Why Attention? Analyze BiLSTM Deficiency and Its Remedies in the Case of NER

Why Attention? Analyze BiLSTM Deficiency and Its Remedies in the Case of NER

Peng-Hsuan Li,1 Tsu-Jui Fu,2 Wei-Yun Ma1
1Academia Sinica
2UC Santa Babara
jacobvsdanniel@gmail.com, tsu-juifu@ucsb.edu, ma@iis.sinica.edu.tw
Abstract

BiLSTM has been prevalently used as a core module for NER in a sequence-labeling setup. State-of-the-art approaches use BiLSTM with additional resources such as gazetteers, language-modeling, or multi-task supervision to further improve NER. This paper instead takes a step back and focuses on analyzing problems of BiLSTM itself and how exactly self-attention can bring improvements. We formally show the limitation of (CRF-)BiLSTM in modeling cross-context patterns for each word – the XOR limitation. Then, we show that two types of simple cross-structures – self-attention and Cross-BiLSTM – can effectively remedy the problem. We further test them on real-world NER datasets, OntoNotes 5.0 and WNUT 2017, with clear and consistent improvements over the baseline, up to 8.7% on some of the multi-token entity mentions. We give in-depth analyses of the improvements across several aspects of NER, especially the identification of multi-token mentions. This study should lay a sound foundation for future improvements on sequence-labeling NER111https://github.com/jacobvsdanniel/cross˙ner.

1 Introduction

Named Entity Recognition (NER) is a core task for information extraction. Originally a structured prediction task, NER has since been formulated as a task of sequential token labeling. BiLSTM-CNN uses a CNN to encode each word and then uses bi-directional LSTMs to encode past and future context respectively at each time step. With state-of-the-art empirical results, most regard it as a robust core module for sequence-labeling NER [22, 4, 1, 3, 5].

However, each direction of BiLSTM only sees and encodes half of a sequence at each time step. For each token, the forward LSTM only encodes past context; the backward LSTM only encodes future context. For computing sentence representations for tasks such as sentence classification and machine translation, this is not a problem, as only the rightmost hidden state of the forward LSTM and only the leftmost hidden state of the backward LSTM are used, and each of the endpoint hidden states sees and encodes the whole sentence. For computing sentence representations for sequence-labeling tasks such as NER, however, this becomes a limitation, as each token uses its own midpoint hidden states, which do not model the patterns that happen to cross past and future at this specific time step.

This paper explores two types of cross-structures to help cope with the problem: Cross-BiLSTM-CNN and Att-BiLSTM-CNN. Previous studies have tried to stack multiple LSTMs for sequence-labeling NER [4]. As they follow the trend of stacking forward and backward LSTMs independently, the Baseline-BiLSTM-CNN is only able to learn higher-level representations of past or future per se. Instead, Cross-BiLSTM-CNN, which interleaves every layer of the two directions, models cross-context in an additive manner by learning higher-level representations of the whole context of each token. On the other hand, Att-BiLSTM-CNN models cross-context in a multiplicative manner by capturing the interaction between past and future with a dot-product self-attentive mechanism [8, 20].

Section 3 formulates the three Baseline, Cross, and Att-BiLSTM-CNN models, with Section 3.33.4 giving formal proof that patterns forming an XOR cannot be modeled by (CRF-)BiLSTM-CNN used in all previous work. Cross-BiLSTM-CNN and Att-BiLSTM-CNN are shown to have additive and multiplicative cross-structures respectively to deal with the problem. Section 4 evaluates practical effectiveness of the approaches on two challenging NER datasets spanning a wide range of domains with complex, noisy, and emerging entities. The cross-structures bring consistent improvements over the prevalently used Baseline-BiLSTM-CNN without additional gazetteers, POS taggers, language-modeling, or multi-task supervision. The improved core module surpasses comparable bare-bone models on OntoNotes 5.0 and WNUT 2017 by 1.4% and 4.6% respectively. Ablation experiments reveal that emerging, complex, confusing, and multi-token entity mentions benefitted much from the cross-structures, up to 8.7% on some of the multi-token mentions. The in-depth entity-chunking analysis gives insights into how exactly self-attention helps real-world NER. As state-of-the-art approaches often use BiLSTM as their core module, they could benefit from the improvements brought by cross-structures against bare-bone models presented in this paper.

