CN117556100A - Method, device, equipment and storage medium for generating audit tag configuration strategy - Google Patents

Method, device, equipment and storage medium for generating audit tag configuration strategy Download PDF

Info

Publication number
CN117556100A
CN117556100A CN202311583480.4A CN202311583480A CN117556100A CN 117556100 A CN117556100 A CN 117556100A CN 202311583480 A CN202311583480 A CN 202311583480A CN 117556100 A CN117556100 A CN 117556100A
Authority
CN
China
Prior art keywords
information
auditing
audit
model
tag configuration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311583480.4A
Other languages
Chinese (zh)
Inventor
周维聪
邱添羽
李航
史清江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Research Institute of Big Data SRIBD
Original Assignee
Shenzhen Research Institute of Big Data SRIBD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Research Institute of Big Data SRIBD filed Critical Shenzhen Research Institute of Big Data SRIBD
Priority to CN202311583480.4A priority Critical patent/CN117556100A/en
Publication of CN117556100A publication Critical patent/CN117556100A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/9032Query formulation
    • G06F16/90332Natural language query formulation or dialogue systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/33Querying
    • G06F16/3331Query processing
    • G06F16/334Query execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/58Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Computational Linguistics (AREA)
  • Artificial Intelligence (AREA)
  • Software Systems (AREA)
  • Library & Information Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Computation (AREA)
  • Medical Informatics (AREA)
  • Computing Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides a method, a device, equipment and a storage medium for generating an audit tag configuration strategy, which comprise the following steps: acquiring an interception standard document and an auditing standard specification document; based on the auditing standard specification document and the interception standard document, extracting a plurality of text information and picture information; generating inquiry instruction information based on each text information and each picture information; and inputting the inquiry instruction information into a preset inquiry and answer model to obtain an audit tag configuration strategy. According to the method, the text information and the picture information are extracted based on the interception standard document and the auditing standard specification document, the text information and the picture information are combined to generate the inquiry instruction information, the inquiry instruction information is input into the open-source preset question-answering model, and the auditing label configuration strategy is obtained, so that auditing labels are not required to be manually configured according to the standard, the labor and time cost is reduced, and the open-source preset question-answering model has strong understanding capability and reasoning capability, so that the generated auditing label configuration strategy is more comprehensive.

Description

Method, device, equipment and storage medium for generating audit tag configuration strategy
Technical Field
The present invention relates to the field of artificial intelligence technologies, and in particular, to a method, an apparatus, a device, and a storage medium for generating an audit tag configuration policy.
Background
Currently, sensitive contents such as violence, low custom and the like exist in various information on the Internet. In order to purify the network environment, clear network space is created, and content wind control auditing is important. Previously, the content wind control auditing is purely dependent on manual auditing, and is time-consuming and labor-consuming.
In recent years, with the development of machine learning and deep learning algorithms, machine auditing becomes the main force of content wind control auditing by virtue of good cost performance. However, the current graphic content wind control machine auditing system still needs to rely on a lot of manpower, especially for the B-end client, facing different clients and different scenes, and needs to arrange experienced configurators to manually configure different auditing labels after fully communicating with the clients so as to obtain good interception effects. However, manually configuring audit labels is costly in terms of both manpower and time, and requires the ability of the configurator to understand each audit label to a precise depth, once the understanding is biased, the resulting audit effect is affected.
Disclosure of Invention
The invention provides a method, a device, equipment and a storage medium for generating an audit label configuration strategy, and aims to solve the technical problems that manual configuration of audit labels is high in labor and time cost, configuration personnel are required to accurately and deeply understand the capability of each audit label, and the final audit effect is affected once deviation exists in understanding.
The invention provides a method for generating an audit tag configuration strategy, which comprises the following steps:
acquiring an interception standard document of a target client and an auditing standard specification document of a product;
based on the auditing standard specification document and the interception standard document, extracting a plurality of text information and a plurality of picture information;
generating inquiry instruction information based on each text information and each picture information;
and inputting the inquiry instruction information into a preset question-answer model to obtain an audit tag configuration strategy output by the preset question-answer model.
According to the method for generating the audit tag configuration strategy provided by the invention, the method for extracting a plurality of text information and a plurality of picture information based on the audit standard specification document and the interception standard document comprises the following steps:
sequentially carrying out text extraction and picture extraction on the auditing standard specification document and the interception standard document to obtain a plurality of text extraction information and picture information associated with the text extraction information;
and carrying out semantic sentence breaking processing on each text extraction information to obtain each text information.
