Is BERT Really Robust? a Strong Baseline for Natural Language Attack on Text Classification and Entailment

Total Page:16

File Type:pdf, Size:1020Kb

Is BERT Really Robust? a Strong Baseline for Natural Language Attack on Text Classification and Entailment The Thirty-Fourth AAAI Conference on Artificial Intelligence (AAAI-20) Is BERT Really Robust? A Strong Baseline for Natural Language Attack on Text Classification and Entailment Di Jin,1∗ Zhijing Jin,2∗ Joey Tianyi Zhou,3 Peter Szolovits1 1Computer Science & Artificial Intelligence Laboratory, MIT 2University of Hong Kong 3A*STAR, Singapore {jindi15, psz}@mit.edu, [email protected], [email protected] Abstract deal with text data due to its discrete nature. Formally, be- sides the ability to fool the target models, outputs of a natural Machine learning algorithms are often vulnerable to adver- sarial examples that have imperceptible alterations from the language attacking system should also meet three key utility- original counterparts but can fool the state-of-the-art mod- preserving properties: (1) human prediction consistency— els. It is helpful to evaluate or even improve the robustness prediction by humans should remain unchanged, (2) seman- of these models by exposing the maliciously crafted adver- tic similarity—the crafted example should bear the same sarial examples. In this paper, we present TEXTFOOLER,a meaning as the source, as judged by humans, and (3) lan- simple but strong baseline to generate adversarial text. By guage fluency—generated examples should look natural and applying it to two fundamental natural language tasks, text grammatical. Previous works barely conform to all three classification and textual entailment, we successfully attacked requirements. For example, methods such as word mis- three target models, including the powerful pre-trained BERT, spelling (Li et al. 2018; Gao et al. 2018), single-word era- and the widely used convolutional and recurrent neural net- sure (Li, Monroe, and Jurafsky 2016), and phrase insertion works. We demonstrate three advantages of this framework: (1) effective—it outperforms previous attacks by success rate and removal (Liang et al. 2017) result in unnatural sen- and perturbation rate, (2) utility-preserving—it preserves se- tences. Moreover, there is almost no work that attacks the mantic content, grammaticality, and correct types classified newly-risen BERT model on text classification. by humans, and (3) efficient—it generates adversarial text In this work, we present TEXTFOOLER, a simple but with computational complexity linear to the text length.1 strong baseline for natural language attack in the black- box setting, a common case where no model architecture or parameters are accessible. We design a more comprehen- Introduction sive paradigm to create both semantically and syntactically In the last decade, Machine Learning (ML) models have similar adversarial examples that meet the aforementioned achieved remarkable success in various tasks such as classi- three desiderata. Specifically, we first identify the impor- fication, regression and decision making. However, recently tant words for the target model and then prioritize to replace they have been found vulnerable to adversarial examples that them with the most semantically similar and grammatically are legitimate inputs altered by small and often impercepti- correct words until the prediction is altered. We successfully ble perturbations (Kurakin, Goodfellow, and Bengio 2016a; applied this framework to attack three state-of-the-art mod- 2016b; Papernot et al. 2017; Zhao, Dua, and Singh 2017). els in five text classification tasks and two textual entailment These carefully curated examples are correctly classified by tasks, respectively. On the adversarial examples, we can re- a human observer but can fool a target model, raising seri- duce the accuracy of almost all target models in all tasks to ous concerns regarding the security and integrity of existing below 10% with only less than 20% of the original words ML algorithms. On the other hand, it is showed that robust- perturbed. In addition, we validate that the generated exam- ness and generalization of ML models can be improved by ples are (1) correctly classified by human evaluators, (2) se- crafting high-quality adversaries and including them in the mantically similar to the original text, and (3) grammatically training data (Goodfellow, Shlens, and Szegedy 2015). acceptable by human judges. While existing works on adversarial examples have ob- Our main contributions are summarized as follows: tained success in the image and speech domains (Szegedy et • al. 2013; Carlini and Wagner 2018), it is still challenging to We propose a simple but strong baseline, TEXTFOOLER, to quickly generate high-profile utility-preserving adver- ∗Equal Contribution. Order determined by swapping that in the sarial examples that force the target models to make previous paper at https://arxiv.org/abs/1901.11333. wrong