Journal on Communications ›› 2020, Vol. 41 ›› Issue (2): 165-175.doi: 10.11959/j.issn.1000-436x.2020033
• Papers • Previous Articles Next Articles
Han ZHANG1,2,Yongjin HU1,Yuanbo GUO1,Jicheng CHEN3
Revised:
2019-12-27
Online:
2020-02-25
Published:
2020-03-09
Supported by:
CLC Number:
Han ZHANG,Yongjin HU,Yuanbo GUO,Jicheng CHEN. Research on coreference resolution technology of entity in information security[J]. Journal on Communications, 2020, 41(2): 165-175.
[1] | SUKTHANKER R , PORIA S , CAMBRIA E ,et al. Anaphora and coreference resolution:a review[J]. arXiv Preprint,arXiv:1805.11824, 2018 |
[2] | VASWANI A , BENGIO S , BREVDO E ,et al. Tensor2tensor for neural machine translation[J]. arXiv Preprint,arXiv:1803.07416, 2018. |
[3] | LAMPLE G , OTT M , CONNEAU A ,et al. Phrase-based & neural unsupervised machine translation[J]. arXiv Preprint,arXiv:1804.07755, 2018. |
[4] | CHEN M X , FIRAT O , BAPNA A ,et al. The best of both worlds:Combining recent advances in neural machine translation[J]. arXiv Preprint,arXiv:1804.09849, 2018. |
[5] | CAMBRIA E , PORIA S , HAZARIKA D ,et al. SenticNet 5:discovering conceptual primitives for sentiment analysis by means of context embeddings[C]// Thirty-Second AAAI Conference on Artificial Intelligence. 2018: 1795-1802. |
[6] | ETTER M , COLLEONI E , ILLIA L ,et al. Measuring organizational legitimacy in social media:assessing citizens’ judgments with sentiment analysis[J]. Business & Society, 2018,57(1): 60-97. |
[7] | MA Y , PENG H , CAMBRIA E . Targeted aspect-based sentiment analysis via embedding commonsense knowledge into an attentive LSTM[C]// Thirty-Second AAAI Conference on Artificial Intelligence. 2018: 5876-5883. |
[8] | ZENG D , DAI Y , LI F ,et al. Adversarial learning for distant supervised relation extraction[J]. Computers,Materials & Continua, 2018,55(1): 121-136. |
[9] | GáBOR K , BUSCALDI D , SCHUMANN A K ,et al. Semeval-2018 task 7:Semantic relation extraction and classification in scientific papers[C]// The 12th International Workshop on Semantic Evaluation. 2018: 679-688. |
[10] | QIN P , XU W , WANG W Y . DSGAN:generative adversarial training for distant supervision relation extraction[J]. arXiv Preprint,arXiv:1805.09929, 2018. |
[11] | LIU F , FLANIGAN J , THOMSON S ,et al. Toward abstractive summarization using semantic representations[J]. arXiv Preprint,arXiv:1805.10399, 2018. |
[12] | CHEN Y C , BANSAL M . Fast abstractive summarization with reinforce-selected sentence rewriting[J]. arXiv Preprint,arXiv:1805.11080, 2018. |
[13] | HOBBS J R . Resolving pronoun references[J]. Lingua, 1978,44(4): 311-338. |
[14] | BRENNAN S E , FRIEDMAN M W , POLLARD C J . A centering approach to pronouns[C]// The 25th Annual Meeting on Association for Computational Linguistics. 1987: 155-162. |
[15] | LAPPIN S , LEASS H J . An algorithm for pronominal anaphora resolution[J]. Computational Linguistics, 1994,20(4): 535-561. |
[16] | LEE H , CHANG A , PEIRSMAN Y ,et al. Deterministic coreference resolution based on entity-centric,precision-ranked rules[J]. Computational Linguistics, 2013,39(4): 885-916. |
[17] | SOON W M , NG H T , LIM D C Y . A machine learning approach to coreference resolution of noun phrases[J]. Computational Linguistics, 2001,27(4): 521-544. |
[18] | AONE C , BENNETT S W . Evaluating automated and manual acquisition of anaphora resolution strategies[C]// The 33rd Annual Meeting on Association for Computational Linguistics. 1995: 122-129. |
[19] | LEE H , SURDEANU M , JURAFSKY D . A scaffolding approach to coreference resolution integrating statistical and rule-based models[J]. Natural Language Engineering, 2017,23(5): 733-762. |
[20] | 钱伟, 郭以昆, 周雅倩 ,等. 基于最大熵模型的英文名词短语指代消解[J]. 计算机研究与发展, 2003,40(9): 1337-1343. |
QIAN W , GUO Y K , ZHOU Y Q ,et al. English noun phrase coreference resolution via a maximum entropy model[J]. Journal of Computer Research and Development, 2003,40(9): 1337-1343. | |
[21] | WISEMAN S , RUSH A M , SHIEBER S ,et al. Learning anaphoricity and antecedent ranking features for coreference resolution[C]// The 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing. 2015: 1416-1426. |
[22] | LEE K , HE L , LEWIS M ,et al. End-to-end neural coreference resolution[J]. arXiv Preprint,arXiv:170707045, 2017. |
[23] | ZHANG R , SANTOS C N , YASUNAGA M ,et al. Neural coreference resolution with deep biaffine attention by joint mention detection and mention clustering[J]. arXiv Preprint,arXiv:1805.04893, 2018. |
[24] | WISEMAN S , RUSH A M , SHIEBER S M . Learning global features for coreference resolution[J]. arXiv Preprint,arXiv:160403035, 2016. |
[25] | CLARK K , MANNING C D . Deep reinforcement learning for mention-ranking coreference models[C]// The 2016 Conference on Empirical Methods in Natural Language Processing. 2016: 2256-2262. |
