Computer Science ›› 2021, Vol. 48 ›› Issue (5): 247-253.doi: 10.11896/jsjkx.200800181
• Artificial Intelligence • Previous Articles Next Articles
DONG Zhe, SHAO Ruo-qi, CHEN Yu-liang, ZHAI Wei-feng
CLC Number:
[1]WU H,LV L,YU B H.Chinese Named Entity RecognitionBased on Transfer Learning and BiLSTM-CRF[J].Journal of Chinese Mini-Micro Computer Systems,2019,40(6):1142-1147. [2]JIA Y,XU X.Chinese Named Entity Recognition Based onCNN-BiLSTM-CRF[C]//2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS).Beijing,China,2018:1-4. [3]CAI X,DONG S,HU J.A deep learning model incorporating part of speech and self-matching attention for named entity recognition of Chinese electronic medical records[J].BMC Medical Informatics and Decision Making,2019,19(S2):102-109. [4]PENG N Y,MARK D.Improving named entity recognition for chinese social media with word segmentation representation learning[J].arXiv:1603.00786. [5]CHEN P H,LIN C J,SCHLKOPF B.A Tutorial on ν-support vector machines[J].Applied Stochastic Models in Business and Industry,2005,21(2):111-136. [6]ZHOU G,SU J.Named Entity Recognition using an HMM-based Chunk Tagger[C]//Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics.Philadelphia,PA,USA,2002. [7]LAFFERTY J,MCCALLUM A,PEREIRA F C N.Conditional Random Fields:Probabilistic Models for Segmenting and Labeling Sequence Data[C]//Proceedings of the 18th International Conference on Machine Learning (ICML 2001).2001:282-289. [8]HUANG Z,XU W,YU K.Bidirectional LSTM-CRF Models for Sequence Tagging[J].2015,arXiv:1508.01991. [9]ZHANG J F,ZHANG Z S,WANG J,et al.Design of named entity recognition framework based on BLSTM-CRF in Chinese domain[J].Computing Technology and Automation,2019,38(3):117-121. [10]ZHANG Y,YANG J.Chinese NER Using Lattice LSTM[C]//Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics (Long Papers).2018:1554-1564. [11]ZHONG Q,TANG Y.An Attention-Based BILSTM-CRFfor Chinese Named Entity Recognition[C]//2020 IEEE 5th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA).2020:550-555. [12]MIKOLOV T,CHEN K,CORRADO G,et al.Efficient Estimation of Word Representations in Vector Space[J].2013,arXiv:1301.3781. [13]XU G,MENG Y,ZHOU X,et al.Chinese Event DetectionBased on Multi-feature Fusion and BiLSTM[J].IEEE Access,2019(99):1-1. [14]DEVLIN J,CHANG M W,LEE K,et al.BERT:Pre Training of Deep Bidirectional Transformers for Language Understanding[C]//Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics:Human Language Technologies.2019:4171-4186. [15]CHEN X,SUN Y,ATHIWARATKUN B,et al.AdversarialDeep Averaging Networks for Cross-Lingual Sentiment Classification[J].Transactions of the Association for Computational Linguistics,2018,6:557-570. [16]YANG Y S,ZHANG M S,CHEN W L,et al.Adversarial learning for chinese ner from crowd annotations[C]//Proceedings of the AAAI Conference on Artificial Intelligence.2018. [17]SHUI L C,LIU W Z,FENG Z M.Automatic image annotation based on generative confrontation network[J].Journal of Computer Applications,2019,39(7):2129-2133. [18]BOUSMALIS K,TRIGEORGIS G,SILBERMAN N,et al.Domain separation networks[C]//Proceedings of the 30th International Conference on Neural Information Processing Systems.2016:343-35. [19]YANG H M,LI L,YANG R D,et al.Recognition model ofnamed entities in electronic medical records based on two-way LSTM neural network[J].Journal of Clinical Rehabilitative Tissue Engineering