predictions under the black-box setting. Copyright c 2020, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. • We evaluate TEXTFOOLER on three state-of-the-art deep 1The code, pre-trained target models, and test examples are learning models over five popular text classification tasks available at https://github.com/jind11/TextFooler. and two textual entailment tasks, and it achieved the state- 8018 of-the-art attack success rate and perturbation rate. Algorithm 1 Adversarial Attack by TEXTFOOLER • We propose a comprehensive four-way automatic and Input: Sentence example X = {w1,w2, ..., wn}, the corre- three-way human evaluation of language adversarial at- sponding ground truth label Y , target model F , sentence tacks to evaluate the effectiveness, efficiency, and utility- similarity function Sim, sentence similarity threshold , preserving properties of our system. word embeddings Emb over the vocabulary Vocab. Output: Adversarial example Xadv • We open-source the code, pre-trained target models, and 1: Initialization: Xadv ← X test samples for the convenience of future benchmarking. 2: for each word wi in X do I 3: Compute the importance score wi via Eq.2 Method 4: end for Problem Formulation 5: 6: Create a set W of all words wi ∈ X sorted by the de- N X {X ,X ,...,X } Given a corpus of sentences = 1 2 N , scending order of their importance score Iw . N Y {Y ,Y ,...,Y } i and a corresponding set of labels = 1 2 N , 7: Filter out the stop words in W . F X→Y we have a pre-trained model : , which maps the 8: for each word wj in W do X Y input text space to the label space . 9: Initiate the set of candidates CANDIDATES by ex- For a sentence X ∈X, a valid adversarial example Xadv N Emb tracting the top synonyms using CosSim( wj , should conform to the following requirements: Embword) for each word in Vocab. 10: CANDIDATES ← POSFilter(CANDIDATES) 11: FINCANDIDATES ←{} F (Xadv) = F (X), and Sim(Xadv,X) ≥ , (1) 12: for ck in CANDIDATES do X ← w c X where Sim : X×X→(0, 1) is a similarity function 13: Replace j with k in adv Sim X,X > and is the minimum similarity between the original and 14: if ( adv) then c adversarial examples. In the natural language domain, Sim 15: Add k to the set FINCANDIDATES Y ← F X is often a semantic and syntactic similarity function. 16: k ( ) P ← F X 17: k Yk ( ) Threat Model 18: end if 19: end for Under the black-box setting, the attacker is not aware of the 20: if there exists ck whose prediction result Yk = Y model architecture, parameters, or training data. It can only then query the target model with supplied inputs, getting as re- 21: In FINCANDIDATES, only keep the candidates ck sults the predictions and corresponding confidence scores. whose prediction result Yk = Y The proposed approach for adversarial text generation is c∗ ← Sim X, X 22: argmax ( wj →c) c∈FINCANDIDATES shown in Algorithm 1, and consists of the two main steps: ∗ 23: Xadv ← Replace wj with c in Xadv Step 1: Word Importance Ranking (line 1-6) Given a 24: return Xadv n X {w ,w ,...,w } P X > P sentence of words = 1 2 n , we observe 25: else if Yk ( adv) min k then ck∈FINCANDIDATES that only some key words act as influential signals for the c∗ ← P F 26: argmin k prediction model , echoing with the discovery of (Niven ck∈FINCANDIDATES ∗ and Kao 2019) that BERT attends to the statistical cues of 27: Xadv ← Replace wj with c in Xadv some words. Therefore, we create a selection mechanism to 28: end if choose the words that most significantly influence the final 29: end for prediction results. Using this selection process, we minimize 30: return None the alterations, and thus maintain the semantic similarity as much as possible. Note that the selection of important words is trivial in a white-box scenario, as it can be easily solved by inspecting F ⎧ the gradients of the model , while most other words are F (X) − F (X ), F (X)=F (X )=Y ⎨ Y Y \wi if \wi irrelevant. However, under the more common black-box set I = (F (X) − F (X )) + (F (X ) − F (X)), wi Y Y \wi Y¯ \wi Y¯ up in our paper, the model gradients are unavailable. There- ⎩ ¯ ¯ if F (X)=Y,F(X\w )=Y, and Y = Y. fore, we create a selection mechanism as follows. We use i I (2) the score wi to measure the influence of a word wi ∈ X towards the classification result F (X)=Y . We denote the After ranking the words by their importance score, we fur- ther filter out stop words derived from NLTK2 and spaCy3 sentence after deleting the word wi as X\w = X \{wi} = i libraries such as “the”, “when”, and “none”. This simple step {w1,...,wi−1,wi+1,...wn}, and use FY (·) to represent of filtering is important to avoid grammar destruction. the prediction score for the Y label. I The importance score wi is therefore calculated as the prediction change before and after deleting the word wi, 2https://www.nltk.org/ which is formally defined as follows, 3https://spacy.io/ 8019 Step 2: Word Transformer (line 7-30) For a given word diction of the target model is altered.
