当前位置:网站首页>AAAI2022 | Word Embeddings via Causal Inference: Gender Bias Reducing and Semantic Information Preserving
AAAI2022 | Word Embeddings via Causal Inference: Gender Bias Reducing and Semantic Information Preserving
2022-07-04 03:36:00 【Zhiyuan community】
Address of thesis :https://arxiv.org/pdf/2112.05194.pdf
Word vectors are widely used in various naturallanguageprocessing tasks , However, many studies have shown that there are various biases in word vectors ( Such as gender or race ). This paper presents a method based on causal reasoning , It can effectively eliminate gender bias in word vectors and retain other semantics . Specifically , This paper proposes two causal reasoning frameworks , Respectively used to eliminate Potential proxy bias and Unresolved bias. Experiments show that , The word vector obtained by this method can not only better eliminate the bias in the word vector , It can also improve the performance of semantic related tasks .
边栏推荐
- 微信公众号网页授权
- SQL语句加强练习(MySQL8.0为例)
- 2022 Guangxi provincial safety officer a certificate examination materials and Guangxi provincial safety officer a certificate simulation test questions
- Enhanced for loop
- Contest3145 - the 37th game of 2021 freshman individual training match_ J: Eat radish
- 选择排序与冒泡排序模板
- logistic regression
- Baijia forum the founding of the Eastern Han Dynasty
- MySQL is dirty
- JVM family -- monitoring tools
猜你喜欢
[PaddleSeg 源码阅读] PaddleSeg 自定义数据类
Contest3145 - the 37th game of 2021 freshman individual training match_ 1: Origami
Cache general management class + cache httpcontext Current. Cache and httpruntime Differences between caches
1day vulnerability pushback skills practice (3)
I stepped on a foundation pit today
Code Execution Vulnerability - no alphanumeric rce create_ function()
96% of the collected traffic is prevented by bubble mart of cloud hosting
National standard gb28181 protocol platform easygbs fails to start after replacing MySQL database. How to deal with it?
SQL injection (1) -- determine whether there are SQL injection vulnerabilities
[untitled]
随机推荐
7 * 24-hour business without interruption! Practice of applying multiple live landing in rookie villages
How about the ratings of 2022 Spring Festival Gala in all provinces? Map analysis helps you show clearly!
Management and thesis of job management system based on SSM
XSS prevention
Add IDM to Google browser
Contest3145 - the 37th game of 2021 freshman individual training match_ 1: Origami
PMP 考試常見工具與技術點總結
【.NET+MQTT】.NET6 環境下實現MQTT通信,以及服務端、客戶端的雙邊消息訂閱與發布的代碼演示
Contest3145 - the 37th game of 2021 freshman individual training match_ F: Smallest ball
Aperçu du code source futur - série juc
Monitoring - Prometheus introduction
Experience summary of the 12th Blue Bridge Cup (written for the first time)
Solve the problems encountered by the laravel framework using mongodb
Teach you how to optimize SQL
Typical applications of minimum spanning tree
National standard gb28181 protocol platform easygbs fails to start after replacing MySQL database. How to deal with it?
[UE4] parse JSON string
Is it really so difficult to learn redis? Today, a fan will share his personal learning materials!
1day vulnerability pushback skills practice (3)
[PaddleSeg 源码阅读] PaddleSeg Transform 的 Normalize操作