Information Security Field Event Detection Technology Based on SAtt-LSTM
نویسندگان
چکیده
Detecting information security events from multimodal data can help analyze the evolution of in field. The Tree-LSTM network that introduces self-attention mechanism was used to construct sentence-vectorized representation model (SAtt-LSTM: with self-attention) and then classify candidate event sentences through results SAtt-LSTM obtain sentence types. Event detection using classification methods solve problem error cascade based on pipeline methods, CNN or RNN cannot make full use syntactic joint learning. paper treats task as a task. In order verify effectiveness superiority method this paper, DuEE set for experimental verification. Experimental show has better performance than chain structure LSTM, CNN, only Tree-LSTM.
منابع مشابه
Abnormal Event Detection Based on Saliency Information
Abnormal event detection is a challenging task in video analysis. In this paper, we propose a new abnormal event detection algorithm for surveillance videos. It is well accepted that human eyes are extremely sensitive to abnormal events and they can quickly pay attention to the locations of these abnormal events in visual scenes. Thus, the characteristics of the Human Visual System (HVS) can be...
متن کاملBidirectional LSTM-HMM Hybrid System for Polyphonic Sound Event Detection
In this study, we propose a new method of polyphonic sound event detection based on a Bidirectional Long Short-Term Memory Hidden Markov Model hybrid system (BLSTM-HMM). We extend the hybrid model of neural network and HMM, which achieved stateof-the-art performance in the field of speech recognition, to the multi-label classification problem. This extension provides an explicit duration model ...
متن کاملDevelopment of Information Technology in the Field of Dermatology
In many ways, medicine, and specifically dermatology, is practiced in much the same manner today as in centuries ago, but more recently, dermatologists have been facing enormous changes in the way they perform their profession and much of this is a result of a fundamental change in the manner in which information is exchanged through information technology. With the advent of more advance...
متن کاملInformation Technology and Security
This paper examines key trends and developments in information technology, and the implications of those developments on stability and security. Focus is on cyber threats to computer networks, including information theft and sabotage, and acts that disrupt or deny services. Seven trend areas are examined: ubiquity, mobility, hacking tools, performance, vulnerabilities, groundedness, and informa...
متن کاملPersian sign language detection based on normalized depth image information
There are many reports of using the Kinect to detect hand and finger gestures after release of device by Microsoft. The depth information is mostly used to separate the hand image in the two-dimension of RGB domain. This paper proposes a method in which the depth information plays a more dominant role. Using a threshold in depth space first the hand template is extracted. Then in 3D domain the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2021
ISSN: ['1939-0122', '1939-0114']
DOI: https://doi.org/10.1155/2021/5599962