• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Ma Xinyu, Fan Yixing, Guo Jiafeng, Zhang Ruqing, Su Lixin, Cheng Xueqi. An Empirical Investigation of Generalization and Transfer in Short Text Matching[J]. Journal of Computer Research and Development, 2022, 59(1): 118-126. DOI: 10.7544/issn1000-1239.20200626
Citation: Ma Xinyu, Fan Yixing, Guo Jiafeng, Zhang Ruqing, Su Lixin, Cheng Xueqi. An Empirical Investigation of Generalization and Transfer in Short Text Matching[J]. Journal of Computer Research and Development, 2022, 59(1): 118-126. DOI: 10.7544/issn1000-1239.20200626

An Empirical Investigation of Generalization and Transfer in Short Text Matching

Funds: This work was supported by the National Natural Science Foundation of China (61722211, 61773362, 61872338, 62006218, 61902381), the National Key Research and Development Program of China (2016QY02D0405), the Project of Beijing Academy of Artificial Intelligence (BAAI2019ZD0306), the Youth Innovation Promotion Association CAS (20144310, 2016102), the Project of Chongqing Research Program of Basic Research and Frontier Technology (cstc2017jcyjBX0059), the K.C.Wong Education Foundation, and the Lenovo-CAS Joint Lab Youth Scientist Project.
More Information
  • Published Date: December 31, 2021
  • Many tasks in natural language understanding, such as natural language inference, question answering, and paraphrasing can be viewed as short text matching problems. Recently, the emergence of a large number of datasets and deep learning models has made great success in short text matching. However, little study has been done on analyzing the generalization of these datasets across different text matching tasks, and how to leverage these supervised datasets of multiple domains to new domains to reduce the cost of annotating and improve their performance. In this paper, we conduct an extensive investigation of generalization and transfer across different datasets and show the factors that affect the generalization through visualization. Specially, we experiment with a conventional neural semantic matching model ESIM (enhanced sequential inference model) and a pre-trained language model BERT (bidirectional encoder representations from transformers) over 10 common datasets. We show that even BERT which is pre-trained on a large-scale dataset can still improve performance on the target dataset through transfer learning. Following our analysis, we also demonstrate that pre-training on multiple datasets shows good generalization and transfer. In the case of a new domain and few-shot setting, BERT which we pre-train on the multiple datasets first and then transfers to new datasets achieves exciting performance.
  • Related Articles

    [1]Bai Lifang, Zhu Yuefei, Li Yongjun, Wang Shuai, Yang Xiaoqi. Research Progress of Fully Homomorphic Encryption[J]. Journal of Computer Research and Development, 2024, 61(12): 3069-3087. DOI: 10.7544/issn1000-1239.202221052
    [2]Zhao Xiufeng, Fu Yu, Song Weitao. Circular Secure Homomorphic Encryption Scheme[J]. Journal of Computer Research and Development, 2020, 57(10): 2117-2124. DOI: 10.7544/issn1000-1239.2020.20200422
    [3]Wei Lifei, Chen Congcong, Zhang Lei, Li Mengsi, Chen Yujiao, Wang Qin. Security Issues and Privacy Preserving in Machine Learning[J]. Journal of Computer Research and Development, 2020, 57(10): 2066-2085. DOI: 10.7544/issn1000-1239.2020.20200426
    [4]Yao Hailong, Wang Caifen, Xu Qinbai, Li Wenting. A Distributed Biometric Authentication Protocol Based on Homomorphic Encryption[J]. Journal of Computer Research and Development, 2019, 56(11): 2375-2383. DOI: 10.7544/issn1000-1239.2019.20190293
    [5]Song Lei, Ma Chunguang, Duan Guanghan, Yuan Qi. Privacy-Preserving Logistic Regression on Vertically Partitioned Data[J]. Journal of Computer Research and Development, 2019, 56(10): 2243-2249. DOI: 10.7544/issn1000-1239.2019.20190414
    [6]Xu Wenyu, Wu Lei, Yan Yunxue. Privacy-Preserving Scheme of Electronic Health Records Based on Blockchain and Homomorphic Encryption[J]. Journal of Computer Research and Development, 2018, 55(10): 2233-2243. DOI: 10.7544/issn1000-1239.2018.20180438
    [7]Yang Xiaoyuan, Zhou Tanping, Zhang Wei, Wu Liqiang. Application of a Circular Secure Variant of LWE in the Homomorphic Encryption[J]. Journal of Computer Research and Development, 2015, 52(6): 1389-1393. DOI: 10.7544/issn1000-1239.2015.20131952
    [8]Li Shundong, Dou Jiawei, Wang Daoshun. Survey on Homomorphic Encryption and Its Applications to Cloud Security[J]. Journal of Computer Research and Development, 2015, 52(6): 1378-1388. DOI: 10.7544/issn1000-1239.2015.20131494
    [9]Liu Mingjie, Wang An. Fully Homomorphic Encryption and Its Applications[J]. Journal of Computer Research and Development, 2014, 51(12): 2593-2603. DOI: 10.7544/issn1000-1239.2014.20131168
    [10]Qiang Weizhong, Zou Deqing, and Jin Hai. Research on Privacy Preservation Mechanism for Credentials and Policies in Grid Computing Environment[J]. Journal of Computer Research and Development, 2007, 44(1): 11-19.
  • Cited by

    Periodical cited type(3)

    1. 吴树芳,尹凯,吴汭漩,朱杰. 融入隐式情感和主题增强分布的网络敏感信息深度识别研究. 情报科学. 2024(05): 111-119 .
    2. 王梓宁,张国防. 考虑多交互关系与情感倾向的微博用户可信度评估算法. 计算机应用研究. 2024(10): 3000-3007 .
    3. 吕飞,王帅. 城市空间网红化现象测度及影响因素研究. 城市问题. 2023(12): 50-59 .

    Other cited types(5)

Catalog

    Article views (575) PDF downloads (344) Cited by(8)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return