Named Entity Recognition in User-generated Text (English Twitter): A Systematic Literature Review
Named Entity Recognition (NER) in social media has received much research attention in
the field of natural language processing (NLP) and information extraction. Research on this …
the field of natural language processing (NLP) and information extraction. Research on this …
Extracting person names from user generated text: Named-entity recognition for combating human trafficking
Online escort advertisement websites are widely used for advertising victims of human
trafficking. Domain experts agree that advertising multiple people in the same ad is a strong …
trafficking. Domain experts agree that advertising multiple people in the same ad is a strong …
An embedding method for unseen words considering contextual information and morphological information
The performance1 of natural language processing has been greatly improved through the
pre-trained language models, which are trained with a large amount of corpus. But the …
pre-trained language models, which are trained with a large amount of corpus. But the …
Name entity recognition (ner) based drug related page classification on dark web
While researching the dark web marketplaces, it was observed that the drugs' names varied
on different marketplaces. Therefore, the same drug might refer to different names on …
on different marketplaces. Therefore, the same drug might refer to different names on …
Content labelling of hidden services with keyword extraction using the graph decomposition method
The data investigation of hidden services on the dark web is gaining attention from the
research community and law enforcement agencies. However, the anonymity feature of …
research community and law enforcement agencies. However, the anonymity feature of …
[PDF][PDF] Self-attention based Darknet named entity recognition with BERT methods
Y Chen, Y Guo, H Jiang, J Ding, Z Chen - International Journal of Innovative …, 2021 - ijicic.org
Darknet has become the focus and difficulty of cyberspace security research due to its
anonymous services and a large number of illegal activities. In order to support cyberspace …
anonymous services and a large number of illegal activities. In order to support cyberspace …