期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Event Relation Extraction Based on Heterogeneous Graph Attention Networks and Event Ontology Direction Induction
1
作者 Wenjie Liu Zhifan Wang 《Tsinghua Science and Technology》 2026年第1期504-517,共14页
Event relation extraction plays a crucial role in constructing an event knowledge graph.However,current models only extract trigger words as event ontology representations,and do not consider node type during informat... Event relation extraction plays a crucial role in constructing an event knowledge graph.However,current models only extract trigger words as event ontology representations,and do not consider node type during information aggregation,resulting in low accuracy in event relation extraction.To address these challenges,we propose an event relation extraction model based on heterogeneous graph attention networks and event ontology direction induction.To enhance the completeness of event information,we incorporate argument role information,in addition to trigger words,into the input text.A novel heterogeneous graph attention framework is proposed to reasonably allocate weights to trigger words,argument roles,and text information,and then perform two levels of aggregation,node-level and semantic-level,in sequence.To improve the accuracy of event direction discrimination,we construct an event ontology subgraph that includes trigger words and arguments to aggregate complete event structure information during direction induction.Finally,we evaluate our model on three datasets,TimeBank-Dense,MATRES,and HiEve,and demonstrate that our model outperforms state-of-the-art models by 1.2%,0.5%,and 0.8%,respectively,in terms of the Micro-F1 score.Our proposed model provides a promising solution for event relation extraction and can be applied in various natural language processing applications. 展开更多
关键词 event relation extraction argument role heterogeneous graph networks event Ontology Direction Induction(EODI)
原文传递
Survey of Attacks and Countermeasures for SDN
2
作者 BAI Jiasong ZHANG Menghao BI Jun 《ZTE Communications》 2018年第4期3-8,共6页
Software defined networking(SDN)has attracted significant attention from both academia and industry by its ability to reconfigure network devices with logically centralized applications.However,some critical security ... Software defined networking(SDN)has attracted significant attention from both academia and industry by its ability to reconfigure network devices with logically centralized applications.However,some critical security issues have also been introduced along with the benefits,which put an obstruction to the deployment of SDN.One root cause of these issues lies in the limited resources and capability of devices involved in the SDN architecture,especially the hardware switches lied in the data plane.In this paper,we analyze the vulnerability of SDN and present two kinds of SDN-targeted attacks:1)data-to-control plane saturation attack which exhausts resources of all SDN components,including control plane,data plane,and the in-between downlink channel and 2)control plane reflection attack which only attacks the data plane and gets conducted in a more efficient and hidden way.Finally,we propose the corresponding defense frameworks to mitigate such attacks. 展开更多
关键词 SDN indirect/direct data plane event data-to-control plane saturation attack control plane reflection attack
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部