2 Related Work

Many have attempted tackling the NER task with bare-bone LSTM-based sequence encoders [16, 22, 4, 18]. Among these, the most sophisticated and successful is the BiLSTM-CNN proposed by \citeauthorChiu:TACL2016 \shortciteChiu:TACL2016. They stack multiple layers of LSTM cells per direction and also use a CNN to compute character-level word vectors alongside pre-trained word vectors. To make the analysis results in this work comparable to past studies on BiLSTM, we largely follow their paper in constructing the Baseline-BiLSTM-CNN, including the selection of raw features, the CNN, and the multi-layer BiLSTM. A subtle difference is that they send the output of each direction through separate affine-softmax classifiers and then sum their probabilities, while this paper sum the scores from affine layers before computing softmax once. While not changing the modeling capacity regarded in this paper, this does provide an empirically stronger baseline model than their formulation.

Besides using additional gazetteers or POS taggers [2, 1, 13], State-of-the-art models use additional large-scale language-modeling corpora [3] or additional multi-task supervision [5] to further improve NER performance beyond bare-bone models. This work does not intend to surpass their performance. Instead, as they rely on a core BiLSTM sentence encoder with the same limitation studied and remedied in this work, they would indeed benefit from the improvements of cross-structures against bare-bone models presented in this paper. In fact, on other tasks, many have used various ways to interleave BiLSTM layers [28, 6]. This work provides for a conscious decision with a formal treatment of the XOR limitation and its practical impacts on NER.

The modeling of global contexts for sequence-labeling NER has been partially accomplished using extensive feature engineering or conditional random fields (CRF). \citeauthorRatinov:CoNLL2009 \shortciteRatinov:CoNLL2009 build the Illinois NER tagger with feature-based perceptrons. In their analysis, the usefulness of Viterbi decoding is minimal and conflicts their handcrafted global features. However, their model has limited capability to learn the extraction of new global input features. On the other hand, recent researches on LSTM or CNN-based sequence encoders report empirical improvements brought by CRF [16, 22, 18, 26], as it discourages illegal predictions by explicitly modeling tag-transition probabilities. However, with the speed penalty of Viterbi decoding, transition probabilities are still independent of input sentences and provide partial, limited help in untying two plausible tag sequences. In contrast, this work studies the remedies for the XOR problem of (CRF-)BiLSTM (Section 3.33.4) that can directly provide the extraction of better global input features, improving class observation likelihoods.

Thought to lighten the burden of compressing all relevant information into a single hidden state, using attention mechanisms on top of LSTMs have shown empirical success for sequence encoders [8, 20] and decoders [21]. Self-attention has also been used below encoders to compute word vectors conditioned on context [10]. This work further formally analyzes the deficiency of BiLSTM encoders for sequence labeling and shows that using self-attention on top is actually providing one type of cross-structures that capture interactions between past and future context.

3 Model

3.1 CNN and Word Features

All models in the experiments use the same set of raw features: character embedding, character type, word embedding, and word capitalization.

For character embedding, 25d vectors are trained from scratch, and 4d one-hot character-type features indicate whether a character is uppercase, lowercase, digit, or punctuation [4]. Word token lengths are unified to 20 by truncation and padding. The resulting 20-by-(25+4) feature map of each token is applied to a character-trigram CNN with 20 kernels per length 1 to 3 and max-over-time pooling to compute a 60d character-based word vector [17, 4, 22].

For word embedding, either pre-trained 300d GloVe vectors [23] or 400d Twitter vectors [14] are used without further tuning. Also, 4d one-hot word capitalization features indicate whether a word is uppercase, upper-initial, lowercase, or mixed-caps [7, 4].

Throughout this paper, denotes the -by- matrix of sequence features, where is the sentence length and is either 364 (with GloVe) or 464 (with Twitter).

