论文阅读笔记
文章平均质量分 93
comeonfly666
带带孩子吧,学不会了
展开
-
Document-Level Relation Extraction with Adaptive Thresholding and Localized Context Pooling 阅读笔记
Document-Level Relation Extraction with Adaptive Thresholding and Localized Context PoolingPurposeEnhanced BERT BaselineEncoderBinary ClassifierAdaptive ThresholdingLocalized Context PoolingConclusionPurpose本文提出两种新的技术,分别为自适应阈值和局部上下文池化,解决多标签和多实体问题。自适应阈值利用原创 2021-09-20 16:36:09 · 403 阅读 · 0 评论 -
Entity Structure Within and Throughout: Modeling Mention Dependencies for Document-Level Relation Ex
Entity Structure Within and Throughout: Modeling Mention Dependencies for Document-Level Relation ExtractionPurposeApproachEntity StructureSSANTransformation ModuleSSAN for Relation ExtractionPurpose实体作为关系抽取的基本要素,具有特定的结构。本文中作者将其表述为提及对之间的独特依赖关系,并提出了SSAN(结原创 2021-09-18 20:11:48 · 714 阅读 · 0 评论 -
EIDER: Evidence-enhanced Document-level Relation Extraction阅读笔记
EIDER: Evidence-enhanced Document-level Relation ExtractionBackgroundPurposeMethodologyJoint Relation and Evidence ExtractionEvidence-centered Relation ExtractionFusion of Extraction ResultsBackground文档级关系抽取的目的是提取文档中实体对之间的关系,文档中的推断关系所需的最小句子集称为“evidence s原创 2021-09-13 16:47:00 · 766 阅读 · 3 评论 -
TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources
TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources 阅读笔记PurposeOverviewThreat Action OntologyThreat Action Extraction and AnalysisScraping and PreprocessingThreat Action IdentificationThreat Action Mapping an原创 2021-06-17 11:04:04 · 1188 阅读 · 2 评论 -
A System for Automated Open-Source Threat Intelligence Gathering and Management 阅读笔记
A System for Automated Open-Source Threat Intelligence Gathering and Management 阅读笔记BackgroundPurposeArchitectureBackend System DesignOSCTI Reports CollectionSecurity Knowledge Ontology DesignSecurity Knowledge ExtractionSecurity Knowledge Graph Construct原创 2021-06-16 00:29:40 · 456 阅读 · 0 评论 -
CyberSecurity Knowledge Base笔记
CSKB: A Cyber Security Knowledge Base Based on Knowledge Graph阅读笔记PurposeBackgroundOntology ConstructionProcess of Ontology ConstructionDescription of OntologyOntology implementationImplementation of CSKBKnowledge Acquisition and Knowledge Fusion/Extractio原创 2021-05-26 16:35:58 · 681 阅读 · 2 评论 -
Quantifying the Significance and Relevance of Cyber-Security Text Through Textual Similarity阅读笔记
Quantifying the Significance and Relevance of Cyber-Security Text Through Textual Similarity and Cyber-Security Knowledge Graph阅读笔记PurposeProposed Autonomous SystemsProposed System ArchitectureNatural Language Filter ModuleAnalyzer ModuleImplementationDat原创 2021-05-22 08:51:30 · 220 阅读 · 0 评论 -
Early Detection of Cybersecurity Threats Using Collaborative Cognition阅读笔记
Early Detection of Cybersecurity Threats Using Collaborative Cognition阅读笔记BackgroundPurposeCognitive Approach to CybersecurityAttack ModelSystem ArchitectureCognitive CyberSecurity ModuleIntel-Aggregate ModuleProof of Concept ImplementationConclusionBackg原创 2021-05-20 15:36:17 · 254 阅读 · 1 评论 -
Cyber-All-Intel: An AI for Security related Threat Intelligence阅读笔记
Cyber-All-Intel: An AI for Security related Threat Intelligence阅读笔记PurposeMethodsCybersecurity SourcesSystem Pipeline & ArchitectureThe VKG StructureCybersecurity Knowledge ImprovementImproving the Knowledge Graph Using Vector EmbeddingsImproving Vecto原创 2021-05-19 10:15:16 · 771 阅读 · 0 评论 -
Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues阅读笔记
Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports阅读笔记ArticlePurposeMethodsInitializing a Security Knowledge GraphTracking Installed Software & Mining Library LinkingBug & Issue TrackingA原创 2021-05-17 11:45:54 · 221 阅读 · 0 评论 -
DeepWeak: Reasoning Common Software Weaknesses via Knowledge Graph Embedding 阅读笔记
DeepWeak: Reasoning Common Software Weaknesses via Knowledge Graph Embedding 阅读笔记ArticleBackgroundPurposeMethodsExperimentBaselinesHyperparametersCWE Link PredictionCWE Triple ClassificationCommon Consequences PredictionConclusionArticleDeepWeak: Reasoni原创 2021-05-11 21:16:50 · 613 阅读 · 1 评论 -