According to the method for generating the audit tag configuration strategy provided by the invention, the query instruction information is generated based on the text information and the picture information, and the method comprises the following steps:
coding each piece of picture information to obtain picture coding information;
and generating inquiry instruction information in a preset inquiry format based on the picture coding information and the associated text information.
According to the audit tag configuration strategy generation method provided by the invention, the interception standard document and the audit standard specification document comprise one or more of multi-level tag information, definition description information and sample information.
According to the method for generating the audit tag configuration strategy provided by the invention, after the query instruction information is input into the preset question-answer model to obtain the audit tag configuration strategy output by the preset question-answer model, the method further comprises the steps of:
obtaining training samples of different sensitive content types, wherein the training samples are configured with sample tags corresponding to the audit tag configuration strategies;
iteratively training a preset content auditing model based on each training sample and each corresponding sample label;
and auditing the content to be audited by using the trained content auditing model to obtain a content auditing result.
According to the method for generating the audit tag configuration strategy provided by the invention, before the query instruction information is input into a preset question-answer model to obtain the audit tag configuration strategy output by the preset question-answer model, the method further comprises the steps of:
acquiring a plurality of different auditing topics;
for any one of the audit topics: repeatedly inputting the auditing questions into the preset question-answering model to obtain a plurality of times of first feedback information output by the preset question-answering model,
ranking the first feedback information to train a reward model according to ranking results;
for any one of the audit topics: inputting the auditing questions into the preset question-answering model to obtain second feedback information output by the preset question-answering model;
scoring the second feedback information using the trained reward model;
and carrying out parameter adjustment on the preset question-answer model based on the scoring result and the auditing questions.
According to the method for generating the audit tag configuration strategy provided by the invention, before the query instruction information is input into a preset question-answer model to obtain the audit tag configuration strategy output by the preset question-answer model, the method further comprises the steps of:
acquiring a plurality of inquiry questions with different interception standards and audits, wherein each inquiry question is configured with answer information;
and carrying out parameter adjustment on the preset question-answer model based on each question and the corresponding answer information.
The invention also provides a device for generating the audit tag configuration strategy, which comprises the following steps:
the acquisition module is used for acquiring the interception standard document of the target client and the auditing standard specification document of the product;
the extraction module is used for extracting a plurality of text information and a plurality of picture information based on the auditing standard specification document and the interception standard document;
the generation module is used for generating inquiry instruction information based on the text information and the picture information;
and the label configuration module is used for inputting the inquiry instruction information into a preset question-answer model to obtain an audit label configuration strategy output by the preset question-answer model.
The invention also provides an electronic device comprising a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor realizes any one of the audit tag configuration policy generation methods when executing the program.
The present invention also provides a non-transitory computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements an audit tag configuration policy generation method as described in any of the above.
The invention also provides a computer program product comprising a computer program which when executed by a processor implements the audit tag configuration policy generation method as described in any of the above.
The method, the device, the equipment and the storage medium for generating the audit tag configuration strategy provided by the invention comprise the following steps: acquiring an interception standard document of a target client and an auditing standard specification document of a product; based on the auditing standard specification document and the interception standard document, extracting a plurality of text information and a plurality of picture information; generating inquiry instruction information based on each text information and each picture information; and inputting the inquiry instruction information into a preset question-answer model to obtain an audit tag configuration strategy output by the preset question-answer model. According to the method, text and picture extraction is carried out on the interception standard documents and the audit standard documents of the products to obtain a plurality of text information and a plurality of picture information, and then the query instruction information is generated by combining the text information and the picture information, so that the query instruction information is input into the open-source preset question-answer model to obtain the audit tag configuration strategy, manual configuration of the audit tag configuration strategy according to the standard is not needed, labor and time cost is reduced, and the understanding capability and reasoning capability of the open-source preset question-answer model are stable, so that the generated audit tag configuration strategy is comprehensive, and the condition that the audit effect is influenced by deviation of the manual configuration audit tag configuration strategy is reduced.
Drawings
In order to more clearly illustrate the invention or the technical solutions in the prior art, the drawings that are used in the description of the embodiments or the prior art will be briefly described one by one, it being obvious that the drawings in the description below are some embodiments of the invention, and that other drawings can be obtained from these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic flow chart of an audit tag configuration policy generation method provided by the present invention;
FIG. 2 is a complete schematic diagram of an audit tag configuration policy generation method provided by the present invention;
FIG. 3 is a schematic diagram of the configuration of audit tag configuration policy generating device provided by the present invention;
fig. 4 is a schematic structural diagram of an electronic device provided by the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The terminology used in the one or more embodiments of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the one or more embodiments of the invention. As used in one or more embodiments of the invention, the singular forms "a," "an," "the," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used in one or more embodiments of the present invention refers to and encompasses any or all possible combinations of one or more of the associated listed items.