3.2 (Baseline-)BiLSTM-CNN

On top of the feature sequence, BiLSTM is used to capture the future and the past for each time step. Following \citeauthorChiu:TACL2016 \shortciteChiu:TACL2016, 4 distinct LSTM cells – two in each direction – are stacked to capture higher level representations:

where denote applying LSTM cell in forward, backward order, denote the resulting feature matrices of the stacked application, and denotes row-wise concatenation. In all the experiments, 100d LSTM cells are used, so and .

Finally, suppose there are token classes, the probability of each of which is given by the composition of affine and softmax transformations:

where is the row of , , are a trainable weight matrix and bias, and and are the -th and -th elements of .

Following \citeauthorChiu:TACL2016 \shortciteChiu:TACL2016, the 5 chunk labels O, S, B, I, E denote if a word token is Outside any entity mentions, the Sole token of a mention, the Beginning token of a multi-token mention, In the middle of a multi-token mention, or the Ending token of a multi-token mention. Hence when there are types of named entities, the actual number of token classes for sequence labeling NER.

3.3 XOR Limitation of BiLSTM

Consider the following four phrases that form an XOR:

  1. Key and Peele (work-of-art)

  2. You and I (work-of-art)

  3. Key and I

  4. You and Peele

The first two phrases are respectively a show title and a song title. The other two are not entities as a whole, where the last one actually occurs in an interview with Keegan-Michael Key. Suppose each phrase is the sequence given to Baseline-BiLSTM-CNN for sequence tagging, then the token “and” should be tagged as work-of-art:I in the first two cases and as O in the last two cases.

Firstly, note that the score vector at each time step is simply the sum of contributions coming from forward and backward directions plus a bias.

where denotes the top-half and bottom-half of .

Suppose the index of work-of-art:I and O are i, j respectively. To predict each “and” correctly, it must hold that

where superscripts denote the phrase number.

Now, the catch is that phrase 1 and phrase 3 have exactly the same past context for “and”. Hence the same and the same , i.e., . Similarly, , , and . Rewriting the constraints with these equalities gives

Finally, summing the first two inequalities and the last two inequalities gives two contradicting constraints that cannot be satisfied. In other words, even if an oracle is given to training the model, Baseline-BiLSTM-CNN can only tag at most 3 out of 4 “and” correctly. No matter how many LSTM cells are stacked for each direction, the formulation in previous studies simply does not have enough modeling capacity to capture cross-context patterns for sequence labeling NER.

OntoNotes 5.0 WNUT 2017
Prec. Rec. F1 Prec. Rec. F1
BiLSTM-CNN 86.04 86.53 86.280.26 - - -
CRF-IDCNN - - 86.840.19 - - -
CRF-BiLSTM(-BiLSTM*) - - 86.990.22 - - 38.24
Baseline-BiLSTM-CNN 88.37 87.14 87.750.14 53.24 32.93 40.681.78
Cross-BiLSTM-CNN 88.37 88.17 88.270.17 58.28 33.92 42.850.99
Att-BiLSTM-CNN 88.71 88.11 88.400.18 55.82 34.08 42.260.82
Table 1: Overall results. *Used on WNUT for character-based word vectors, reported better than CNN.
OntoNotes 5.0 WNUT 2017
train 1088.5 / 81.8 62.7 / 1.9
dev 147.7 / 11.0 15.7 / 0.8
test 152.7 / 11.2 23.3 / 1.0
Table 2: Datasets (K-tokens / K-entities).

3.4 XOR Limitation of CRF-BiLSTM

Consider the following four phrases that form an XOR:

a, b, m, c, d denote words. s (single) and o (outside) are tags.

The correct tagging of all phrases requires that

Note that this time we consider each phrase as a whole.

Suppose there is only Softmax, the log-probability of a phrase is just the log-sum of each time step. Cancelling the same terms across two sides of each inequality, e.g. , gives

Without cross-structures, scores from two contexts are only linearly summed (See Section 3.3), which gives

For pure BiLSTM, the original proof sums the top 2 and the bottom 2 inequalities, resulting in contradicting constraints.

