Few-shot relation classification by context attention-based prototypical networks with BERT

被引:0
作者
Bei Hui
Liang Liu
Jia Chen
Xue Zhou
Yuhui Nian
机构
[1] University of Electronic Science and Technology of China,School of Information and Software Engineering
来源
EURASIP Journal on Wireless Communications and Networking | / 2020卷
关键词
Attention mechanism; Few-shot learning; Language model; Relation classification;
D O I
暂无
中图分类号
学科分类号
摘要
Human-computer interaction under the cloud computing platform is very important, but the semantic gap will limit the performance of interaction. It is necessary to understand the semantic information in various scenarios. Relation classification (RC) is an import method to implement the description of semantic formalization. It aims at classifying a relation between two specified entities in a sentence. Existing RC models typically rely on supervised learning and distant supervision. Supervised learning requires large-scale supervised training datasets, which are not readily available. Distant supervision introduces noise, and many long-tail relations still suffer from data sparsity. Few-shot learning, which is widely used in image classification, is an effective method for overcoming data sparsity. In this paper, we apply few-shot learning to a relation classification task. However, not all instances contribute equally to the relation prototype in a text-based few-shot learning scenario, which can cause the prototype deviation problem. To address this problem, we propose context attention-based prototypical networks. We design context attention to highlight the crucial instances in the support set to generate a satisfactory prototype. Besides, we also explore the application of a recently popular pre-trained language model to few-shot relation classification tasks. The experimental results demonstrate that our model outperforms the state-of-the-art models and converges faster.
引用
收藏
相关论文
共 37 条
[1]  
Kong C(2019)Disseminating authorized content via data analysis in opportunistic social networks Big Data Mining and Analytics 2 12-24
[2]  
Luo G(2019)Big data analytics for healthcare industry: impact, applications, and tools Big Data Mining and Analytics 2 48-C57
[3]  
Tian L(2018)A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment Futur. Gener. Comput. Syst. 88 636-643
[4]  
Cao X(2020)Android HIV: a study of repackaging malware for evading machine-learning detection IEEE Transactions on Information Forensics and Security 15 987-1001
[5]  
Kumar S(2016)An overview of fog computing and its security issues[J] Concurrency and Computation: Practice and Experience 28 2991-3005
[6]  
Singh M(2017)Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies IEEE Communications Surveys and Tutorials 19 465-481
[7]  
Qi L(2003)Kernel methods for relation extraction J. Mach. Learn. Res. 3 1083-1106
[8]  
Zhang X(2018)Twitter spam detection: Survey of new approaches and comparative study[J] Computers & Security 76 265-284
[9]  
Dou W(2015)Human-level concept learning through probabilistic program induction Science 350 1332-1338
[10]  
Hu C(undefined)undefined undefined undefined undefined-undefined