Named Entity Recognition in User-generated Text (English Twitter): A Systematic Literature Review

N Esmaail, N Omar, M Mohd, F Fauzi, Z Mansur - IEEE Access, 2024 - ieeexplore.ieee.org
Named Entity Recognition (NER) in social media has received much research attention in
the field of natural language processing (NLP) and information extraction. Research on this …

Extracting person names from user generated text: Named-entity recognition for combating human trafficking

Y Li, P Nair, K Pelrine, R Rabbany - Findings of the Association for …, 2022 - aclanthology.org
Online escort advertisement websites are widely used for advertising victims of human
trafficking. Domain experts agree that advertising multiple people in the same ad is a strong …

An embedding method for unseen words considering contextual information and morphological information

MS Won, YS Choi, S Kim, CW Na, JH Lee - Proceedings of the 36th …, 2021 - dl.acm.org
The performance1 of natural language processing has been greatly improved through the
pre-trained language models, which are trained with a large amount of corpus. But the …

Name entity recognition (ner) based drug related page classification on dark web

A Dalvi, V Shah, D Gandhi, S Shah… - … Conference on Trends …, 2022 - ieeexplore.ieee.org
While researching the dark web marketplaces, it was observed that the drugs' names varied
on different marketplaces. Therefore, the same drug might refer to different names on …

Content labelling of hidden services with keyword extraction using the graph decomposition method

A Dalvi, SM Raut, N Joshi, DR Bhuta… - … Intelligence for the …, 2022 - igi-global.com
The data investigation of hidden services on the dark web is gaining attention from the
research community and law enforcement agencies. However, the anonymity feature of …

[PDF][PDF] Self-attention based Darknet named entity recognition with BERT methods

Y Chen, Y Guo, H Jiang, J Ding, Z Chen - International Journal of Innovative …, 2021 - ijicic.org
Darknet has become the focus and difficulty of cyberspace security research due to its
anonymous services and a large number of illegal activities. In order to support cyberspace …