2,736 research outputs found
Judicial Intelligent Assistant System: Extracting Events from Divorce Cases to Detect Disputes for the Judge
In formal procedure of civil cases, the textual materials provided by
different parties describe the development process of the cases. It is a
difficult but necessary task to extract the key information for the cases from
these textual materials and to clarify the dispute focus of related parties.
Currently, officers read the materials manually and use methods, such as
keyword searching and regular matching, to get the target information. These
approaches are time-consuming and heavily depending on prior knowledge and
carefulness of the officers. To assist the officers to enhance working
efficiency and accuracy, we propose an approach to detect disputes from divorce
cases based on a two-round-labeling event extracting technique in this paper.
We implement the Judicial Intelligent Assistant (JIA) system according to the
proposed approach to 1) automatically extract focus events from divorce case
materials, 2) align events by identifying co-reference among them, and 3)
detect conflicts among events brought by the plaintiff and the defendant. With
the JIA system, it is convenient for judges to determine the disputed issues.
Experimental results demonstrate that the proposed approach and system can
obtain the focus of cases and detect conflicts more effectively and efficiently
comparing with existing method.Comment: 20 page
Event Extraction: A Survey
Extracting the reported events from text is one of the key research themes in
natural language processing. This process includes several tasks such as event
detection, argument extraction, role labeling. As one of the most important
topics in natural language processing and natural language understanding, the
applications of event extraction spans across a wide range of domains such as
newswire, biomedical domain, history and humanity, and cyber security. This
report presents a comprehensive survey for event detection from textual
documents. In this report, we provide the task definition, the evaluation
method, as well as the benchmark datasets and a taxonomy of methodologies for
event extraction. We also present our vision of future research direction in
event detection.Comment: 20 page
Label Enhanced Event Detection with Heterogeneous Graph Attention Networks
Event Detection (ED) aims to recognize instances of specified types of event
triggers in text. Different from English ED, Chinese ED suffers from the
problem of word-trigger mismatch due to the uncertain word boundaries. Existing
approaches injecting word information into character-level models have achieved
promising progress to alleviate this problem, but they are limited by two
issues. First, the interaction between characters and lexicon words is not
fully exploited. Second, they ignore the semantic information provided by event
labels. We thus propose a novel architecture named Label enhanced Heterogeneous
Graph Attention Networks (L-HGAT). Specifically, we transform each sentence
into a graph, where character nodes and word nodes are connected with different
types of edges, so that the interaction between words and characters is fully
reserved. A heterogeneous graph attention networks is then introduced to
propagate relational message and enrich information interaction. Furthermore,
we convert each label into a trigger-prototype-based embedding, and design a
margin loss to guide the model distinguish confusing event labels. Experiments
on two benchmark datasets show that our model achieves significant improvement
over a range of competitive baseline methods
NLP-Based Techniques for Cyber Threat Intelligence
In the digital era, threat actors employ sophisticated techniques for which,
often, digital traces in the form of textual data are available. Cyber Threat
Intelligence~(CTI) is related to all the solutions inherent to data collection,
processing, and analysis useful to understand a threat actor's targets and
attack behavior. Currently, CTI is assuming an always more crucial role in
identifying and mitigating threats and enabling proactive defense strategies.
In this context, NLP, an artificial intelligence branch, has emerged as a
powerful tool for enhancing threat intelligence capabilities. This survey paper
provides a comprehensive overview of NLP-based techniques applied in the
context of threat intelligence. It begins by describing the foundational
definitions and principles of CTI as a major tool for safeguarding digital
assets. It then undertakes a thorough examination of NLP-based techniques for
CTI data crawling from Web sources, CTI data analysis, Relation Extraction from
cybersecurity data, CTI sharing and collaboration, and security threats of CTI.
Finally, the challenges and limitations of NLP in threat intelligence are
exhaustively examined, including data quality issues and ethical
considerations. This survey draws a complete framework and serves as a valuable
resource for security professionals and researchers seeking to understand the
state-of-the-art NLP-based threat intelligence techniques and their potential
impact on cybersecurity
On the Evolution of Knowledge Graphs: A Survey and Perspective
Knowledge graphs (KGs) are structured representations of diversified
knowledge. They are widely used in various intelligent applications. In this
article, we provide a comprehensive survey on the evolution of various types of
knowledge graphs (i.e., static KGs, dynamic KGs, temporal KGs, and event KGs)
and techniques for knowledge extraction and reasoning. Furthermore, we
introduce the practical applications of different types of KGs, including a
case study in financial analysis. Finally, we propose our perspective on the
future directions of knowledge engineering, including the potential of
combining the power of knowledge graphs and large language models (LLMs), and
the evolution of knowledge extraction, reasoning, and representation
- …