Recommended publications
  • Are Annotators' Word-Sense-Disambiguation
    J. Hlavácovᡠ(Ed.): ITAT 2017 Proceedings, pp. 5–14 CEUR Workshop Proceedings Vol. 1885, ISSN 1613-0073, c 2017 S. Cinková, A. Vernerová Are Annotators’ Word-Sense-Disambiguation Decisions Affected by Textual Entailment between Lexicon Glosses? Silvie Cinková, Anna Vernerová Charles University, Faculty of Mathematics and Physics Institute of Formal and Applied Linguistics Malostranské námestíˇ 25 118 00 Praha 1 Czech Republic ufal.mff.cuni.cz {cinkova,vernerova}@ufal.mff.cuni.cz Abstract: We describe an annotation experiment com- verb on the one hand, and those related to the lexicograph- bining topics from lexicography and Word Sense Disam- ical design of PDEV, such as semantic relations between biguation. It involves a lexicon (Pattern Dictionary of En- implicatures within a lemma or denotative similarity of the glish Verbs, PDEV), an existing data set (VPS-GradeUp), verb arguments, on the other hand (see Section 3 for defi- and an unpublished data set (RTE in PDEV Implicatures). nitions and examples). The aim of the experiment was twofold: a pilot annota- This paper focuses on a feature related to PDEV’s de- tion of Recognizing Textual Entailment (RTE) on PDEV sign (see Section 2.3), namely on textual entailment be- implicatures (lexicon glosses) on the one hand, and, on tween implicatures in pairs of patterns of the same lemma the other hand, an analysis of the effect of Textual Entail- entry (henceforth colempats, see Section 3.1 for definition ment between lexicon glosses on annotators’ Word-Sense- and more detail). Disambiguation decisions, compared to other predictors, We pairwise compare all colempats, examining their such as finiteness of the target verb, the explicit presence scores in the graded decision annotation with respect to of its relevant arguments, and the semantic distance be- how much they compete to become the most appropriate tween corresponding syntactic arguments in two different pattern, as well as the scores of presence of textual entail- patterns (dictionary senses).
    [Show full text]
  • Textual Inference for Machine Comprehension Martin Gleize
    Textual Inference for Machine Comprehension Martin Gleize To cite this version: Martin Gleize. Textual Inference for Machine Comprehension. Computation and Language [cs.CL]. Université Paris Saclay (COmUE), 2016. English. NNT : 2016SACLS004. tel-01317577 HAL Id: tel-01317577 https://tel.archives-ouvertes.fr/tel-01317577 Submitted on 18 May 2016 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Le cas échéant, logo de l’établissement co-délivrant le doctorat en cotutelle internationale de thèse , sinon mettre le logo de l’établissement de préparation de la thèse (UPSud, HEC, UVSQ, UEVE, ENS Cachan, Polytechnique, IOGS, …) NNT : 2016SACLS004 THÈSE DE DOCTORAT DE L’UNIVERSITÉ PARIS-SACLAY PRÉPARÉE À L'UNIVERSITÉ PARIS-SUD ECOLE DOCTORALE N° 580 Sciences et technologies de l'information et de la communication (STIC) Spécialité de doctorat : Informatique Par M. Martin Gleize Textual Inference for Machine Comprehension Thèse présentée et soutenue à Orsay, le 7 janvier 2016 Composition du Jury : M. Yvon François Professeur, Université Paris-Sud Président, Examinateur Mme Gardent Claire Directeur de recherche CNRS, LORIA Rapporteur M. Magnini Bernardo Senior Researcher, FBK Rapporteur M. Piwowarski Benjamin Chargé de recherche CNRS, LIP6 Examinateur Mme Grau Brigitte Professeur, ENSIIE Directeur de thèse Abstract With the ever-growing mass of published text, natural language understanding stands as one of the most sought-after goal of artificial intelligence.