Now, if there had been a linear-chain CRF modeling label transition probabilities (call it ), it would only add yet another linear term and would require

The inequalities remain unsatisfiable, and the reason is two-fold:

  1. The addition of transition probabilities are linear, independent of word sequences, so it does not help untying plausible word-tag sequences that form XOR.

  2. The consideration of each phrase as a whole, i.e. Viterbi decoding, does help to untie BIE with OOO, but not to untie OSO with OOO (recall “cancelling the same terms”).

In other words, predicting a phrase as a whole partially mitigates the XOR problem, with or without transition probabilities.

3.5 Cross-BiLSTM-CNN

Motivated by the limitation of the conventional Baseline-BiLSTM-CNN for sequence labeling, this paper proposes the use of Cross-BiLSTM-CNN by changing the deep structure in Section 3.2 to

As the forward and backward hidden states are interleaved between stacked LSTM layers, Cross-BiLSTM-CNN models cross-context patterns by computing representations of the whole sequence in a feed-forward, additive manner.

Specifically, for the XOR cases introduced in Section 3.3, although phrase 1 and phrase 3 still have the same past context for “and” and hence the first layer can only extract the same low-level hidden features , the second layer considers the whole context and thus have the ability to extract different high-level hidden features for the two phrases.

As the higher-level LSTMs of Cross-BiLSTM-CNN have interleaved input from forward and backward hidden states down below, their weight parameters double the size of the first-level LSTMs. Nevertheless, the cross formulation provides the modeling capacity absent in previous studies with how many more LSTM layers.

OntoNotes 5.0 WNUT 2017
event language law NORP* work-of-art corporation creative-work location
Cross +3.0% +4.1% +4.5% +3.3% +2.1% +6.4% +3.2% +8.6%
Att +4.6% +0.8% +0.8% +3.4% +5.6% +0.3% +2.0% +5.3%
Table 3: Types with significant results (3% absolute F1 differences vs. Baseline); . *Nationalities, religious, political groups.
OntoNotes 5.0 WNUT 2017
1 2 3 3+ 1 2 3 3+
Cross +0.3% +0.6% +1.8% +1.3% +1.7% +2.9% +8.7% +5.4%
Att +0.1% +1.1% +2.3% +1.8% +1.5% +2.0% +2.6% +0.9%
Table 4: Improvements vs. Baseline among different mention lengths.

3.6 Att-BiLSTM-CNN

Another way to capture the interaction between past and future context per time step is to add a token-level self-attentive mechanism on top of the same BiLSTM formulation introduced in Section 3.2. Given the hidden features of a whole sequence, the model projects each hidden state to different subspaces, depending on whether it is used as the query vector to consult other hidden states for each word token, the key vector to compute its dot-similarities with incoming queries, or the value vector to be weighted and actually convey information to the querying token. As different aspects of a task can call for different attention, multiple attention heads running in parallel are used [27].

Formally, let be the number of attention heads and be the subspace dimension. For each head , the attention weight matrix and context matrix are computed by

where are trainable projection matrices and performs softmax along the second dimension. Each row of the resulting contains the attention weights of a token to its context, and each row of is its context vector.

For Att-BiLSTM-CNN, the hidden vector and context vectors of each token are considered together for classification:

where is the -th row of , and is a trainable weight matrix. In all the experiments, and , so .

While the BiLSTM formulation stays the same as Baseline-BiLSTM-CNN, the computation of attention weights and context features models the cross interaction between past and future. To see this, the computation of attention scores can be rewritten as follows.

With the un-shifted covariance matrix of the projected , Att-BiLSTM-CNN correlates past and future context for each token in a dot-product, multiplicative manner.

One advantage of the multi-head self-attentive mechanism is that it only needs to be computed once per sequence, and the matrix computations are highly parallelizable, resulting in little computation time overhead. Moreover, in Section 4, the attention weights provide a better understanding of how the model learns to tackle sequence-labeling NER.

4 Experiments

4.1 Datasets

OntoNotes 5.0 Fine-Grained NER – a million-token corpus with diverse sources of newswires, web, broadcast news, broadcast conversations, magazines, and telephone conversations [15, 24]. Some are transcriptions of talk shows, and some are translations from Chinese or Arabic. The dataset contains 18 fine-grained entity types, including hard ones such as law, event, and work-of-art. All the diversities and noisiness require that models are robust across broad domains and able to capture a multitude of linguistic patterns for complex entities.

