Search scope:
排序: Display mode:
A review on cyber security named entity recognition Review Article
Chen Gao, Xuan Zhang, Mengting Han, Hui Liu,zhxuan@ynu.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 9, Pages 1153-1168 doi: 10.1631/FITEE.2000286
Keywords: 命名实体识别(NER);信息抽取;网络空间安全;机器学习;深度学习
Learning to select pseudo labels: a semi-supervised method for named entity recognition Research Articles
Zhen-zhen Li, Da-wei Feng, Dong-sheng Li, Xi-cheng Lu,lizhenzhen14@nudt.edu.cn,davyfeng.c@gmail.com,dsli@nudt.edu.cn,xclu@nudt.edu.cn
Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 6, Pages 809-962 doi: 10.1631/FITEE.1800743
Keywords: 命名实体识别;无标注数据;深度学习;半监督学习方法
Disambiguating named entitieswith deep supervised learning via crowd labels Article
Le-kui ZHOU,Si-liang TANG,Jun XIAO,Fei WU,Yue-ting ZHUANG
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 1, Pages 97-106 doi: 10.1631/FITEE.1601835
Keywords: Named entity disambiguation Crowdsourcing Deep learning
一种易用的实体识别消歧系统评测框架 Article
辉 陈,宝刚 魏,一鸣 李,Yong-huai LIU,文浩 朱
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 2, Pages 195-205 doi: 10.1631/FITEE.1500473
Keywords: 实体识别消歧;评测框架;信息抽取
A network security entity recognition method based on feature template and CNN-BiLSTM-CRF Research Papers
Ya QIN, Guo-wei SHEN, Wen-bo ZHAO, Yan-ping CHEN, Miao YU, Xin JIN
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 6, Pages 872-884 doi: 10.1631/FITEE.1800520
By network security threat intelligence analysis based on a security knowledge graph (SKG), multi-source threat intelligence data can be analyzed in a fine-grained manner. This has received extensive attention. It is difficult for traditional named entity recognition methods to identify mixed security entities in Chinese and English in the field of network security, and there are difficulties in accurately identifying network security entities because of insufficient features extracted. In this paper, we propose a novel FT-CNN-BiLSTM-CRF security entity recognition method based on a neural network CNN-BiLSTM-CRF model combined with a feature template (FT). The feature template is used to extract local context features, and a neural network model is used to automatically extract character features and text global features. Experimental results showed that our method can achieve an F-score of 86% on a large-scale network security dataset and outperforms other methods.
Keywords: Network security entity Security knowledge graph (SKG) Entity recognition Feature template Neural network
Improving entity linking with two adaptive features Research Article
Hongbin ZHANG, Quan CHEN, Weiwen ZHANG
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 11, Pages 1620-1630 doi: 10.1631/FITEE.2100495
(EL) is a fundamental task in natural language processing. Based on neural networks, existing systems pay more attention to the construction of the , but ignore latent semantic information in the and the acquisition of effective information. In this paper, we propose two , in which the first adaptive feature enables the local and s to capture latent information, and the second adaptive feature describes effective information for embeddings. These can work together naturally to handle some uncertain information for EL. Experimental results demonstrate that our EL system achieves the best performance on the AIDA-B and MSNBC datasets, and the best average performance on out-domain datasets. These results indicate that the proposed , which are based on their own diverse contexts, can capture information that is conducive for EL.
Keywords: Entity linking Local model Global model Adaptive features Entity type
Named entity recognition for Chinese construction documents based on conditional random field
Frontiers of Engineering Management 2023, Volume 10, Issue 2, Pages 237-249 doi: 10.1007/s42524-021-0179-8
Keywords: NER NLP Chinese language construction document
Yuan Hui,Wang Fengshan,Xu Jiheng,Fu Chengqun
Strategic Study of CAE 2013, Volume 15, Issue 5, Pages 106-112
To effectively express the protective engineering space object, and effectively support various topology operation and military damage applications, a component-based entity model design scheme and its quality was proposed for the active load section of protective engineering. According to the design variety and validity confirmation in component-based protective engineering entity model, the positive and negative ideal intuitionistic fuzzy design project was determined, and respectively comparing the distance from the design project to the positive and negative ideal project, the superiority degree model was established for the component-based entity model design projects, which further gained the sequence of such projects. Case showed that model effectively solved the decision-making problem about entity model design operations, which provided one theory and method for scientific decision-making practice in entity model design operation for such active load section of protective engineering.
