Chinese Journal of Network and Information Security ›› 2017, Vol. 3 ›› Issue (6): 33-41.doi: 10.11959/j.issn.2096-109x.2017.00171
• Papers • Previous Articles Next Articles
Ying-jun LI,Hong-li ZHANG,Xing WANG
Revised:
2017-05-10
Online:
2017-06-01
Published:
2017-06-21
Supported by:
CLC Number:
Ying-jun LI,Hong-li ZHANG,Xing WANG. Temporal relation recognition method based on news event fragments[J]. Chinese Journal of Network and Information Security, 2017, 3(6): 33-41.
[6] | WEBBER B L . Tense as discourse anaphor[J]. Computational Linguistics, 1988,14(2): 61-73. |
[7] | LASCARIDES A , ASHER N . Temporal interpretation,discourse relations and commonsense entailment[J]. Linguistics and Philosophy, 1993,16(5): 437-93. |
[8] | HITZEMAN J , MOENS M , GROVER C ,et al. Algorithms for analysing the temporal structure of discourse[C]// The Seventh Conference on European Chapter of the Association for Computational Linguistics. 1995. |
[9] | KEHLER A , . Resolving temporal relations using tense meaning and discourse interpretation[C]// Formalizing the Dynamics of Information. 2000. |
[10] | CHKLOVSKI T , PANTEL P . Global path-based refinement of noisy graphs applied to verb semantics[C]// The International Conference on Natural Language Processing. 2005: 792-803. |
[11] | SAURí R , LITTMAN J , GAIZAUSKAS R ,et al. TimeML annotation guidelines,version 1.2.1[C]// Event London. 2006. |
[12] | PUSTEJOVSKY J , HANKS P , SAURI R ,et al. The timebank corpus[C]// Conference on Corpus linguistics. 2003. |
[13] | MANI I , VERHAGEN M , WELLNER B ,et al. Machine learning of temporal relations[C]// The 21st International Conference on Computational Linguistics and the 44th Annual Meeting of the Association for Computational Linguistics. 2006: 753-760. |
[14] | CHAMBERS N , WANG S , JURAFSKY D . Classifying temporal relations between events[C]// The 45th Annual Meeting of the ACL on Interactive Poster and Demonstration Sessions. 2007: 173-176. |
[15] | BETHARD S , MARTIN J H . CU-TMP:Temporal relation classification using syntactic and semantic features[C]// The 4th International Workshop on Semantic Evaluations. 2007: 129-132. |
[16] | D'SOUZA J , NG V . Classifying temporal relations with rich linguistic knowledge[C]// HLT-NAACL. 2013. |
[17] | MIRZA P , TONELLI S . Classifying temporal relations with simple features[C]// EACL. 2014. |
[18] | LI W , WONG K F , CAO G ,et al. Applying machine learning to Chinese temporal relation resolution[C]// The 42nd Annual Meeting on Association For Computational Linguistics. 2004: 582-588. |
[19] | CHENG Y , ASAHARA M , MATSUMOTO Y . Constructing a temporal relation tagged corpus of Chinese based on dependency structure analysis[C]// The 14th International Symposium on Temporal Representation and Reasoning. 2007: 59-69. |
[20] | 王风娥, 谭红叶, 钱揖丽 . 基于最大熵的句内时间关系识别[J]. 计算机工程, 2012,38(04): 37-9. |
WANG F E , TAN H Y , QIAN Y L . Recognition of temporal relation in one sentence based on maximum entropy[J]. Computer Engineering, 2012,38(4): 37-9. | |
[21] | CHAMBERS N , JURAFSKY D . Jointly combining implicit constraints improves temporal ordering[C]// The Conference on Empirical Methods in Natural Language Processing. 2008: 698-706. |
[22] | DENIS P , MULLER P . Predicting globally-coherent temporal structures from texts via endpoint inference and graph decomposition[C]// IJCAI-11-International Joint Conference on Artificial Intelligence. 2011: 1788-1793. |
[23] | DO Q X , LU W , ROTH D . Joint inference for event timeline construction[C]// The Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning. 2012: 677-687. |
[24] | NG J P , KAN M Y , LIN Z ,et al. Exploiting discourse analysis for article-wide temporal classification[J]. Annt Journal, 2013,11(2): 9-26. |
[1] | 郑新, 李培峰, 朱巧明 ,等. 中文事件时序关系的标注和分类方法[J]. 计算机科学, 2015,42(7): 276-279. |
ZHENG X , LI P F , ZHU Q M ,et al. Annotation and classification of temporal relation between chinese events[J]. Computer Science, 2015,42(7): 276-279. | |