    [Show full text]
  • Repurposing Entailment for Multi-Hop Question Answering Tasks
    Repurposing Entailment for Multi-Hop Question Answering Tasks Harsh Trivedi|, Heeyoung Kwon|, Tushar Khot♠, Ashish Sabharwal♠, Niranjan Balasubramanian| | Stony Brook University, Stony Brook, U.S.A. fhjtrivedi,heekwon,[email protected] ♠ Allen Institute for Artificial Intelligence, Seattle, U.S.A. ftushark,[email protected] Abstract Question Answering (QA) naturally reduces to an entailment problem, namely, verifying whether some text entails the answer to a ques- tion. However, for multi-hop QA tasks, which require reasoning with multiple sentences, it remains unclear how best to utilize entailment models pre-trained on large scale datasets such as SNLI, which are based on sentence pairs. We introduce Multee, a general architecture Figure 1: An example illustrating the challenges in us- that can effectively use entailment models for ing sentence-level entailment model for multi-sentence multi-hop QA tasks. Multee uses (i) a local reasoning needed for QA, and the high-level approach module that helps locate important sentences, used in Multee. thereby avoiding distracting information, and level, whereas question answering requires verify- (ii) a global module that aggregates informa- ing whether multiple sentences, taken together as tion by effectively incorporating importance weights. Importantly, we show that both mod- a premise, entail a hypothesis. ules can use entailment functions pre-trained There are two straightforward ways to address on a large scale NLI datasets. We evaluate per- this mismatch: (1) aggregate independent entail- formance on MultiRC and OpenBookQA, two ment decisions over each premise sentence, or (2) multihop QA datasets. When using an entail- make a single entailment decision after concate- ment function pre-trained on NLI datasets, nating all premise sentences.
    [Show full text]
  • Techniques for Recognizing Textual Entailment and Semantic Equivalence
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by EPrints Complutense Techniques for Recognizing Textual Entailment and Semantic Equivalence Jes´us Herrera, Anselmo Pe˜nas, Felisa Verdejo Departamento de Lenguajes y Sistemas Inform´aticos Universidad Nacional de Educaci´ona Distancia Madrid, Spain {jesus.herrera, anselmo, felisa}@lsi.uned.es Abstract. After defining what is understood by textual entailment and semantic equivalence, the present state and the desirable future of the systems aimed at recognizing them is shown. A compilation of the currently implemented techniques in the main Recognizing Textual Entailment and Semantic Equivalence systems is given. 1 Introduction The concept “textual entailment” is used to indicate the state in which the semantics of a natural language written text can be inferred from the semantics of another one. More specifically, if the truth of an enunciation entails the truth of another enunciation. For example, given the texts: 1. The three-day G8 meeting will take place in Scotland. 2. The Group of Eight summit will last three days. it is clear that the semantics of the second one can be inferred from the semantics of the first one; then, it is said that textual entailment exists between both texts. Textual entailment is a directional relationship: in the example above, the first statement entails the second one, but this entailment is not given in the opposite direction. The recognition of textual entailment requires a processing at the lexical level (for example, synonymy between meeting and summit or between G8 and Group of Eight), as well as at the syntactic level and the sentence semantic level.