WNUT 2017 Emerging NER – a dataset providing maximally diverse, noisy, and drifting user-generated text [9]. The training set consists of previously annotated tweets – social media text with non-standard spellings, abbreviations, and unreliable capitalization [25]; the development set consists of newly sampled YouTube comments; the test set includes text newly drawn from Twitter, Reddit, and StackExchange. Besides drawing new samples from diverse topics across different sources, the shared task also filtered out text containing surface forms of entities seen in the training set. The resulting dataset requires models to generalize to emerging contexts and entities instead of relying on familiar surface cues.

(a) A confusing surface form for language and nationality.
(b) A triple-token mention with unreliable capitalization.
Figure 1: Example problematic entities for Baseline-BiLSTM-CNN.
Att-BiLSTM-CNN Baseline-…
O 99.05 -1.68 0.75 0.95 -1.67 -45.57 -0.81 -35.46 -0.03
S 93.74 2.69 -91.02 -90.56 -90.88 -25.61 -86.25 -84.32 0.13
B 90.99 1.21 -52.26 -90.78 -88.08 -90.88 -12.21 -87.45 -0.63
I 90.09 -28.18 -3.80 -87.93 -60.56 -50.19 -57.19 -79.63 -0.41
E 93.23 2.00 -71.50 -93.12 -36.45 -39.19 -91.90 -90.83 -0.38
Table 5: Entity-chunking ablation results.

4.2 Implementation and Baselines

All experiments for Baseline-, Cross-, and Att-BiLSTM-CNN used the same model parameters given in Section 3. The training minimized per-token cross-entropy loss with the Nadam optimizer [11] with uniform learning rate 0.001, batch size 32, and 35% variational dropout [12]. Each training lasted 400 epochs when using GloVe embedding (OntoNotes), and 1600 epochs when using Twitter embedding (WNUT). The development set of each dataset was used to select the best epoch to restore model weights for testing. Following previous work on NER, model performances were evaluated with strict mention F1 score. Training of each model on each dataset repeated 6 times to report the mean score and standard deviation.

Besides the strong Baseline implemented in this paper, we also list results of bare-bone BiLSTM-CNN [4], CRF-BiLSTM(-BiLSTM) [26, 19], and CRF-IDCNN [26] from the literature. Among them, IDCNN was a CNN-based sentence encoder, which should not have the XOR limitation raised in this paper. Caveat: As the purpose of the experiments is to evaluate practical effectiveness in remedying the limitation of BiLSTM, comparisons are not made against models using additional resources, such as gazetteers or POS taggers [2, 1, 13], large-scale language-modeling corpora [3], or multi-task supervision [5], to further improve NER performance beyond bare-bone models. We do not claim to have surpassed state-of-the-art results. However, as they used BiLSTM sentence encoders with the XOR limitation, they could indeed integrate with and benefit from the cross-structures presented in this paper.

4.3 Overall Results

Table 1 shows overall results on the two datasets spanning broad domains of newswires, broadcast, telephone, and social media. The models proposed in this paper surpassed previous reported bare-bone models by 1.4% on OntoNotes and 4.6% on WNUT. Compared to the re-implemented Baseline-BiLSTM-CNN, the cross-structures brought 0.7% and 2.2% improvements on OntoNotes and WNUT. More substantial improvements were achieved for WNUT 2017 emerging NER, suggesting that cross-context patterns were even more crucial for emerging contexts and entities than familiar entities, which might often be memorized by their surface forms.

4.4 Complex and Confusing Entity Mentions

Table 3 shows significant results per entity type compared to Baseline (3% absolute F1 differences for either Cross or Att). It could be seen that harder entity types generally benefitted more from the cross-structures. For example, work-of-art/creative-work entities could in principle take any surface forms – unseen, the same as a person name, abbreviated, or written with unreliable capitalizations on social media. Such mentions require models to learn a deep, generalized understanding of their context to accurately identify their boundaries and disambiguate their types. Both cross-structures were more capable in dealing with such hard entities (2.1%/5.6%/3.2%/2.0%) than the prevalently used, problematic Baseline.