Research,2018,22(20):3237-3242. [20]SHEN L X,ZOU B W,YE J,et al.Negative focus recognition based on two-way LSTM and CRF fusion model[J].Journal of Chinese Information Processing,2019,33(1):25-34. [21]LI J Y,YANG F.Text-level machine translation based on joint attention mechanism[J].Journal of Chinese Information Processing,2019,33(12):45-53. [22]GRAVES A,JüRGEN S.Framewise phoneme classification with bidirectional LSTM and other neural network architectures[J].Neural Networks,2005,18(5/6):602-610. [23]XU F,SONG Y H.Research on named entity recognition under massive food safety incidents[J].Science Research Management,2018,39(7):131-138. |
[1] | JIN Fang-yan, WANG Xiu-li. Implicit Causality Extraction of Financial Events Integrating RACNN and BiLSTM [J]. Computer Science, 2022, 49(7): 179-186. |
[2] | YU Jia-qi, KANG Xiao-dong, BAI Cheng-cheng, LIU Han-qing. New Text Retrieval Model of Chinese Electronic Medical Records [J]. Computer Science, 2022, 49(6A): 32-38. |
[3] | DU Xiao-ming, YUAN Qing-bo, YANG Fan, YAO Yi, JIANG Xiang. Construction of Named Entity Recognition Corpus in Field of Military Command and Control Support [J]. Computer Science, 2022, 49(6A): 133-139. |
[4] | KANG Yan, WU Zhi-wei, KOU Yong-qi, ZHANG Lan, XIE Si-yu, LI Hao. Deep Integrated Learning Software Requirement Classification Fusing Bert and Graph Convolution [J]. Computer Science, 2022, 49(6A): 150-158. |
[5] | YU Ben-gong, ZHANG Zi-wei, WANG Hui-ling. TS-AC-EWM Online Product Ranking Method Based on Multi-level Emotion and Topic Information [J]. Computer Science, 2022, 49(6A): 165-171. |
[6] | XU Guo-ning, CHEN Yi-peng, CHEN Yi-ming, CHEN Jin-yin, WEN Hao. Data Debiasing Method Based on Constrained Optimized Generative Adversarial Networks [J]. Computer Science, 2022, 49(6A): 184-190. |
[7] | YAN Meng, LIN Ying, NIE Zhi-shen, CAO Yi-fan, PI Huan, ZHANG Lan. Training Method to Improve Robustness of Federated Learning [J]. Computer Science, 2022, 49(6A): 496-501. |
[8] | GUO Yu-xin, CHEN Xiu-hong. Automatic Summarization Model Combining BERT Word Embedding Representation and Topic Information Enhancement [J]. Computer Science, 2022, 49(6): 313-318. |
[9] | DING Feng, SUN Xiao. Negative-emotion Opinion Target Extraction Based on Attention and BiLSTM-CRF [J]. Computer Science, 2022, 49(2): 223-230. |
[10] | LIU Kai, ZHANG Hong-jun, CHEN Fei-qiong. Name Entity Recognition for Military Based on Domain Adaptive Embedding [J]. Computer Science, 2022, 49(1): 292-297. |
[11] | CHENG Si-wei, GE Wei-yi, WANG Yu, XU Jian. BGCN:Trigger Detection Based on BERT and Graph Convolution Network [J]. Computer Science, 2021, 48(7): 292-298. |
[12] | YANG Yang, CHEN Wei, ZHANG Dan-yi, WANG Dan-ni, SONG Shuang. Adversarial Attacks Threatened Network Traffic Classification Based on CNN [J]. Computer Science, 2021, 48(7): 55-61. |
[13] | WANG Dan-ni, CHEN Wei, YANG Yang, SONG Shuang. Defense Method of Adversarial Training Based on Gaussian Enhancement and Iterative Attack [J]. Computer Science, 2021, 48(6A): 509-513. |
[14] | ZHOU Xiao-jin, XU Chen-ming, RUAN Tong. Multi-granularity Medical Entity Recognition for Chinese Electronic Medical Records [J]. Computer Science, 2021, 48(4): 237-242. |
[15] | CHEN Ming-hao, ZHU Yue-fei, LU Bin, ZHAI Yi, LI Ding. Classification of Application Type of Encrypted Traffic Based on Attention-CNN [J]. Computer Science, 2021, 48(4): 325-332. |
|