It should be understood that, although the terms first, second, etc. may be used in one or more embodiments of the invention to describe various information, these information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, a first may also be referred to as a second, and similarly, a second may also be referred to as a first, without departing from the scope of one or more embodiments of the invention. The word "if" as used herein may be interpreted as "at … …" or "when … …", depending on the context.
Currently, sensitive contents such as violence, low custom and the like exist in various information on the Internet. In order to purify the network environment, clear network space is created, and content wind control auditing is important. Previously, the content wind control auditing is purely dependent on manual auditing, and is time-consuming and labor-consuming.
In recent years, with the development of machine learning and deep learning algorithms, machine auditing becomes the main force of content wind control auditing by virtue of good cost performance. However, the current graphic content wind control machine auditing system still needs to rely on a lot of manpower, especially for the client at the end B, facing different clients and different scenes, and needs to arrange experienced configurators to manually configure different auditing label configuration strategies after fully communicating with the clients so as to obtain good interception effects. The cost is high in manpower and time, and the ability of a configurator to understand each audit tag configuration strategy accurately and deeply is required, and once the configuration deviates, the final audit effect is affected.
In view of the above problems, the present invention provides the following embodiments. Specifically, fig. 1 is a schematic flow chart of an audit tag configuration policy generation method provided by the present invention. As shown in fig. 1, the method for generating the audit tag configuration policy includes:
s11, acquiring an interception standard document of a target client and an audit standard specification document of a product;
it should be noted that, the intercepting standard document of the client mainly focuses on the needs, expectations and standards of the client. This may include customer specifications, requirements, and standardized procedures to ensure that the product or service meets their expectations. The customer's interception criteria documents are focused on customer and market needs and may relate to stakeholders associated with the customer, sales, and market, etc.
It should be noted that, the audit standard specification document of the product focuses on the specification, quality standard, manufacturing process of the product and meets the requirements of specific industries or regulations. The audit standard specification document of the product may be formulated by an internal department such as a product development, quality control or manufacturing department.
It should be noted that, the client may fill in the document according to the specified format, and then the policy configurator checks and sorts the document into a certain form of interception standard document and audit standard specification document, where the interception standard document and audit standard specification document may optionally include one or more of multi-level tag information, definition description information and sample information. The multi-level tag information characterizes the type tag of the sensitive content, the definition description information represents the detail description information of the sensitive content of the type, and the sample information represents a detailed example or sample graph. Alternatively, the document form may be referred to in Table 1.
TABLE 1
Step S12, extracting a plurality of text information and a plurality of picture information based on the auditing standard specification document and the interception standard document;
specifically, since the interception standard document and the audit standard specification document of the product are integrated according to a certain form, in this embodiment, text and picture recognition can be performed on the audit standard specification document and the interception standard document in sequence, respectively, so as to obtain a plurality of text extraction information and picture information associated with the text extraction information. For example, the identification is sequentially performed according to the order of the first-level label, the second-level label, the definition description information and the sample information, so that: advertisement, bid product, trademark, logo and other content, A product and other text extraction information and corresponding trademark and logo sample picture information. And performing semantic sentence breaking processing on each text extraction information to obtain each text information.
Step S13, generating inquiry instruction information based on the text information and the picture information;
specifically, each piece of picture information is encoded to obtain picture encoding information, for example, the picture information is encoded through a linear change layer. And further generating query instruction information in a preset query format based on the picture coding information and the associated text information, wherein optionally, the preset query format can be set according to practical situations, for example: the audit criteria are now defined as follows: and (3) tag: picture sense-wearing leakage, defined as female chest exposure; picture advertisement-mobile logo, defined as logo of mobile phone brand.
The query instruction information may be generated as follows: the current customer's picture interception criteria are: 1. female chest wears interception of leaks, such as: [0.123,0.862,0.411 … ]; 2. all bidding contents interception related to a brand A mobile phone comprise commodities, trademarks, logo and the like. Please output the suggested audit tag configuration policy, if there is no corresponding tag capability, it is explicitly stated.
And S14, inputting the inquiry instruction information into a preset question-answer model to obtain an audit tag configuration strategy output by the preset question-answer model.
It should be noted that the preset question-answering model is a large model of an open source, for example, chatGPT and BERT models. The existing open source large model can well understand human language. And the query instruction information is input into a preset question-answer model, so that the preset question-answer model can be obtained, and the audit tag configuration strategy corresponding to the target client is output.