    [Show full text]
  • Automatic Evaluation of Summary Using Textual Entailment
    Automatic Evaluation of Summary Using Textual Entailment Pinaki Bhaskar Partha Pakray Department of Computer Science & Department of Computer Science & Engineering, Jadavpur University, Engineering, Jadavpur University, Kolkata – 700032, India Kolkata – 700032, India [email protected] [email protected] summary is very much needed when a large Abstract number of summaries have to be evaluated, spe- cially for multi-document summaries. For sum- This paper describes about an automatic tech- mary evaluation we have developed an automat- nique of evaluating summary. The standard ed evaluation technique based on textual entail- and popular summary evaluation techniques or ment. tools are not fully automatic; they all need Recognizing Textual Entailment (RTE) is one some manual process. Using textual entail- of the recent research areas of Natural Language ment (TE) the generated summary can be evaluated automatically without any manual Processing (NLP). Textual Entailment is defined evaluation/process. The TE system is the as a directional relationship between pairs of text composition of lexical entailment module, lex- expressions, denoted by the entailing “Text” (T) ical distance module, Chunk module, Named and the entailed “Hypothesis” (H). T entails H if Entity module and syntactic text entailment the meaning of H can be inferred from the mean- (TE) module. The syntactic TE system is ing of T. Textual Entailment has many applica- based on the Support Vector Machine (SVM) tions in NLP tasks, such as Summarization, In- that uses twenty five features for lexical simi- formation Extraction, Question Answering, In- larity, the output tag from a rule based syntac- formation Retrieval. tic two-way TE system as a feature and the outputs from a rule based Chunk Module and 2 Related Work Named Entity Module as the other features.
    [Show full text]
  • Dependency-Based Textual Entailment
    Dependency-based Textual Entailment Vasile Rus Department of Computer Science Institute for Intelligent Systems The University of Memphis Memphis, TN 38120, USA [email protected] Abstract and Hypothesis are mapped into two sets of dependen- cies: the T-set and H-set, respectively. A score is then This paper studies the role of dependency information computed that measures the degree to which the depen- for the task of textual entailment. Both the Text and Hypothesis of an entailment pair are mapped into sets dencies in the H-set are present in the T-set. Based on of dependencies and a score is computed that measures the score, an entailment decision is made. Dependen- the similarity of the two sets. Based on the score an cies are labelled relations among words in a sentence. entailment decision is made. Two experiments are con- For example, there is a subj dependency between cap- ducted to measure the impact of dependencies on the ital and Besancon in the previous example which we entailment task. In one experiment we compare the represent as the triplet (subj, capital, Besancon). The dependency-based approach with a baseline approach first term in the triplet is the name or label of the re- on a standard data set. In a second experiment, we lation, the second term represents the head word, and measure the performance on a subset of the standard the last term is the dependent word. We use MINIPAR data set. The subset is so selected to minimize the (Lin 1998), an automated dependency parser, as our effect of other factors, such as word-level information, in the performance measurement process.
    [Show full text]
  • Parser Evaluation Using Textual Entailments
    Language Resources and Evaluation manuscript No. (will be inserted by the editor) Parser Evaluation Using Textual Entailments Deniz Yuret · Laura Rimell · Aydın Han Received: date / Accepted: date Abstract Parser Evaluation using Textual Entailments (PETE) is a shared task in the SemEval-2010 Evaluation Exercises on Semantic Evaluation. The task involves recognizing textual entailments based on syntactic information alone. PETE introduces a new parser evaluation scheme that is formalism independent, less prone to annotation error, and focused on semantically rele- vant distinctions. This paper describes the PETE task, gives an error analysis of the top-performing Cambridge system, and introduces a standard entail- ment module that can be used with any parser that outputs Stanford typed dependencies. Keywords Parsing · Textual Entailments 1 Introduction Parser Evaluation using Textual Entailments (PETE) is a shared task in the SemEval-2010 Evaluation Exercises on Semantic Evaluation that involves rec- ognizing textual entailments to evaluate parser performance. Given two text Deniz Yuret and Aydın Han Ko¸cUniversity Rumelifeneri Yolu 34450 Sarıyer, Istanbul,˙ Turkey Tel.: +90-212-338-1724 Fax: +90-212-338-1548 E-mail: dyuret,[email protected] Laura Rimell Computer Laboratory William Gates Building 15 JJ Thomson Avenue Cambridge CB3 0FD, UK Tel.: +44 (0)1223 334696 E-mail: [email protected] 2 Deniz Yuret et al. fragments called “text” (T) and “hypothesis” (H), recognizing textual entail- ment (RTE) is the task of determining whether the meaning of the hypothesis is entailed (can be inferred) from the text. In contrast to general RTE tasks (Dagan et al 2009) PETE is a targeted textual entailment task that focuses on syntactic entailments: Text: The man with the hat was tired.
