2023
DOI: 10.1002/asi.24735
|View full text |Cite
|
Sign up to set email alerts
|

Gender tagging of named entities using retrieval‐assisted multi‐context aggregation: An unsupervised approach

Abstract: Inferring the gender of named entities present in a text has several practical applications in information sciences. Existing approaches toward name gender identification rely exclusively on using the gender distributions from labeled data. In the absence of such labeled data, these methods fail. In this article, we propose a two-stage model that is able to infer the gender of names present in text without requiring explicit name-gender labels. We use coreference resolu-

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 38 publications
0
1
0
Order By: Relevance
“…In addition, the particularity of discipline inspection and supervision determines that the security of its information system is very important. However, the existing information systems still have certain risks [8][9][10] in information security, such as data leakage and network attacks. Therefore, in the future, we should pay more attention to improving the security of information systems and adopt more advanced security technologies, such as data encryption and authentication, to ensure the security and stability of information [11][12].…”
Section: Introductionmentioning
confidence: 99%
“…In addition, the particularity of discipline inspection and supervision determines that the security of its information system is very important. However, the existing information systems still have certain risks [8][9][10] in information security, such as data leakage and network attacks. Therefore, in the future, we should pay more attention to improving the security of information systems and adopt more advanced security technologies, such as data encryption and authentication, to ensure the security and stability of information [11][12].…”
Section: Introductionmentioning
confidence: 99%