1. Liu, W., Wang, J., Li, R., You, J., Chen, J.: Design and implementation of key information extraction system in court verdict. J Hubei Univ. Technol. 33(01), 63–67 (2018). (Chinese)
2. Xia, Y., Wang, Z., Wang, S.-H., Cheng, L.: Association rules analysis in criminal case database. Comput. Knowl. Technol. 35(5) (2009)
3. Pei, X.: Application of data mining technology in the criminal cases information analysis. Xidian university.
4. Chen, C.-M., Huang, Y., Wang, E.K., Wu, T.-Y.: Improvement of a mutual authentication protocol with anonymity for roaming service in wireless communications. Data Sci. Pattern Recogn. 2(1), 15–24 (2018)
5. Chen, C.-M., Wang, K.-H., Wu, T.-Y., Wang, E.K.: On the security of a three-party authenticated key agreement protocol based on chaotic maps. Data Sci. Pattern Recogn. 1(2), 1–10, (2017)