Moreover, disambiguating fine-grained entity types is also a challenging task. For example, entities of language and NORP often take the same surface forms. Figure 0(a) shows an example containing ”Dutch” and ”English”. While ”English” was much more frequently used as a language and was identified correctly, the ”Dutch” mention was tricky for Baseline. The attention heat map (Figure 1(a)) further tells the story that Att has relied on its attention head to make context-aware decisions. Overall, both cross-structures were much better at disambiguating these fine-grained types (4.1%/0.8%/3.3%/3.4%).

(a) (Partial) of ”…Dutch into English…”.
(b) of ”…the White house…”.
(c) of ”…the White house…”.
(d) of ”…the White house…”.
Figure 2: Attention heat maps for the mentions in Figure 1, best viewed on computer.

4.5 Multi-Token Entity Mentions

Table 4 shows results among different entity lengths. It could be seen that cross-structures were much better at dealing with multi-token mentions compared to the prevalently used, problematic Baseline.

In fact, identifying correct mention boundaries for multi-token mentions poses a unique challenge for sequence-labeling models – all tokens in a mention must be tagged with correct sequential labels to form one correct prediction. Although models often rely on strong hints from a token itself or a single side of the context, however, in general, cross-context modeling is required. For example, a token should be tagged as Inside if and only if it immediately follows a Begin or an I and is immediately followed by an I or an End.

Figure 0(b) shows a sentence with multiple entity mentions. Among them, ”the White house” is a triple-token facility mention with unreliable capitalization, resulting in an emerging surface form. Without usual strong hints given by a seen surface form, Baseline predicted a false single-token mention ”White”. In contrast, Att utilized its multiple attention heads (Figure 1(b)1(c)1(d)) to consider the preceding and succeeding tokens for each token and correctly tagged the three tokens as facility:B, facility:I, facility:E.

4.6 Entity-Chunking

Entity-chunking is a subtask of NER concerned with locating entity mentions and their boundaries without disambiguating their types. For sequence-labeling models, this means correct O, S, B, I, E tagging for each token. In addition to showing that cross-structures achieved superior performance on multi-token entity mentions (Section 4.5), an ablation study focused on the chunking tags was performed to better understand how it was achieved.

Table 5 shows the entity-chunking ablation results on OntoNotes 5.0 development set. Both Att and Baseline models were taken without re-training for this subtask. The column lists the performance of Att-BiLSTM-CNN on each chunking tag. Other columns list the performance compared to . Columns to are when the full model is deprived of all other information in testing time by forcefully zeroing all vectors except the one specified by the column header. The figures shown in the table are per-token recalls for each chunking tag, which tells if a part of the model is responsible for signaling the whole model to predict that tag. Bold font and underline mark relatively high and low values of interest.

Firstly, Att appeared to designate the task of scoring I to the attention mechanism: When context vectors were left alone, the recall for I tokens only dropped a little (-3.80); When token hidden states were left alone, the recall for I tokens seriously degraded (-28.18). When and work together, the full Att model was then better at predicting multi-token entity mentions than Baseline.

Then, breaking context vectors to each attention head reveals that they have worked in cooperation: , focused more on scoring E (-36.45, -39.19) than I (-60.56, -50.19), while focused more on scoring B (-12.21) than I (-57.19). It was when information from all these heads were combined was Att able to better identify a token as being Inside a multi-token mention than Baseline.

Finally, the quantitative ablation analysis of chunking tags in this Section and the qualitative case-study attention visualizations in Section 4.5 explains each other: and especially tended to focus on looking for immediate preceding mention tokens (the diagonal shifted left in Figure 1(b)1(c)), enabling them to signal for End and Inside; tended to focus on looking for immediate succeeding mention tokens (the diagonal shifted right in Figure 1(d)), enabling it to signal for Begin and Inside. In fact, without context vectors, instead of BIE, Att would tag ”the White house” as BSE and extract the same false mention of ”White” as the OSO of Baseline.