The embodiment of the invention comprises the following steps: acquiring an interception standard document of a target client and an auditing standard specification document of a product; based on the auditing standard specification document and the interception standard document, extracting a plurality of text information and a plurality of picture information; generating inquiry instruction information based on each text information and each picture information; and inputting the inquiry instruction information into a preset question-answer model to obtain an audit tag configuration strategy output by the preset question-answer model. The method comprises the steps of extracting texts and pictures from an audit standard specification document of an interception standard document and a product to obtain a plurality of text information and a plurality of picture information, and further combining the text information and the picture information to generate inquiry instruction information, so that the inquiry instruction information is input into an open-source preset question-answer model to obtain an audit tag configuration strategy, manual configuration audit tag configuration strategies according to the standard are not needed, labor and time cost is reduced, and understanding capability and reasoning capability of the open-source preset question-answer model are stable, so that the generated audit tag configuration strategy is comprehensive, and the condition that deviation of manually configuring audit tags influences audit effects is reduced.
In one embodiment of the present invention, the generating the query instruction information based on each of the text information and each of the picture information includes:
coding each piece of picture information to obtain picture coding information; and generating inquiry instruction information in a preset inquiry format based on the picture coding information and the associated text information.
Specifically, each piece of picture information is encoded to obtain picture encoded information, the picture encoded information is weighted, and the weighted picture encoded information and the text information related to the weighted picture encoded information are generated to generate inquiry instruction information in a preset inquiry format.
In an embodiment of the present invention, before the inputting the query instruction information into a preset question-answer model to obtain the audit tag configuration policy output by the preset question-answer model, the method further includes:
acquiring a plurality of different auditing topics; for any one of the audit topics: repeatedly inputting the auditing questions into the preset question-answering model to obtain a plurality of times of first feedback information output by the preset question-answering model, and sequencing the first feedback information to train the rewarding model according to the sequencing result; for any one of the audit topics: inputting the auditing questions into the preset question-answering model to obtain second feedback information output by the preset question-answering model; scoring the second feedback information using the trained reward model; and carrying out parameter adjustment on the preset question-answer model based on the scoring result and the auditing questions.
In practical use, the interception standards of various clients and various scenes are complex, and the open source large model needs to be finely tuned in consideration of the fact that the open source large model is not specially aimed at the content auditing scene.
Specifically, a plurality of different auditing questions are firstly obtained, and then the following steps are executed for any auditing question: repeatedly inputting the auditing questions into the preset question-answering model to obtain a plurality of times of first feedback information output by the preset question-answering model, and further obtaining a sequencing result of manually sequencing each first feedback information corresponding to any auditing question. Further, the reward model is trained using the ranked results and corresponding reward information. This generally involves methods of supervised learning or reinforcement learning. In reinforcement learning, a strategy gradient-like algorithm may be used to update model parameters by maximizing the desired rewards, resulting in a trained rewards model. Still further: for any one of the audit topics: inputting the auditing questions into the preset question-answering model to obtain second feedback information output by the preset question-answering model; and scoring the second feedback information by using the trained reward model. And then, using the scoring result of the reward model to carry out parameter adjustment on the preset question-answer model. This may be done by an optimization algorithm such as gradient descent, updating the parameters of the model according to the direction of the reward.
According to the embodiment of the invention, the preset question-answer model is enabled to learn more information corresponding to the content auditing scene by carrying out parameter adjustment on the preset question-answer model, so that the accuracy of model reply is improved.
In an embodiment of the present invention, before the inputting the query instruction information into a preset question-answer model to obtain the audit tag configuration policy output by the preset question-answer model, the method further includes:
acquiring a plurality of inquiry questions with different interception standards and audits, wherein each inquiry question is configured with answer information; and carrying out parameter adjustment on the preset question-answer model based on each question and the corresponding answer information.
Specifically, a plurality of inquiry questions with different interception standards and audits are obtained, wherein each inquiry question is configured with answer information set manually, and further parameter adjustment is performed on the preset inquiry and answer model based on each inquiry question and the corresponding answer information.
According to the embodiment of the invention, the preset question-answer model is enabled to learn more information corresponding to the content auditing scene by carrying out parameter adjustment on the preset question-answer model, so that the accuracy of model reply is improved.
In one embodiment of the present invention, after the query instruction information is input to a preset question-answer model to obtain an audit tag configuration policy output by the preset question-answer model, the method further includes:
obtaining training samples of different sensitive content types, wherein the training samples are configured with sample tags corresponding to the audit tag configuration strategies; iteratively training a preset content auditing model based on each training sample and each corresponding sample label; and auditing the content to be audited by using the trained content auditing model to obtain a content auditing result.
