网络与信息安全学报 ›› 2017, Vol. 3 ›› Issue (6): 33-41.doi: 10.11959/j.issn.2096-109x.2017.00171
李英俊,张宏莉,王星
修回日期:
2017-05-10
出版日期:
2017-06-01
发布日期:
2017-06-21
作者简介:
李英俊(1991-),男,黑龙江大庆人,哈尔滨工业大学硕士生,主要研究方向为网络舆情、网络安全。|张宏莉(1973-),女,吉林榆树人,博士,哈尔滨工业大学教授、博士生导师,主要研究方向为网络与信息安全、网络测量与建模、网络计算、并行处理等。|王星(1981-),男,黑龙江哈尔滨人,博士,哈尔滨工业大学助理研究员,主要研究方向为信息安全、网络舆情、知识迁移等。
基金资助:
Ying-jun LI,Hong-li ZHANG,Xing WANG
Revised:
2017-05-10
Online:
2017-06-01
Published:
2017-06-21
Supported by:
摘要:
针对新闻文本,将事件片段定义为最小划分单元,提出了一个两阶段的事件片段时序关系识别算法,第一阶段时序映射和第二阶段时序识别。使用真实网上新闻数据进行实验,结果表明,所提方法相比普通的分类器及强规则算法,准确率提高了4%。
中图分类号:
李英俊,张宏莉,王星. 基于新闻事件片段的时序关系识别方法[J]. 网络与信息安全学报, 2017, 3(6): 33-41.
Ying-jun LI,Hong-li ZHANG,Xing WANG. Temporal relation recognition method based on news event fragments[J]. Chinese Journal of Network and Information Security, 2017, 3(6): 33-41.
[6] | WEBBER B L . Tense as discourse anaphor[J]. Computational Linguistics, 1988,14(2): 61-73. |
[7] | LASCARIDES A , ASHER N . Temporal interpretation,discourse relations and commonsense entailment[J]. Linguistics and Philosophy, 1993,16(5): 437-93. |
[8] | HITZEMAN J , MOENS M , GROVER C ,et al. Algorithms for analysing the temporal structure of discourse[C]// The Seventh Conference on European Chapter of the Association for Computational Linguistics. 1995. |
[9] | KEHLER A , . Resolving temporal relations using tense meaning and discourse interpretation[C]// Formalizing the Dynamics of Information. 2000. |
[10] | CHKLOVSKI T , PANTEL P . Global path-based refinement of noisy graphs applied to verb semantics[C]// The International Conference on Natural Language Processing. 2005: 792-803. |
[11] | SAURí R , LITTMAN J , GAIZAUSKAS R ,et al. TimeML annotation guidelines,version 1.2.1[C]// Event London. 2006. |
[12] | PUSTEJOVSKY J , HANKS P , SAURI R ,et al. The timebank corpus[C]// Conference on Corpus linguistics. 2003. |
[13] | MANI I , VERHAGEN M , WELLNER B ,et al. Machine learning of temporal relations[C]// The 21st International Conference on Computational Linguistics and the 44th Annual Meeting of the Association for Computational Linguistics. 2006: 753-760. |
[14] | CHAMBERS N , WANG S , JURAFSKY D . Classifying temporal relations between events[C]// The 45th Annual Meeting of the ACL on Interactive Poster and Demonstration Sessions. 2007: 173-176. |
[15] | BETHARD S , MARTIN J H . CU-TMP:Temporal relation classification using syntactic and semantic features[C]// The 4th International Workshop on Semantic Evaluations. 2007: 129-132. |
[16] | D'SOUZA J , NG V . Classifying temporal relations with rich linguistic knowledge[C]// HLT-NAACL. 2013. |
[17] | MIRZA P , TONELLI S . Classifying temporal relations with simple features[C]// EACL. 2014. |
[18] | LI W , WONG K F , CAO G ,et al. Applying machine learning to Chinese temporal relation resolution[C]// The 42nd Annual Meeting on Association For Computational Linguistics. 2004: 582-588. |
[19] | CHENG Y , ASAHARA M , MATSUMOTO Y . Constructing a temporal relation tagged corpus of Chinese based on dependency structure analysis[C]// The 14th International Symposium on Temporal Representation and Reasoning. 2007: 59-69. |
[20] | 王风娥, 谭红叶, 钱揖丽 . 基于最大熵的句内时间关系识别[J]. 计算机工程, 2012,38(04): 37-9. |
WANG F E , TAN H Y , QIAN Y L . Recognition of temporal relation in one sentence based on maximum entropy[J]. Computer Engineering, 2012,38(4): 37-9. | |
