Abstract
Evidence plays an extremely important role in legal proceedings, historical research, and diplomatic disputes. In recent years, more and more evidence data has been presented in the form of electronic data. Therefore, the extraction, organization, and validation of knowledge in electronic evidence also seem more and more important. In order to effectively organize the evidence data and construct the Chain of Evidence that can meet the practical needs, this paper uses Knowledge Graph based method to conduct relevance of evidence research. Firstly, through Knowledge Extraction, Knowledge Fusion, Knowledge Reasoning, the evidence data Knowledge Graph is constructed. After that, the Chain of Evidence will be built through evidence correlation and evidence influence evaluation, and finally different forms of knowledge presentation are carried out for different users. In this paper, the work and process of evidence chain association based on knowledge map are introduced, and the possible research direction in the future is prospected.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Yih, S.W., Chang, M.W., He, X., et al.: Semantic parsing via staged query graph generation: question answering with knowledge base (2015)
Blanco, R., Boldi, P., Marino, A.: Using graph distances for named-entity linking. Sci. Comput. Program. 130, 24–36 (2016)
Lin, Y., Liu, Z., Sun, M., et al.: Learning entity and relation embeddings for knowledge graph completion. In: Twenty-Ninth AAAI Conference on Artificial Intelligence (2015)
Ji, G., Liu, K., He, S., et al.: Knowledge graph completion with adaptive sparse transfer matrix. In: Thirtieth AAAI Conference on Artificial Intelligence (2016)
Farber, D.: Microsoft’s Bing Seeks Enlightenment with Satori. Cnet. CBS Interactive Inc. (2013)
Khan, Z.C., Mashiane, T.: An analysis of Facebook’s graph search. In: 2014 Information Security for South Africa, pp. 1–8. IEEE (2014)
Wang, C., Ma, X., Chen, J., et al.: Information extraction and knowledge graph construction from geoscience literature. Comput. Geosci. 112, 112–120 (2018)
Rospocher, M., van Erp, M., Vossen, P., et al.: Building event-centric knowledge graphs from news. J. Web Semant. 37, 132–151 (2016)
Bordes, A., Gabrilovich, E.: Constructing and mining web-scale knowledge graphs: KDD 2014 tutorial. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, p. 1967. ACM (2014)
Niu, B., Huang, Y.: An improved method for web text affective cognition computing based on knowledge graph. CMC-Comput. Mater. Continua 59(1), 1–14 (2019)
Panesar-Walawege, R.K., Sabetzadeh, M., Briand, L., et al.: Characterizing the chain of evidence for software safety cases: a conceptual model based on the IEC 61508 standard. In: 2010 Third International Conference on Software Testing, Verification and Validation, pp. 335–344. IEEE (2010)
Ahmad, A.: The forensic chain of evidence model: improving the process of evidence collection in incident handling procedures. In: The 6th Pacific Asia Conference on Information Systems (2002)
Hayes, F., Spurgeon, D.J., Lofts, S., et al.: Evidence-based logic chains demonstrate multiple impacts of trace metals on ecosystem services. J. Environ. Manag. 223, 150–164 (2018)
Cosic, J., Cosic, G., Ćosić, J., et al.: Chain of custody and life cycle of digital evidence. Comput. Technol. Appl. 3, 126–129 (2012)
Alobaidi, M., Malik, K.M., Hussain, M.: Automated ontology generation framework powered by linked biomedical ontologies for disease-drug domain. Comput. Methods Programs Biomed. 165, 117–128 (2018)
Bravo, M., Reyes-Ortiz, J.A., Cruz-Ruiz, I., et al.: Ontology for academic context reasoning. Procedia Comput. Sci. 141, 175–182 (2018)
Jiang, M., Chen, Y., Liu, M., et al.: A study of machine-learning-based approaches to extract clinical entities and their assertions from discharge summaries. J. Am. Med. Inform. Assoc. 18(5), 601–606 (2011)
Lei, J., Tang, B., Lu, X., et al.: A comprehensive study of named entity recognition in Chinese clinical text. J. Am. Med. Inform. Assoc. 21(5), 808–814 (2013)
Lample, G., Ballesteros, M., Subramanian, S., et al.: Neural architectures for named entity recognition. In: Proceedings of NAACL-HLT, pp. 260–270 (2016)
Ma, X., Hovy, E.: End-to-end sequence labeling via bi-directional LSTM-CNNs-CRF. arXiv preprint arXiv:1603.01354 (2016)
Cifariello, P., Ferragina, P., Ponza, M.: Wiser: a semantic approach for expert finding in academia based on entity linking. Inf. Syst. 82, 1–16 (2019)
Huang, D., Wang, J.: An approach on Chinese microblog entity linking combining baidu encyclopaedia and word2vec. Procedia Comput. Sci. 111, 37–45 (2017)
Hobbs, J.R.: Resolving pronoun references. Lingua 44(4), 311–338 (1978)
Denis, P., Baldridge, J.: Joint determination of anaphoricity and coreference resolution using integer programming. In: Human Language Technologies 2007: The Conference of the North American Chapter of the Association for Computational Linguistics; Proceedings of the Main Conference, pp. 236–243 (2007)
Lu, W., Meng, F., Wang, S., et al.: Graph-based chinese word sense disambiguation with multi-knowledge integration. Comput. Mater. Continua 61(1), 197–212 (2019)
Xie, R., Liu, Z., Jia, J., et al.: Representation learning of knowledge graphs with entity descriptions. In: Thirtieth AAAI Conference on Artificial Intelligence (2016)
Yang, K., Tan, T., Zhang, W.: An evidence combination method based on DBSCAN clustering. Comput. Mater. Continua 57(2), 269–281 (2018)
Grover, A., Leskovec, J.: node2vec: scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 855–864. ACM (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Liu, Y., Shi, J., Han, J., Lu, M. (2020). Research on Chain of Evidence Based on Knowledge Graph. In: Sun, X., Wang, J., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2020. Lecture Notes in Computer Science(), vol 12240. Springer, Cham. https://doi.org/10.1007/978-3-030-57881-7_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-57881-7_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-57880-0
Online ISBN: 978-3-030-57881-7
eBook Packages: Computer ScienceComputer Science (R0)