Keywords: protective engineering component design quality entity model intuitionistic fuzzy sets superiority
Toward an accurate method renaming approach via structural and lexical analyses Research Article
Junpeng LUO, Jingxuan ZHANG, Zhiqiu HUANG, Yong XU, Chenxing SUN,luojunpeng@nuaa.edu.cn,jxzhang@nuaa.edu.cn,zqhuang@nuaa.edu.cn,rogerxu@tencent.com,marssun@tencent.com
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 5, Pages 732-748 doi: 10.1631/FITEE.2100470
Keywords: Method renaming Code refactor Deep learning Convolutional neural networks
Automatically building large-scale named entity recognition corpora from Chinese Wikipedia
Jie ZHOU,Bi-cheng LI,Gang CHEN
Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 11, Pages 940-956 doi: 10.1631/FITEE.1500067
Keywords: NER corpora Chinese Wikipedia Entity classification Domain adaptation Corpus selection
A partition approach for robust gait recognition based on gait template fusion Research Articles
Kejun Wang, Liangliang Liu, Xinnan Ding, Kaiqiang Yu, Gang Hu,heukejun@126.com,liuliangliang@hrbeu.edu.cn,dingxinnan@hrbeu.edu.cn,yukaiqiang@hrbeu.edu.cn,hugang@hrbeu.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 5, Pages 615-766 doi: 10.1631/FITEE.2000377
Surface Ship Target Recognition Research Based on SGA
Jiang Dingding,Xu Zhaolin,Li Kairui
Strategic Study of CAE 2004, Volume 6, Issue 8, Pages 79-81
Surface ship recognition is an important contents of navy's aviation probe. This text discussed the principle, characteristics and calculating step of SGA, and applied this calculating way to surface ship recognition. The experiment results proved the scientificalness and the practical applicability of that methoded.
Keywords: SGA target recognition surface ship
Application of RFID in the Visual Logistics System
Wang Aiming,Mu Xiaoxi,Li Aihua
Strategic Study of CAE 2006, Volume 8, Issue 8, Pages 65-68
The radio frequency identification (RFID) is a kind of new automatic identification technology. It has many characteristics such as high reliability, privacy , non-contact, convenient and swift. Applying RFID to visual logistics system, can gain actual requirement of guaranteed object and information about the type, amount and way of materials to supply and ensure the supply in the whole time, orientation and course. The paper introduces the RFID system and its principle, and brings about an application of RFID in visual logistics system, which is realized by the radio frequency labels stuck to the containers and equipments.
Keywords: visual logistics radio frequency identification visual system for the carrying materials
Pattern Recognition With Fuzzy Central Clustering Algorithms
Zen Huanglin,Yuan Hui,Liu Xiaofang
Strategic Study of CAE 2004, Volume 6, Issue 11, Pages 33-37
Based on optimization of constrained nonlinear programming, an approach of clustering center and a fuzzy membership function of pattern classification are derived from an objective function of the constrained nonlinear programming. An unsupervised algorithm with recursive expression and a fuzzy central cluster neural network are suggested in this paper. The fuzzy central cluster neural network proposed here can realize crisp decision or fuzzy decision in pattern classification.
Keywords: fuzzy sets central cluster pattern recognition neural network
Joint entity–relation knowledge embedding via cost-sensitive learning Article
Sheng-kang YU, Xue-yi ZHAO, Xi LI, Zhong-fei ZHANG
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 11, Pages 1867-1873 doi: 10.1631/FITEE.1601255
Keywords: Knowledge embedding Joint embedding Cost-sensitive learning
Title Author Date Type Operation
A review on cyber security named entity recognition
Chen Gao, Xuan Zhang, Mengting Han, Hui Liu,zhxuan@ynu.edu.cn
Journal Article
Learning to select pseudo labels: a semi-supervised method for named entity recognition
Zhen-zhen Li, Da-wei Feng, Dong-sheng Li, Xi-cheng Lu,lizhenzhen14@nudt.edu.cn,davyfeng.c@gmail.com,dsli@nudt.edu.cn,xclu@nudt.edu.cn
Journal Article
Disambiguating named entitieswith deep supervised learning via crowd labels
Le-kui ZHOU,Si-liang TANG,Jun XIAO,Fei WU,Yue-ting ZHUANG
Journal Article
A network security entity recognition method based on feature template and CNN-BiLSTM-CRF
Ya QIN, Guo-wei SHEN, Wen-bo ZHAO, Yan-ping CHEN, Miao YU, Xin JIN
Journal Article
Improving entity linking with two adaptive features
Hongbin ZHANG, Quan CHEN, Weiwen ZHANG
Journal Article
Named entity recognition for Chinese construction documents based on conditional random field
Journal Article
A decision-making method about the design quality of component-based active load section entity model for protective engineering
Yuan Hui,Wang Fengshan,Xu Jiheng,Fu Chengqun
Journal Article
Toward an accurate method renaming approach via structural and lexical analyses
Junpeng LUO, Jingxuan ZHANG, Zhiqiu HUANG, Yong XU, Chenxing SUN,luojunpeng@nuaa.edu.cn,jxzhang@nuaa.edu.cn,zqhuang@nuaa.edu.cn,rogerxu@tencent.com,marssun@tencent.com
Journal Article
Automatically building large-scale named entity recognition corpora from Chinese Wikipedia
Jie ZHOU,Bi-cheng LI,Gang CHEN
Journal Article
A partition approach for robust gait recognition based on gait template fusion
Kejun Wang, Liangliang Liu, Xinnan Ding, Kaiqiang Yu, Gang Hu,heukejun@126.com,liuliangliang@hrbeu.edu.cn,dingxinnan@hrbeu.edu.cn,yukaiqiang@hrbeu.edu.cn,hugang@hrbeu.edu.cn
Journal Article
Surface Ship Target Recognition Research Based on SGA
Jiang Dingding,Xu Zhaolin,Li Kairui
Journal Article
Pattern Recognition With Fuzzy Central Clustering Algorithms
Zen Huanglin,Yuan Hui,Liu Xiaofang
Journal Article