期刊文献+

基于Word2Vec的疫情虚假信息检测方法 被引量:3

Word2Vec-based false information detection system of epidemic situation
下载PDF
导出
摘要 在面临突发大型公共事件时虚假信息的广泛传播将具有极大的破坏性。虚假信息的传播将严重干扰疫情的救治工作,针对以往传统分类模型存在特征稀疏,准确率不高等问题。提出了一种基于Word2Vec的疫情虚假信息检测方法。该方法使用Word2Vec模型训练词向量,解决了传统向量空间模型的特征稀疏问题,再引入TFIDF对词向量进行加权,最终将处理过后的数据输入到SVM模型。通过在国内新闻平台爬取的数据集上的实验验证,该方法较之传统方法,对虚假信息的检测在准确率上有4%以上的提升。 The widespread dissemination of false information in the face of sudden large-scale public incidents will be extremely destructive.The dissemination of false information will seriously interfere with the treatment of the epidemic.In response of the problems of sparse features and low accuracy in traditional classification models in the past,this paper proposes a method for detecting false information about the epidemic based on Word2 Vec.This method uses the Word2 Vec model to train word vectors,then solves the feature sparse problem of the traditional vector space model,and introduces TFIDF to weight the word vectors,finally inputs the processed data into the SVM model.Through the experimental verification on the data set crawled by the domestic news platform,this method has more than 4%improvement in the accuracy of detecting false information compared with the traditional method.
作者 齐浩翔 马莉媛 朱翌民 QI Haoxiang;MA Liyuan;ZHU Yimin(School of Electronic and Electrical Engineering,Shanghai University of Engineering Science,Shanghai 201620,China)
出处 《智能计算机与应用》 2021年第10期134-138,共5页 Intelligent Computer and Applications
关键词 疫情 Word2Vec 神经网络 SVM 文本分类 epidemic Word2Vec neural network SVM text classification
  • 相关文献

参考文献3

二级参考文献38

  • 1马传香,李庆华,王卉.入侵检测研究综述[J].计算机工程,2005,31(3):4-6. 被引量:26
  • 2张玉芳,彭时名,吕佳.基于文本分类TFIDF方法的改进与应用[J].计算机工程,2006,32(19):76-78. 被引量:120
  • 3Lee S. Heinbuch D., Training a neural-network basic intrusion detector to recognize novel attacks, IEEE Transactions on Systems, Man and Cybernetics, Part A, 2001, 31 (4) : 294-299.
  • 4B.Balajinath, S. V. Raghavan, Intrusion detection through learning behaviormodel, Computer Communication, 2001, 24 (2) : 1202-1212.
  • 5Ye, N. , A markov chain model of temporal behavior for anomaly detection, In Workshop on Information Assurance and Security, West Point, NY, June 2000.
  • 6Vapnik V. N. , The nature of statistical learning theory, New York : Sp ringer-Verlag, 1995.
  • 7S. Mukkamala, G. I. Janoski, A. H. Sung, Intrusion detection using support vector machines, Proceedings of the High Performance Computing Symposium-HPC 2002, pp. 178-183, San Diego, April 2002.
  • 8B.Scholkopf, A. Smola, K. R. Muller, Nonlinear component analysis as a kernel eigenvatue problem, Neural Computation, 1998, 10 ( 5 ) , 1299-1319.
  • 9Stairs G F, Jordaan EM. Imp roving SVM regression using mixtures of kernels[C] // Proceedings of the 2002 International Joint Conference on Neural-Networks. Hawaii: lEEk, 2002, 3:278522790.
  • 10SUN Jun, FENG Bin, XU Wenbo. Particle swarm optimization with particles having quantum behavior [C]// Congress on Evolutionary Computation, 2004 (58) 40-43.

共引文献94

同被引文献73

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部