Lacking the ability to model cross-context patterns, Baseline inadvertently learned to retract to predict single-token entities (0.13 vs. -0.63, -0.41, -0.38) when an easy hint from a familiar surface form is not available. This indicates a major flaw in BiLSTM-CNNs prevalently used for real-world NER today.

5 Conclusion

This paper has given a formal treatment of the deficiency of the prevalently-used (CRF-)BiLSTM-CNN in modeling cross-context for sequence-labeling NER. Formal proof of its inability to capture XOR patterns has been given, and the practical impacts has been analyzed on OntoNotes 5.0 and WNUT 2017. Additive and multiplicative cross-structures have shown to be crucial in modeling cross-context, significantly enhancing recognition of emerging, complex, confusing, and multi-token entity mentions. Against comparable bare-bone models, 1.4% and 4.6% overall improvements on OntoNotes 5.0 and WNUT 2017 have been achieved, showing the importance of remedying the core module of NER. As state-of-the-art models use (CRF-)BiLSTM with XOR limitation, this study should lay a sound foundation for future improvements on sequence-labeling NER.

References

  • [1] G. Aguilar, A. P. López Monroy, F. González, and T. Solorio (2018) Modeling noisiness to recognize named entities using multitask neural networks on social media. In Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long Papers), Cited by: §1, §2, §4.2.
  • [2] G. Aguilar, S. Maharjan, A. P. López Monroy, and T. Solorio (2017) A multi-task approach for named entity recognition in social media data. In Proceedings of the 3rd Workshop on Noisy User-generated Text, Cited by: §2, §4.2.
  • [3] A. Akbik, D. Blythe, and R. Vollgraf (2018) Contextual string embeddings for sequence labeling. In Proceedings of the 27th International Conference on Computational Linguistics, Cited by: §1, §2, §4.2.
  • [4] J. Chiu and E. Nichols (2016) Named entity recognition with bidirectional LSTM-CNNs. Transactions of the Association for Computational Linguistics. Cited by: §1, §1, §2, §3.1, §3.1, §4.2.
  • [5] K. Clark, M. Luong, C. D. Manning, and Q. Le (2018) Semi-supervised sequence modeling with cross-view training. In Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, Cited by: §1, §2, §4.2.
  • [6] M. Coavoux and S. B. Cohen (2019) Discontinuous constituency parsing with a stack-free transition system and a dynamic oracle. In Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers), Cited by: §2.
  • [7] R. Collobert, J. Weston, L. Bottou, M. Karlen, K. Kavukcuoglu, and P. Kuksa (2011) Natural language processing (almost) from scratch. Journal of Machine Learning Research. Cited by: §3.1.
  • [8] A. Conneau, D. Kiela, H. Schwenk, L. Barrault, and A. Bordes (2017) Supervised learning of universal sentence representations from natural language inference data. In Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, Cited by: §1, §2.
  • [9] L. Derczynski, E. Nichols, M. van Erp, and N. Limsopatham (2017) Results of the WNUT2017 shared task on novel and emerging entity recognition. In Proceedings of the 3rd Workshop on Noisy User-generated Text, Cited by: §4.1.
  • [10] J. Devlin, M. Chang, K. Lee, and K. Toutanova (2018) BERT: pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805. Cited by: §2.
  • [11] T. Dozat (2016) Incorporating Nesterov momentum into Adam. In Proceedings of ICLR 2016 Workshop, Cited by: §4.2.
  • [12] Y. Gal and Z. Ghahramani (2016) A theoretically grounded application of dropout in recurrent neural networks. In Advances in Neural Information Processing Systems, Cited by: §4.2.
  • [13] A. Ghaddar and P. Langlais (2018) Robust lexical features for improved neural network named-entity recognition. In Proceedings of the 27th International Conference on Computational Linguistics, Cited by: §2, §4.2.
  • [14] F. Godin, B. Vandersmissen, W. De Neve, and R. Van de Walle (2015) Multimedia lab @ ACL WNUT NER shared task: named entity recognition for twitter microposts using distributed word representations. In Proceedings of the Workshop on Noisy User-generated Text, Cited by: §3.1.
