2019
DOI: 10.1016/j.eswa.2019.03.045
|View full text |Cite
|
Sign up to set email alerts
|

SummCoder: An unsupervised framework for extractive text summarization based on deep auto-encoders

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
60
0
6

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 122 publications
(66 citation statements)
references
References 21 publications
0
60
0
6
Order By: Relevance
“…An extractive approach based on event graph [41] used human crafted rules for generation of multidocument summary. Recently, the emergence of deep learning (DL) and reinforcement learning (RL) approaches [42][43][44][45] has gained attention of researchers, and their capabilities are exploited to enhance the text summarization task. However, the networks based on DL/RL need training on large amount of human crafted summaries, which are not easily available.…”
Section: Related Workmentioning
confidence: 99%
“…An extractive approach based on event graph [41] used human crafted rules for generation of multidocument summary. Recently, the emergence of deep learning (DL) and reinforcement learning (RL) approaches [42][43][44][45] has gained attention of researchers, and their capabilities are exploited to enhance the text summarization task. However, the networks based on DL/RL need training on large amount of human crafted summaries, which are not easily available.…”
Section: Related Workmentioning
confidence: 99%
“…Consider the topic 't' is incorrect to the other word in the document which is allocated as correct topic for each word in the web documents. 4. Find the probability of correctness across the topics 5.…”
Section: Topic Modelermentioning
confidence: 99%
“…These information are available in multiple webpages which are referring to a similar topic. This leads, the researchers and industrialist to consider the multi-document summarization to produce summary from multiple documents [4]. Summaries can likewise be sorted as either nonexclusive or question highlighted [5].…”
Section: Introductionmentioning
confidence: 99%
“…Different research efforts have been made to monitor Tor domains, and insights gained have been used to develop techniques that allow for the supervision of suspicious activities. These techniques range from solutions based on Natural Language Processing [ 15 , 16 ], to Computer Vision [ 17 , 18 ] or Graph Theory [ 19 , 20 ].…”
Section: Introductionmentioning
confidence: 99%