[21] | CHAMBERS N , JURAFSKY D . Jointly combining implicit constraints improves temporal ordering[C]// The Conference on Empirical Methods in Natural Language Processing. 2008: 698-706. |
[22] | DENIS P , MULLER P . Predicting globally-coherent temporal structures from texts via endpoint inference and graph decomposition[C]// IJCAI-11-International Joint Conference on Artificial Intelligence. 2011: 1788-1793. |
[23] | DO Q X , LU W , ROTH D . Joint inference for event timeline construction[C]// The Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning. 2012: 677-687. |
[24] | NG J P , KAN M Y , LIN Z ,et al. Exploiting discourse analysis for article-wide temporal classification[J]. Annt Journal, 2013,11(2): 9-26. |
[1] | 郑新, 李培峰, 朱巧明 ,等. 中文事件时序关系的标注和分类方法[J]. 计算机科学, 2015,42(7): 276-279. |
ZHENG X , LI P F , ZHU Q M ,et al. Annotation and classification of temporal relation between chinese events[J]. Computer Science, 2015,42(7): 276-279. | |
[25] | YOSHIKAWA K , RIEDEL S , ASAHARA M . Jointly identifying temporal relations with markov logic[C]// The Joint Conference of the 47th Annual Meeting of the ACL and the 4th International Joint Conference on Natural Language . 2009: 9-16. |
[26] | YOSHIKAWA K , ASAHARA M , IIDA R ,et al. Identifying temporal relations by sentence and document optimizations joint inference for event timeline construction[C]// Association for Computational Linguistics. 2012: 677-687. |
[2] | 庞黎多 . 基于时间片段的时间关系识别系统的设计与实现[D]. 太原:山西大学, 2014. |
PANG L D . System of temporal relation based on temporal segmentation[D]. Taiyuan:Shanxi University, 2014. | |
[3] | ALLEN J F . Maintaining knowledge about temporal intervals[J]. Communications of the ACM, 1983,26(11): 832-843. |
[4] | ALLEN J F . Towards a general theory of action and time[J]. Artificial Intelligence, 1984,23(2): 123-154. |
[5] | PASSONNEAU R J . A computational model of the semantics of tense and aspect[J]. Computational Linguistics, 1988,14(2): 44-60. |
[27] | CHANG Y , TANG J , YIN D ,et al. Timeline Summarization from social media with life cycle models[C]// The Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI-16). 2016. |
[1] | 任奎, 孟泉润, 闫守琨, 秦湛. 人工智能模型数据泄露的攻击与防御研究综述[J]. 网络与信息安全学报, 2021, 7(1): 1-10. |
[2] | 张青青, 汤红波, 游伟, 李英乐. 基于免疫算法的网络功能异构冗余部署方法[J]. 网络与信息安全学报, 2021, 7(1): 46-56. |
[3] | 张涛, 伍前红, 唐宗勋. 基于比特币区块链的隐蔽信息传输研究[J]. 网络与信息安全学报, 2021, 7(1): 84-92. |
[4] | 王滨, 陈靓, 钱亚冠, 郭艳凯, 邵琦琦, 王佳敏. 面向对抗样本攻击的移动目标防御[J]. 网络与信息安全学报, 2021, 7(1): 113-120. |
[5] | 苗春雨, 范渊, 李晖, 葛凯强, 张小孟. 基于移动Sink的WSN安全数据收集方法[J]. 网络与信息安全学报, 2021, 7(1): 121-129. |
[6] | 陈璐, 汤红波, 游伟, 柏溢. 移动边缘计算安全防御研究[J]. 网络与信息安全学报, 2021, 7(1): 130-142. |
[7] | 孙澄, 胡浩, 杨英杰, 张红旗. 融合宏观与微观的双层威胁分析模型[J]. 网络与信息安全学报, 2021, 7(1): 143-156. |
[8] | 张颖君,刘尚奇,杨牧,张海霞,黄克振. 基于日志的异常检测技术综述[J]. 网络与信息安全学报, 2020, 6(6): 1-12. |
[9] | 熊小兵,舒辉,康绯. 基于融合编译的软件多样化保护方法[J]. 网络与信息安全学报, 2020, 6(6): 13-24. |
[10] | 张鑫,羌卫中,吴月明,邹德清,金海. 基于卷积神经网络恶意安卓应用行为模式挖掘[J]. 网络与信息安全学报, 2020, 6(6): 35-44. |
[11] | 周天昱,申文博,杨男子,李金库,秦承刚,喻望. Docker组件间标准输入输出复制的DoS攻击分析[J]. 网络与信息安全学报, 2020, 6(6): 45-56. |
[12] | 尚菁菁,朱宇佳,刘庆云. 电子邮件安全扩展协议应用分析[J]. 网络与信息安全学报, 2020, 6(6): 69-79. |
[13] | 王标,刘兴洋,许卡,刘汪洋,王克楠,夏宇清. 政府开放数据的国家安全风险评估模型研究[J]. 网络与信息安全学报, 2020, 6(6): 80-87. |
[14] | 熊钢,葛雨玮,褚衍杰,曹卫权. 基于跨域协同的网络空间威胁预警模式[J]. 网络与信息安全学报, 2020, 6(6): 88-96. |
[15] | 吴奇,陈鸿昶. 低故障恢复开销的软件定义网络控制器布局算法[J]. 网络与信息安全学报, 2020, 6(6): 97-104. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|