Bridging Text and Knowledge with Multi-Prototype Embedding for Few-Shot Relational Triple 阅读笔记
Bridging Text and Knowledge with Multi-Prototype Embedding for Few-Shot Relational Triple Extraction 阅读笔记ArticleBackgroundPurposeMethodologiesProblem DefinitionFrameworkInstance EncoderHybrid Prototypical LearningPrototype-Aware RegularizationExperimentsCo原创 2021-05-08 23:46:41 · 524 阅读 · 1 评论 -
A Practical Approach to Constructing a Knowledge Graph for Cybersecurity 阅读笔记
A Practical Approach to Constructing a Knowledge Graph for Cybersecurity 阅读笔记ArticleBackgroundPurposeFramework DesignKnowledge deductionAttribute deductionRelationship deductionConclusionArticleA Practical Approach to Constructing a Knowledge Graph for C原创 2021-05-08 00:06:07 · 667 阅读 · 0 评论 -
RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph 阅读笔记
RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement 阅读笔记ArticleBackgroundPurposeCybersecurity Knowledge GraphSystem ArchitectureExperimentCorpusEvaluationsConclusionArticleRelExt: Relation Extraction u原创 2021-05-07 12:34:41 · 792 阅读 · 0 评论 -
Nugget Proposal Networks for Chinese Event Detection阅读总结
Nugget Proposal Networks for Chinese Event Detection阅读总结BackgroundPurposeHybrid Representation LearningToken-level Representation LearningHybrid Representation LearningNugget Proposal NetworksTrigger Nugget GeneratorEvent Type ClassifierDealing with Confli原创 2021-04-20 12:58:44 · 282 阅读 · 1 评论 -
DCFEE: A Document-level Chinese Financial Event Extraction System 阅读笔记
DCFEE: A Document-level Chinese Financial Event Extraction System based on Automatically Labeled Training Data 阅读笔记BackgroundPurposeMethodologyData GenerationEvent ExtractionEvaluationDatasetPerformance of the SystemApplicationConclusionBackground在金融、医疗、原创 2021-04-15 09:39:13 · 610 阅读 · 0 评论 -
Biomedical Event Extraction as Sequence Labeling 阅读总结
Biomedical Event Extraction as Sequence Labeling阅读总结PurposeBackgroundEncoding Event StructuresEvent StructuresSequence Labeling EncodingEvent Extraction as Sequence LabelingMulti-task StrategiesMulti-label DecoderExperimental and ResultsConclusionPurpose原创 2021-04-05 13:50:48 · 634 阅读 · 0 评论 -
TriggerNER: Learning with Entity Triggers as Explanations for Named Entity Recognition 阅读总结
TriggerNER: Learning with Entity Triggers as Explanations for Named Entity Recognition 阅读总结PurposeBackgroundMethodsTrigger Encodeing & Semantic MatchingTrigger-Enhanced Sequence TaggingInference on Unlabelled SentenceExperiment and ResultsAnnotating an原创 2021-04-03 21:48:49 · 507 阅读 · 0 评论 -
Document-Level Event Role Filler Extraction using Multi-Granularity Contextualized Encoding阅读笔记
Document-Level Event Role Filler Extraction using Multi-Granularity Contextualized Encoding阅读笔记PurposeBackgroundMethodsConstructing Paired Token-tag Sequences from Documents and Gold Role Fillersk-sentence ReaderMulti-Granularity ReaderResultsConclusionsP原创 2021-04-02 09:50:58 · 900 阅读 · 1 评论 -
A Novel Cascade Binary Tagging Framework for Relational Triple Extraction 阅读总结
A Novel Cascade Binary Tagging Framework for Relational Triple Extraction 阅读总结PurposeBackgroundMethodsBERT EncoderCacade DecoderResultsConclusionsPurpose作者引入一个新的角度重新审视关系抽取任务,并提出了一个新的二元标记框架CASREL,该框架是由公式推导而来的。将关系建模为函数,将subject映射到object,从而解决了重叠问题。在这个框架下,首先原创 2021-03-31 23:15:52 · 628 阅读 · 1 评论 -
Joint Extraction of Entities and Relations Based on a Novel Tagging Scheme阅读总结
Joint Extraction of Entities and Relations Based on a Novel Tagging Scheme阅读总结PurposeBackgroundPipelineJoint ExtractionEnd-to-EndMethodsThe Tagging SchemePurpose本文首先提出了一种新的标注模式,它包含了实体的信息和它们之间的关系,将联合抽取转换为标注问题。接着基于此研究了不同的基于LSTM的端到端模型对三元组建模,直接抽取实体和关系。另外,还通过原创 2021-03-28 13:36:20 · 552 阅读 · 4 评论 -
CASIE: Extracting Cybersecurity Event Information from Text阅读总结
CASIE: Extracting Cybersecurity Event Information from Text阅读总结PurposeBackground术语解释Methods网络安全事件抽取系统设计和架构ResultsConclusionsCommentsPurpose本文提出了CASIE系统,该系统从文本中提取有关网络安全事件的信息并填充语义模型,其最终目标是集成到网络安全数据的知识图谱中。Background通过从新闻文章中提取网络安全事件,能够帮助我们了解当前的趋势和漏洞,并将其集成到原创 2021-03-25 00:29:36 · 2146 阅读 · 7 评论