[1]陈训逊, 方滨兴, 胡铭曾, 等. 一个网络信息内容安全的新领域——网络信息渗透检测技术[J]. 通信学报, 2004, 25(7): 185191[2]Fang B X, Guo Y C, Zhou Y. Information content security on the Internet: The control model and its evaluation[J]. Science China: Information Sciences, 2010, 53(1): 3049[3]万源. 基于语义统计分析的网络舆情挖掘技术研究[D]. 武汉: 武汉理工大学, 2012[4]Hai L, Hwee T. A maximum entropy approach to information extraction from semistructured and free text[C] Proc of the 18th National Conf on Artificial Intelligence. Berlin: Springer, 2002: 786791[5]David A. The stages of event extraction[C] Proc of the Workshop on Annotations and Reasoning about Time and Events. Berlin: Springer, 2006: 18[6]Guo W, Li H, Ji H. Linking tweets to news: A framework to enrich short text data in social media[C] Proc of the 51st Annual Meeting of the Association for Computational Linguistics. Berlin: Springer, 2013: 239249[7]Benson E, Haghighi A, Barzilay R. Event discovery in social media feeds[C] Proc of the 49th Annual Meeting of the Association for Computational Linguistics. Piscataway, NJ: IEEE, 2011: 8797[8]Ritter A, Wright E, Casey W H, et al. Weakly supervised extraction of computer security events from twitter[C] Proc of the 24th Int Conf on World Wide Web (WWW15). New York: ACM, 2015: 896905[9]Huang C, Tian Y, Zhou Z. Keyphrase extraction using semantic networks structure analysis [C]Proc of the 6th IEEE Int Conf on Data Mining. Piscataway, NJ: IEEE, 2006: 275284[10]Jenny R, Trond G, Christopher M. Incorporating nonlocal information into information extraction systems by gibbs sampling[EBOL]. (20050928) [20160312]. http:nlp.stanford.edu~manningpapersgibbscrf3.pdf[11]Chickering D, Heckerman D, Meek C. A Bayesian approach for learning Bayesian networks with local structure[C] Proc of the 13th Conf on Uncertainty in Artificial Intelligence. Los Angeles: Morgan Kaufmann, 1997: 8089[12]Schutze H, Hull D, Pedersen J. A comparison of classifiers and document representations for the routing problem[C] Proc of the 18th ACM Int Conf on Research and Development in Information Retrieval. New York: ACM, 1995: 229237[13]Holmes G, Donkin A, Witten I H. WEKA: A machine learning workbench[C] Proc of the 2nd Australia and New Zealand Conf on Intelligent Information Systems. Piscataway, NJ: IEEE, 1994: 357361[14]Chang C C, Lin C J. LIBSVM: A library for support vector machines [J]. ACM Trans on Intelligent Systems Technology, 2011, 2(3): 2729
|