[26] | DODDINGTON G R , MITCHELL A , PRZYBOCKI M A ,et al. The automatic content extraction (ACE) program-tasks,data,and evaluation[C]// LREC. 2004:1. |
[27] | PRADHAN S , MOSCHITTI A , XUE N ,et al. Conll-2012 shared task:modeling multilingual unrestricted coreference in ontonotes[C]// Joint Conference on EMNLP and CoNLL-Shared Task,Association for Computational Linguistics. 2012: 1-40. |
[28] | GUILLOU L , HARDMEIER C , SMITH A ,et al. Parcor 1.0:a parallel pronoun-coreference corpus to support statistical mt[C]// 9th International Conference on Language Resources and Evaluation (LREC). 2014: 3191-3198. |
[29] | HAGHIGHI A , KLEIN D . Simple coreference resolution with rich syntactic and semantic features[C]// The 2009 Conference on Empirical Methods in Natural Language Processing. 2009: 1152-1161. |
[30] | BBN Technologies.2006.Coreference Guidelines for English OntoNotes-Version 6.0. |
[31] | 张晗, 郭渊博, 李涛 . 结合GAN与BiLSTM-Attention-CRF的领域命名实体识别[J]. 计算机研究与发展, 2019,56(9): 1851-1858. |
ZHANG H , GUO Y B , LI T . Domain named entity recognition combining GAN and BiLSTM-Attention-CRF[J]. Journal of Computer Research and Development, 2019,56(9): 1851-1858. | |
[32] | PUSTEJOVSKY J , CASTANO J , SAURI R ,et al. (2002)Medstract:creating large-scale information servers for biomedical libraries[C]// The ACL-02 Workshop on Natural Language Processing in the Biomedical Domain. 2002: 85-92. |
[33] | SU J , YANG X , HONG H ,et al. Coreference resolution in biomedical texts:a machine learning approach[C]// Dagstuhl Seminar Proceedings. 2008. |
[34] | D’SOUZA J , NG V . Anaphora resolution in biomedical literature:a hybrid approach[C]// ACM Conference on Bioinformatics. ACM, 2012: 113-122. |
[35] | 韩旭 . 基于神经网络的文本特征表示关键技术研究[D]. 北京:北京邮电大学, 2019. |
HAN X . Research on key technologies of text feature representation based on neural network[D]. Beijing:Beijing University of Posts and Telecommunications, 2019. | |
[36] | ZHANG H , GUO Y B , LI T . Multifeature named entity recognition in information security based on adversarial learning[J]. Security and Communication Networks, 2019,2019(2): 1-9. |
[37] | KINGMA D P , BA J . Adam:a method for stochastic optimization[J]. arXiv Preprint,arXiv:1412.6980, 2014. |
[1] | Weiyu CHEN, Junshan LUO, Fanggang WANG, Haiyang DING, Shilian WANG, Guojiang XIA. Survey of capacity limits and implementation techniques in wireless covert communication [J]. Journal on Communications, 2022, 43(8): 203-218. |
[2] | Xi YIN,Weiqing HUANG. Research on color QR code watermarking technology based on chaos theory [J]. Journal on Communications, 2018, 39(7): 50-58. |
[3] | Qin WANG,Jianming ZHU. Research on the game of information security investment based on the Gordon-Loeb model [J]. Journal on Communications, 2018, 39(2): 174-182. |
[4] | Tao FENG,Ye LU,Jun-li FANG. Research on vulnerability and security technology of industrial Ethernet protocol [J]. Journal on Communications, 2017, 38(Z2): 185-196. |
[5] | Guang-ming TANG,Yi SUN,Xiao-yu XU,Yu WANG. Adaptive JPEG steganography based on distortion cost updating [J]. Journal on Communications, 2017, 38(9): 1-8. |
[6] | Mu-zhou LIU,Jian-shu QIU,Yun-yong ZHANG,Bin-feng YAN,Si-yao ZHANG,Ya-fei TANG. Certificate integration management platform based on identity key [J]. Journal on Communications, 2016, 37(Z1): 197-203. |
[7] | Chang-xi GAO,Ya-biao WU,Cong WANG. Encrypted traffic classification based on packet length distribution of sampling sequence [J]. Journal on Communications, 2015, 36(9): 65-75. |
[8] | Tao WEN,Yu-qing ZHANG,Qi-xu LIU,Gang YANG. UVDA:design and implementation of automation fusion framework of heterogeneous security vulnerability database [J]. Journal on Communications, 2015, 36(10): 235-244. |
[9] | Yu-qing ZHANG,Qian-ru WU,Qi-xu LIU,Ying DONG. Research on security of third-party tracking [J]. Journal on Communications, 2014, 35(9): 1-11. |
[10] | . Predicting users’ profiles in social network based on semi-supervised learning [J]. Journal on Communications, 2014, 35(8): 3-22. |
[11] | . Survey on security and privacy preserving for mobile internet service [J]. Journal on Communications, 2014, 35(11): 1-8. |
[12] | Jian-ming ZHU,Biao SONG,Qi-fa HUANG. Evolution game model of offense-defense for network security based on system dynamics [J]. Journal on Communications, 2014, 35(1): 54-61. |
[13] | Chan DONG,Xiu-bin FAN,You-wen LI,Jian-rong WANG. Secret level valuation method of BLP model based on some application properties [J]. Journal on Communications, 2013, 34(9): 142-149. |
[14] | . Correlation-immunity study of balanced H-Boolean functions [J]. Journal on Communications, 2013, 34(8): 11-87. |
[15] | Wei-wei LI. Correlation-immunity study of balanced H-Boolean functions [J]. Journal on Communications, 2013, 34(8): 82-87. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|