当前位置:网站首页>Paper notes ACL 2020 improving event detection via open domain trigger knowledge
Paper notes ACL 2020 improving event detection via open domain trigger knowledge
2022-07-04 12:34:00 【hlee-top】
List of articles
1 brief introduction
Thesis title :Improving Event Detection via Open-domain Trigger Knowledge
Source of the paper :ACL 2020
Thesis link :https://aclanthology.org/2020.acl-main.522.pdf
Code link :https://github.com/shuaiwa16/ekd
1.1 motivation
- Due to the long tail problem of marked data ( A large number of categories, only a small number of samples ) And the homogeneity of generated data , Previous methods have performed poorly on unseen or sparse data , Over fitting on dense data .
1.2 innovation
- The first one is to improve the performance of event detection by using the trigger word knowledge of open domain .
- Put forward a new teacher-student Model , Learn from tagged and unlabeled data , Reduce the built-in deviation in the tag .
2 Method
2.1 Knowledge collection
from WordNet Collect open domain trigger word knowledge , It is divided into the following two steps :
- Disambiguate words : Use IMS disambiguation , And then use Stanford CoreNLP Get features ( Part of speech tagging 、 Syntactic parsing ).
- Determine whether the event is triggered : Use a table lookup method , Determine whether the event is triggered .
2.2 Model
The overall framework of the model is shown in the figure above , It mainly includes the following parts :
- feature extraction : Use BERT Code the sentence .
- Event prediction : For marked data , Predict the event type of each word . The formula is as follows :
![]() | ![]() |
- Distillation of knowledge : The goal of knowledge distillation is to make teacher The probability of the model is equal to student Probability of model ( The formula is as follows ), Two models share parameters ,teacher The input to the model is S + S^+ S+(Knowledge-attending Sentences), Trigger word knowledge through open domain , Use B-TRI and E-TRI Mark the start and end boundaries of the trigger word . If the original sentence is S = { w 1 , w 2 , . . . , w i , . . . , w n } S=\{w_1,w_2,...,w_i,...,w_n\} S={ w1,w2,...,wi,...,wn}, w i w_i wi Trigger words defined for open domain trigger word knowledge , S + = { w 1 , w 2 , . . . , B − T R I , w i , E − T R I , . . . , w n } S^+=\{w_1,w_2,...,B-TRI,w_i,E-TRI,...,w_n\} S+={ w1,w2,...,B−TRI,wi,E−TRI,...,wn}.B-TRI and E-TRI Fine tune the sentences of knowledge collection (mask The probability of is 15%).student The input to the model is S − S^- S−(Knowledge-absent Sentences), Random mask Trigger words defined by open domain trigger word knowledge , Such as S − = { w 1 , w 2 , . . . , [ M A S K ] , . . . , w n } S^-=\{w_1,w_2,...,[MASK],...,w_n\} S−={ w1,w2,...,[MASK],...,wn}. Use KL Divergence minimizes the difference between probability distributions , The formula is as follows :
![]() | ![]() |
- Joint training : The goal of optimization is the supervision with labeled data loss And unmarked data KL The divergence loss, The formula is as follows :
3 experiment
stay ACE 2005 The experimental results on the data set are shown in the figure below :
To evaluate whether knowledge is distilled into the model , Observe the experimental effect of trigger word knowledge with and without open domain on the test set , The results are as follows :
Experimental results in the case of domain transfer :
Experimental results of trigger words with different frequencies :
Use three different kinds of knowledge , Verify whether the model can distill other knowledge types , The experimental results are shown below :
Case Study:
边栏推荐
- Azure solution: how can third-party tools call azure blob storage to store data?
- Possible to restore a backup of SQL Server 2014 on SQL Server 2012?
- Shift EC20 mode and switch
- How to realize the function of Sub Ledger of applet?
- OSI seven layer model & unit
- Practical dry goods: deploy mini version message queue based on redis6.0
- IPv6 experiment
- The latest idea activation cracking tutorial, idea permanent activation code, the strongest in history
- LxC shared directory permission configuration
- [Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 6
猜你喜欢
CSDN documentation specification
Hongke case study on storm impact in coastal areas of North Carolina using lidar
[solve the error of this pointing in the applet] SetData of undefined
2021-08-09
Ultimate bug finding method - two points
Enter the smart Park, and change begins here
How to judge the advantages and disadvantages of low code products in the market?
What if the chat record is gone? How to restore wechat chat records on Apple Mobile
Summary of Shanghai Jiaotong University postgraduate entrance examination module -- cryptography
Practical dry goods: deploy mini version message queue based on redis6.0
随机推荐
Summary of Shanghai Jiaotong University postgraduate entrance examination module -- cryptography
03_ Armv8 instruction set introduction load and store instructions
template<typename MAP, typename LIST, typename First, typename ... Keytypes > recursive call with indefinite parameters - beauty of Pan China
What if the chat record is gone? How to restore wechat chat records on Apple Mobile
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 6
SAP ui5 date type sap ui. model. type. Analysis of the display format of date
A few words explain redis cache penetration, breakdown, avalanche, and redis sentinel
Global and Chinese market of cardiac monitoring 2022-2028: Research Report on technology, participants, trends, market size and share
Leetcode: 408 sliding window median
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 12
Flet教程之 02 ElevatedButton高级功能(教程含源码)(教程含源码)
The detailed installation process of Ninja security penetration system (Ninjitsu OS V3). Both old and new VM versions can be installed through personal testing, with download sources
Azure solution: how can third-party tools call azure blob storage to store data?
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 19
Entitas learning [3] multi context system
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 8
Article download address
Practical dry goods: deploy mini version message queue based on redis6.0
Iframe to only show a certain part of the page
[notes] in depth explanation of assets, resources and assetbundles