    [Show full text]
  • Textual Entailment Recognition Based on Dependency Analysis and Wordnet
    Textual Entailment Recognition Based on Dependency Analysis and WordNet Jesus´ Herrera, Anselmo Penas,˜ Felisa Verdejo Departamento de Lenguajes y Sistemas Informaticos´ Universidad Nacional de Educacion´ a Distancia Madrid, Spain jesus.herrera, anselmo, felisa @lsi.uned.es f g Abstract. The Recognizing Textual Entailment System shown here is based on the use of a broad-coverage parser to extract dependency relationships; in addi- tion, WordNet relations are used to recognize entailment at the lexical level. The work investigates whether the mapping of dependency trees from text and hy- pothesis give better evidence of entailment than the matching of plain text alone. While the use of WordNet seems to improve system's performance, the notion of mapping between trees here explored (inclusion) shows no improvement, sug- gesting that other notions of tree mappings should be explored such as tree edit distances or tree alignment distances. 1 Introduction Textual Entailment Recognition (RTE) aims at deciding whether the truth of a text en- tails the truth of another text called hypothesis. This concept has been the basis for the PASCAL1 RTE Challenge [3]. The system presented here is aimed at validating the hypothesis that (i) a certain amount of semantic information could be extracted from texts by means of the syntactic structure given by a dependency analysis, and that (ii) lexico-semantic information such as WordNet relations can improve RTE. In short, the techniques involved in this system are the following: – Dependency analysis of texts and hypothesises. – Lexical entailment between dependency tree nodes using WordNet. – Mapping between dependency trees based on the notion of inclusion.
    [Show full text]
  • A Probabilistic Classification Approach for Lexical Textual Entailment
    A Probabilistic Classification Approach for Lexical Textual Entailment Oren Glickman and Ido Dagan and Moshe Koppel Computer Science Department , Bar Ilan University Ramat-Gan, 52900, Iarael {glikmao, dagan, koppel}@cs.biu.ac.il Abstract The uncertain nature of textual entailment calls for its The textual entailment task – determining if a given text explicit modeling in probabilistic terms. In this paper we entails a given hypothesis – provides an abstraction of first propose a general generative probabilistic setting for applied semantic inference. This paper describes first a textual entailment. This probabilistic framework may be general generative probabilistic setting for textual considered analogous to (though different than) the entailment. We then focus on the sub-task of recognizing probabilistic setting defined for other phenomena, like whether the lexical concepts present in the hypothesis are language modeling and statistical machine translation. entailed from the text. This problem is recast as one of text Obviously, such frameworks are needed to allow for categorization in which the classes are the vocabulary principled (fuzzy) modeling of the relevant language words. We make novel use of Naïve Bayes to model the problem in an entirely unsupervised fashion. Empirical tests phenomenon, compared to utilizing ad-hoc ranking scores suggest that the method is effective and compares favorably which have no clear probabilistic interpretation. We with state-of-the-art heuristic scoring approaches. suggest that the proposed setting may provide a unifying framework for modeling uncertain semantic inferences from texts. Introduction An important sub task of textual entailment, which we term lexical entailment , is recognizing if the concepts in a Many Natural Language Processing (NLP) applications hypothesis h are entailed from a given text t, even if the need to recognize when the meaning of one text can be relations between these concepts may not be entailed from expressed by, or inferred from, another text.
