","display_name":"Relation (database)","level":2,"score":0.503621518611908},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.49625760316848755},{"id":"https://openalex.org/C2777530160","wikidata":"https://www.wikidata.org/wiki/Q41796","display_name":"Sentence","level":2,"score":0.4710302948951721},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.4709549844264984},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.4373724162578583},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.411738783121109},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3931904435157776},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C165801399","wikidata":"https://www.wikidata.org/wiki/Q25428","display_name":"Voltage","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2020.3042672","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3042672","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09281299.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:3cae3f32e6444f1391520f5660f1b795","is_oa":true,"landing_page_url":"https://doaj.org/article/3cae3f32e6444f1391520f5660f1b795","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 8, Pp 225088-225096 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2020.3042672","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3042672","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09281299.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6299999952316284,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1395209947","display_name":null,"funder_award_id":"2017YFC0803700","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8538916059","display_name":null,"funder_award_id":"41971367","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320330924","display_name":"People's Public Security University of China","ror":"https://ror.org/05twya590"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3112347780.pdf","grobid_xml":"https://content.openalex.org/works/W3112347780.grobid-xml"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W174427690","https://openalex.org/W1604644367","https://openalex.org/W2103901176","https://openalex.org/W2107598941","https://openalex.org/W2132679783","https://openalex.org/W2251135946","https://openalex.org/W2515462165","https://openalex.org/W2577666659","https://openalex.org/W2739722817","https://openalex.org/W2759996146","https://openalex.org/W2782266062","https://openalex.org/W2786559064","https://openalex.org/W2788031953","https://openalex.org/W2796607664","https://openalex.org/W2890952074","https://openalex.org/W2891101087","https://openalex.org/W2897058782","https://openalex.org/W2962924839","https://openalex.org/W2962939608","https://openalex.org/W2967147920","https://openalex.org/W2970288995","https://openalex.org/W2989776257","https://openalex.org/W3024221594","https://openalex.org/W3035927493","https://openalex.org/W3036153925","https://openalex.org/W3036960711","https://openalex.org/W3042805419","https://openalex.org/W3104189825","https://openalex.org/W4247009661","https://openalex.org/W6607091552","https://openalex.org/W6636320352","https://openalex.org/W6679781796","https://openalex.org/W6748277835","https://openalex.org/W6750156878","https://openalex.org/W6754392867"],"related_works":["https://openalex.org/W2361861616","https://openalex.org/W2263699433","https://openalex.org/W2377979023","https://openalex.org/W569815712","https://openalex.org/W2218034408","https://openalex.org/W2392921965","https://openalex.org/W4235672678","https://openalex.org/W2805262146","https://openalex.org/W4281476908","https://openalex.org/W4379517534"],"abstract_inverted_index":{"Natural":[0],"language":[1],"processing":[2],"(NLP)":[3],"is":[4,24,114],"the":[5,20,25,28,35,38,69,74,78,85,95,103,120,133],"best":[6],"solution":[7],"to":[8,32,132],"extensive,":[9],"unstructured,":[10],"complex,":[11],"and":[12,27,57,64,94,117,149],"diverse":[13],"network":[14],"big":[15],"data":[16,82],"for":[17,49,61],"counter-terrorism.":[18],"Through":[19],"text":[21],"analysis,":[22],"it":[23,139],"basis":[26],"most":[29],"critical":[30],"step":[31],"quickly":[33],"extract":[34],"relationship":[36],"between":[37],"relevant":[39],"entities":[40],"pairs":[41],"in":[42,141],"terrorism.":[43],"Relation":[44],"extraction":[45,72,105],"lays":[46],"a":[47,51],"foundation":[48],"constructing":[50],"knowledge":[52,137],"graph":[53],"(KG)":[54],"of":[55,80,135],"terrorism":[56],"provides":[58],"technical":[59],"support":[60],"intelligence":[62],"analysis":[63],"prediction.":[65],"This":[66],"paper":[67],"takes":[68],"distant-supervised":[70],"relation":[71,104],"as":[73],"starting":[75],"point,":[76],"breaks":[77],"limitation":[79],"artificial":[81],"annotation.":[83],"Combining":[84],"Bidirectional":[86],"Encoder":[87],"Representation":[88],"from":[89],"Transformers":[90],"(BERT)":[91],"pre-training":[92],"model":[93,106,113,124,130],"sentence-level":[96],"attention":[97],"over":[98,125],"multiple":[99],"instances,":[100],"we":[101],"proposed":[102],"named":[107],"BERT-att.":[108],"Experiments":[109],"show":[110],"that":[111],"our":[112],"more":[115],"efficient":[116],"better":[118],"than":[119],"current":[121],"leading":[122],"baseline":[123],"each":[126],"evaluative":[127],"metrics.":[128],"Our":[129],"applied":[131],"construction":[134],"anti-terrorism":[136],"map,":[138],"used":[140],"regional":[142],"security":[143],"risk":[144],"assessment,":[145],"terrorist":[146],"event":[147],"prediction":[148],"other":[150],"scenarios.":[151]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