  • [15] E. Hovy, M. Marcus, M. Palmer, L. Ramshaw, and R. Weischedel (2006) OntoNotes: the 90% solution. In Proceedings of the Human Language Technology Conference of the NAACL, Companion Volume: Short Papers, Cited by: §4.1.
  • [16] Z. Huang, W. Xu, and K. Yu (2015) Bidirectional LSTM-CRF models for sequence tagging. arXiv preprint arXiv:1508.01991. Cited by: §2, §2.
  • [17] Y. Kim, Y. Jernite, D. Sontag, and A. M. Rush (2016) Character-aware neural language models.. In AAAI, Cited by: §3.1.
  • [18] G. Lample, M. Ballesteros, S. Subramanian, K. Kawakami, and C. Dyer (2016) Neural architectures for named entity recognition. In Proceedings of the 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Cited by: §2, §2.
  • [19] B. Y. Lin, F. Xu, Z. Luo, and K. Zhu (2017) Multi-channel BiLSTM-CRF model for emerging named entity recognition in social media. In Proceedings of the 3rd Workshop on Noisy User-generated Text, Cited by: §4.2.
  • [20] Z. Lin, M. Feng, C. N. dos Santos, M. Yu, B. Xiang, B. Zhou, and Y. Bengio (2017) A structured self-attentive sentence embedding. In International Conference on Learning Representations (ICLR), Cited by: §1, §2.
  • [21] T. Luong, H. Pham, and C. D. Manning (2015) Effective approaches to attention-based neural machine translation. In Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, Cited by: §2.
  • [22] X. Ma and E. Hovy (2016) End-to-end sequence labeling via bi-directional LSTM-CNNs-CRF. In Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), Cited by: §1, §2, §2, §3.1.
  • [23] J. Pennington, R. Socher, and C. Manning (2014) GloVe: global vectors for word representation. In Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), Cited by: §3.1.
  • [24] S. Pradhan, A. Moschitti, N. Xue, H. T. Ng, A. Björkelund, O. Uryupina, Y. Zhang, and Z. Zhong (2013) Towards robust linguistic analysis using OntoNotes. In Proceedings of the Seventeenth Conference on Computational Natural Language Learning, Cited by: §4.1.
  • [25] B. Strauss, B. Toma, A. Ritter, M. de Marneffe, and W. Xu (2016) Results of the WNUT16 named entity recognition shared task. In Proceedings of the 2nd Workshop on Noisy User-generated Text (WNUT), Cited by: §4.1.
  • [26] E. Strubell, P. Verga, D. Belanger, and A. McCallum (2017) Fast and accurate entity recognition with iterated dilated convolutions. In Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, Cited by: §2, §4.2.
  • [27] A. Vaswani, N. Shazeer, N. Parmar, J. Uszkoreit, L. Jones, A. N. Gomez, Ł. Kaiser, and I. Polosukhin (2017) Attention is all you need. In Advances in Neural Information Processing Systems 30, Cited by: §3.6.
  • [28] J. Zhou and W. Xu (2015) End-to-end learning of semantic role labeling using recurrent neural networks. In Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing (Volume 1: Long Papers), Cited by: §2.
Comments 0
Request Comment
You are adding the first comment!
How to quickly get a good reply:
  • Give credit where it’s due by listing out the positive aspects of a paper before getting into which changes should be made.
  • Be specific in your critique, and provide supporting evidence with appropriate references to substantiate general statements.
  • Your comment should inspire ideas to flow and help the author improves the paper.

The better we are at sharing our knowledge with each other, the faster we move forward.
""
The feedback must be of minimum 40 characters and the title a minimum of 5 characters
   
Add comment
Cancel
Loading ...
398253
This is a comment super asjknd jkasnjk adsnkj
Upvote
Downvote
""
The feedback must be of minumum 40 characters
The feedback must be of minumum 40 characters
Submit
Cancel

You are asking your first question!
How to quickly get a good answer:
  • Keep your question short and to the point
  • Check for grammar or spelling errors.
  • Phrase it like a question
Test
Test description