Journal of Guangxi Normal University(Natural Science Edition) ›› 2010, Vol. 28 ›› Issue (1): 147-152.

Previous Articles     Next Articles

Web Content Security Textual Classification Based on Vague Set

YUAN Ye1, FENG Hua-min1,2   

  1. 1. School of Telecommunication Engineering,Xidian University,Xi'an Shaanxi 710071,China;
    2. Beijing Electronic Science and Technology Institute,Beijing 100070,China
  • Received:2010-01-10 Online:2010-03-20 Published:2023-02-07

Abstract: With the popularity of Web applications,Web contentsecurity has beenaroused great attention.Web content security monitoring and classifying have become a key research issue.Based on the analysis of Web content security,demandedmodel is proposed in this paper.The model,combined with VSM,employs the Vagueset to improve the feature extraction strategy on the set of original documentrepresentation model.The results of the experiment on the medium-sized Web pages fromthe real Web corpus show that this model can improve the Web content security text classification results,compared with the traditional one.

Key words: content security, text classification, demand model, Vague set

CLC Number: 

  • TP391.1
[1] 呼声波,刘希玉.网页分类中特征提取方法的比较与改进[J].山东师范大学学报:自然科学版,2008,23(3):35-38.
[2] GAU W L,BUEHRER D J.Vague sets[J].IEEE Transactions on Systems,Man and Cybernetics,1993,23(2):610-614.
[3] HAO Yan-you,CHI Zhong-xian,YAN De-qin.Fuzzy support vector machine based on vague sets for credit assessment[C]//Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery.Washington DC:IEEE Computer Society,2007:603-607.
[4] 裴振奎,徐九韵.Vague集之间相似度量的一种新方法[J].广西师范大学学报:自然科学版,2003,21(1):138-143.
[5] 李凡,徐章艳.Vague集之间的相似度量[J].软件学报,2001,12(6):922-927.
[6] 周晓光,谭春桥,张强.基于Vague集的决策理论与方法[M].北京:科学出版社,2009:38-39.
[7] VAPNIK V N.The nature of statistical learning theory[J].New York:Springer-Verlag,1995:15.
[8] THERSON J.Text categorization with support vector machines:learning with many relevant features[C]//European Conference on Machine Learning (ECML).Berlin:Springer,1998.
[9] VAPNIK V N.统计学习理论的本质[M].张学工,译.北京:清华大学出版社,2000.
[10] 张学工.关于统计学习理论与支持向量机[J].自动化学报,2000,26(1):32-42.
[11] 搜狗实验室.互联网语料库2006版[EB/OL].[2008-06-12].http://www.sogou.com/labs/.
[12] 毋非,封化民.容错粗糙模型的事件检测研究[J].智能系统学报,2009,4(2):112-117.
[13] BUCKLEY C,SALTON G,ALLAN J,et al.Automatic query expansion usingSMART:TREC 3[C]//Proceedings of the 3rd Text Retrieval Conference.GaithersburgM D:National Institute of Standards and Techonology,1994:69-80.
[14] J SANG A,KNAPSKOG S J.A metric for trusted systems,Global IT Security[M].Wien:Austrian Computer Society,1998:541-549.
[15] 哈工大信息检索研究室.语言技术平台共享包[EB/OL].[2008-06-12].http://ir.hit.edu.cn/.
[16] 张博锋,苏金树,徐昕.一种新的多类SVM方法及其在文本分类中的应用[J].广西师范大学学报:自然科学版,2006,24(4):95-98.
[1] YUE Tianchi, ZHANG Shaowu, YANG Liang, LIN Hongfei, YU Kai. Stance Detection Method Based on Two-Stage Attention Mechanism [J]. Journal of Guangxi Normal University(Natural Science Edition), 2019, 37(1): 42-49.
[2] LIAO Hai-bo, WAN Zhong-ying, WANG Ming-wen. Projection Pursuit Model of Immune Evolution and Its ApplicationtoText Classification [J]. Journal of Guangxi Normal University(Natural Science Edition), 2011, 29(1): 123-128.
[3] YUAN Ding-rong, XIE Yang-cai, LU Guang-quan, LIU Xing. A New Text Classification Approach Based on Fuzzy Soft Set Theory [J]. Journal of Guangxi Normal University(Natural Science Edition), 2011, 29(1): 129-132.
[4] GUO Si-hui, FAN Xing-hua. An Improved Short Text Classification Algorithm Based on Bayesian Network [J]. Journal of Guangxi Normal University(Natural Science Edition), 2010, 28(3): 140-143.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] CHEN Yong-qi, BAI Ke-zhao, KUANG hua, KONG Ling-jiang, LIU Mu-ren. Effect of Internal Layout on the Pedestrian Evacuation in the Classroom[J]. Journal of Guangxi Normal University(Natural Science Edition), 2011, 29(1): 1 -4 .
[2] XU Lun-hui, YE Fan. Acceleration Noise Model Based on Horizontal,Vertical and LateralAcceleration[J]. Journal of Guangxi Normal University(Natural Science Edition), 2011, 29(1): 5 -9 .
[3] YANG Li, KONG Ling-jiang. Capillary Force between Microparticles[J]. Journal of Guangxi Normal University(Natural Science Edition), 2012, 30(1): 1 -4 .
[4] HE Qing, LIU Jian, WEI Lianfu. Single-Photon Detectors as the Physical Limit Detections of Weak Electromagnetic Signals[J]. Journal of Guangxi Normal University(Natural Science Edition), 2022, 40(5): 1 -23 .
[5] BAI Ke-zhao, LUO Xu-dong, KONG Ling-jiang, LIU Mu-ren. Cellular Automaton Model of Date Transmission with Open Boundary Condition[J]. Journal of Guangxi Normal University(Natural Science Edition), 2010, 28(3): 1 -4 .
[6] XU Lun-hui, LIAO Ran-kun. Signal Phasing-Sequence Optimization of Intersection Based on Traffic Track[J]. Journal of Guangxi Normal University(Natural Science Edition), 2010, 28(3): 5 -9 .
[7] WANG Xiu-xin, QIN Li-mei, NONG Jing-hui, LIANG Zong-jin, ZHU Qi-jiang. Land Surface Temperature Retrieval with Mono-window Algorithm in Karst City[J]. Journal of Guangxi Normal University(Natural Science Edition), 2010, 28(3): 10 -14 .
[8] LI Yu-fang, ZHANG Jun-jian. Strong Consistency of the Regression Weighted Function Estimator for Negatively Associated Samples[J]. Journal of Guangxi Normal University(Natural Science Edition), 2010, 28(3): 15 -19 .
[9] JIA Bao-hua. A Strictly Stationary Associated Random Sequence Which Unsatisfythe Central Limit Theorem[J]. Journal of Guangxi Normal University(Natural Science Edition), 2010, 28(3): 20 -23 .
[10] CHEN Cui-ling, LI Ming, LIANG Jia-mei, LI Lüe. A Class of New Conjugate Gradient Method and Its Convergence Property Under the Wolfe Line Search[J]. Journal of Guangxi Normal University(Natural Science Edition), 2010, 28(3): 24 -28 .