    [Show full text]
  • Frame Semantics Annotation Made Easy with Dbpedia
    Frame Semantics Annotation Made Easy with DBpedia Marco Fossati, Sara Tonelli, and Claudio Giuliano ffossati, satonelli, [email protected] Fondazione Bruno Kessler - via Sommarive, 18 - 38123 Trento, Italy Abstract. Crowdsourcing techniques applied to natural language pro- cessing have recently experienced a steady growth and represent a cheap and fast, albeit valid, solution to create benchmarks and training data. Nevertheless, some particularly complex tasks such as semantic role an- notation have been rarely conducted in a crowdsourcing environment, due to their intrinsic difficulty. In this paper, we present a novel ap- proach to accomplish this task by leveraging information automatically extracted from DBpedia. We show that replacing role definitions, typi- cally meant for expert annotators, with a list of DBpedia types, makes the identification and assignment of role labels more intuitive also for non-expert workers. Results prove that such strategy improves on the standard annotation workflow, both in terms of accuracy and of time consumption. Keywords: Natural Language Processing, Frame Semantics, En- tity Linking, DBpedia, Crowdsourcing, Task Modeling 1 Introduction Frame semantics [6] is one of the theories that originate from the long strand of linguistic research in artificial intelligence. A frame can be informally defined as an event triggered by some term in a text and embedding a set of partic- ipants. For instance, the sentence Goofy has murdered Mickey Mouse evokes the Killing frame (triggered by murdered) together with the Killer and Vic- tim participants (respectively Goofy and Mickey Mouse). Such theory has led to the creation of FrameNet [2], namely an English lexical database containing manually annotated textual examples of frame usage.
    [Show full text]
  • Constructing a Textual Semantic Relation Corpus Using a Discourse Treebank
    Constructing a Textual Semantic Relation Corpus Using a Discourse Treebank Rui Wang and Caroline Sporleder Computational Linguistics Saarland University frwang,[email protected] Abstract In this paper, we present our work on constructing a textual semantic relation corpus by making use of an existing treebank annotated with discourse relations. We extract adjacent text span pairs and group them into six categories according to the different discourse relations between them. After that, we present the details of our annotation scheme, which includes six textual semantic relations, backward entailment, forward entailment, equality, contradiction, overlapping, and independent. We also discuss some ambiguous examples to show the difficulty of such annotation task, which cannot be easily done by an automatic mapping between discourse relations and semantic relations. We have two annotators and each of them performs the task twice. The basic statistics on the constructed corpus looks promising: we achieve 81.17% of agreement on the six semantic relation annotation with a .718 kappa score, and it increases to 91.21% if we collapse the last two labels with a .775 kappa score. 1. Introduction TRADICTION, and UNKNOWN. ENTAILMENT is the same Traditionally, the term ‘semantic relation’ refers to rela- as the previous YES; but NO is divided into CONTRADIC- tions that hold between the meanings of two words, e.g., TION and UNKNOWN, to differentiate cases where T and H synonymy, hypernymy, etc. These relations are usually are contradictory to each other from all the other cases. The situation-independent. Discourse relations, on the other RTE data are acquired from other natural language process- hand, tend to depend on the wider context of an utterance.
    [Show full text]
  • PATTY: a Taxonomy of Relational Patterns with Semantic Types
    PATTY: A Taxonomy of Relational Patterns with Semantic Types Ndapandula Nakashole, Gerhard Weikum, Fabian Suchanek Max Planck Institute for Informatics Saarbrucken,¨ Germany {nnakasho,weikum,suchanek}@mpi-inf.mpg.de Abstract Yet, existing large-scale knowledge bases are mostly limited to abstract binary relationships be- This paper presents PATTY: a large resource for textual patterns that denote binary relations tween entities, such as “bornIn” (Auer 2007; Bol- between entities. The patterns are semanti- lacker 2008; Nastase 2010; Suchanek 2007). These cally typed and organized into a subsumption do not correspond to real text phrases. Only the Re- taxonomy. The PATTY system is based on ef- Verb system (Fader 2011) yields a larger number of ficient algorithms for frequent itemset mining relational textual patterns. However, no attempt is and can process Web-scale corpora. It har- made to organize these patterns into synonymous nesses the rich type system and entity popu- patterns, let alone into a taxonomy. Thus, the pat- lation of large knowledge bases. The PATTY taxonomy comprises 350,569 pattern synsets. terns themselves do not exhibit semantics. Random-sampling-based evaluation shows a Goal. Our goal in this paper is to systematically pattern accuracy of 84.7%. PATTY has 8,162 compile relational patterns from a corpus, and to im- subsumptions, with a random-sampling-based pose a semantically typed structure on them. The precision of 75%. The PATTY resource is freely available for interactive access and result we aim at is a WordNet-style taxonomy of download. binary relations. In particular, we aim at patterns that contain semantic types, such as hsingeri sings 1 Introduction hsongi.
    [Show full text]