[25] | YOSHIKAWA K , RIEDEL S , ASAHARA M . Jointly identifying temporal relations with markov logic[C]// The Joint Conference of the 47th Annual Meeting of the ACL and the 4th International Joint Conference on Natural Language . 2009: 9-16. |
[26] | YOSHIKAWA K , ASAHARA M , IIDA R ,et al. Identifying temporal relations by sentence and document optimizations joint inference for event timeline construction[C]// Association for Computational Linguistics. 2012: 677-687. |
[2] | 庞黎多 . 基于时间片段的时间关系识别系统的设计与实现[D]. 太原:山西大学, 2014. |
PANG L D . System of temporal relation based on temporal segmentation[D]. Taiyuan:Shanxi University, 2014. | |
[3] | ALLEN J F . Maintaining knowledge about temporal intervals[J]. Communications of the ACM, 1983,26(11): 832-843. |
[4] | ALLEN J F . Towards a general theory of action and time[J]. Artificial Intelligence, 1984,23(2): 123-154. |
[5] | PASSONNEAU R J . A computational model of the semantics of tense and aspect[J]. Computational Linguistics, 1988,14(2): 44-60. |
[27] | CHANG Y , TANG J , YIN D ,et al. Timeline Summarization from social media with life cycle models[C]// The Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI-16). 2016. |
[1] | Xianyi CHEN, Jun GU, Kai YAN, Dong JIANG, Linfeng XU, Zhangjie FU. Double adversarial attack against license plate recognition system [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 16-27. |
[2] | Tianpeng YE, Xiang LIN, Jianhua LI, Xuankai ZHANG, Liwen XU. Personalized lightweight distributed network intrusion detection system in fog computing [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 28-37. |
[3] | Lijun ZU, Yalin CAO, Xiaohua MEN, Zhihui LYU, Jiawei YE, Hongyi LI, Liang ZHANG. Adaptive selection method of desensitization algorithm based on privacy risk assessment [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 49-59. |
[4] | Ruiqi XIA, Manman LI, Shaozhen CHEN. Identification on the structures of block ciphers using machine learning [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 79-89. |
[5] | Jingyi YUAN, Zichuan LI, Guojun PENG. EN-Bypass: a security assessment method on e-mail user interface notification [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 90-101. |
[6] | Feng YU, Qingxin LIN, Hui LIN, Xiaoding WANG. Privacy-enhanced federated learning scheme based on generative adversarial networks [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 113-122. |
[7] | Chuntao ZHU, Chengxi YIN, Bolin ZHANG, Qilin YIN, Wei LU. Forgery face detection method based on multi-domain temporal features mining [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 123-134. |
[8] | Xiaomeng LI, Daidou GUO, Xunfang ZHUO, Heng YAO, Chuan QIN. Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 135-149. |
[9] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[10] | Yan PAN, Wei LIN, Yuefei ZHU. Progressive active inference method of protocol state machine [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 81-93. |
[11] | Pan YANG, Fei KANG, Hui SHU, Yuyao HUANG, Xiaoshao LYU. Binary program taint analysis optimization method based on function summary [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 115-131. |
[12] | Tian XIAO, Zhihao JIANG, Peng TANG, Zheng HUANG, Jie GUO, Weidong QIU. High-performance directional fuzzing scheme based on deep reinforcement learning [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 132-142. |
[13] | Chenghao YUAN, Yong LI, Shuang REN. Dynamic multi-keyword searchable encryption scheme [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 143-153. |
[14] | Zezhou HOU, Jiongjiong REN, Shaozhen CHEN. Security evaluation for parameters of SIMON-like cipher based on neural network distinguisher [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 154-163. |
[15] | Xuejing GUO, Yixiang FANG, Yi ZHAO, Tianzhu ZHANG, Wenchao ZENG, Junxiang WANG. Traditional guidance mechanism based deep robust watermarking [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 175-183. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|