Specifically, a large number of training samples containing different sensitive content types are first obtained, and these training samples need to be labeled, that is, a corresponding audit tag configuration policy (i.e., a sample tag in this embodiment) is assigned to each training sample to indicate the sensitive content type present in the training sample. And further, based on each training sample and each corresponding sample label, iteratively training a preset content auditing model. In the process of content auditing, the content to be audited is obtained, and the content to be audited is audited by using a trained content auditing model, so that a content auditing result is obtained.
Referring to fig. 2, fig. 2 is a complete schematic diagram of an audit tag configuration policy generation method provided by the present invention. Specifically, firstly, an interception standard document of a customer and an audit standard specification document of a product which are integrated according to a certain form are obtained, then a plurality of text information and a plurality of picture information are sequentially extracted from the audit standard specification document and the interception standard document, further, inquiry instruction information is generated based on the text information and the picture information, and accordingly the inquiry instruction information is input into a preset question-answering model to obtain an audit tag configuration strategy output by the preset question-answering model.
The audit tag configuration policy generating device provided by the invention is described below, and the audit tag configuration policy generating device described below and the audit tag configuration policy generating method described above can be referred to correspondingly.
Fig. 3 is a schematic structural diagram of an audit tag configuration policy generating device provided by the present invention, and as shown in fig. 3, an audit tag configuration policy generating device according to an embodiment of the present invention includes:
an acquisition module 21, configured to acquire an interception standard document of a target client and an audit standard specification document of a product;
an extracting module 22, configured to extract a plurality of text information and a plurality of picture information based on the audit standard specification document and the interception standard document;
a generating module 23, configured to generate query instruction information based on each of the text information and each of the picture information;
and the label configuration module is used for inputting the inquiry instruction information into a preset question-answer model to obtain an audit label configuration strategy output by the preset question-answer model.
The audit tag configuration policy generation device further includes:
sequentially carrying out text extraction and picture extraction on the auditing standard specification document and the interception standard document to obtain a plurality of text extraction information and picture information associated with the text extraction information;
and carrying out semantic sentence breaking processing on each text extraction information to obtain each text information.
The audit tag configuration policy generation device further includes:
coding each piece of picture information to obtain picture coding information;
and generating inquiry instruction information in a preset inquiry format based on the picture coding information and the associated text information.
The audit tag configuration policy generation device further includes:
the interception standard document and the audit standard specification document comprise one or more of multi-level tag information, definition description information and sample information.
The audit tag configuration policy generation device further includes:
obtaining training samples of different sensitive content types, wherein the training samples are configured with sample tags corresponding to the audit tag configuration strategies;
iteratively training a preset content auditing model based on each training sample and each corresponding sample label;
and auditing the content to be audited by using the trained content auditing model to obtain a content auditing result.
The audit tag configuration policy generation device further includes:
acquiring a plurality of different auditing topics;
for any one of the audit topics: repeatedly inputting the auditing questions into the preset question-answering model to obtain a plurality of times of first feedback information output by the preset question-answering model,
ranking the first feedback information to train a reward model according to ranking results;
for any one of the audit topics: inputting the auditing questions into the preset question-answering model to obtain second feedback information output by the preset question-answering model;
scoring the second feedback information using the trained reward model;
and carrying out parameter adjustment on the preset question-answer model based on the scoring result and the auditing questions.
The audit tag configuration policy generation device further includes:
acquiring a plurality of inquiry questions with different interception standards and audits, wherein each inquiry question is configured with answer information;
and carrying out parameter adjustment on the preset question-answer model based on each question and the corresponding answer information.
It should be noted that, the above device provided in the embodiment of the present invention can implement all the method steps implemented in the method embodiment and achieve the same technical effects, and detailed descriptions of the same parts and beneficial effects as those of the method embodiment in the embodiment are omitted.
Fig. 3 is a schematic structural diagram of an electronic device provided by the present invention, and as shown in fig. 3, the electronic device may include: processor 310, memory 320, communication interface 330 and communication bus 340, wherein processor 310, memory 320, communication interface 330 accomplish communication with each other through communication bus 340. The processor 310 may invoke logic instructions in the memory 320 to perform an audit tag configuration policy generation method comprising: acquiring an interception standard document of a target client and an auditing standard specification document of a product; based on the auditing standard specification document and the interception standard document, extracting a plurality of text information and a plurality of picture information; generating inquiry instruction information based on each text information and each picture information; and inputting the inquiry instruction information into a preset question-answer model to obtain an audit tag configuration strategy output by the preset question-answer model.
Further, the logic instructions in the memory 320 described above may be implemented in the form of software functional units and may be stored in a computer readable storage medium when sold or used as a stand alone product. Based on this understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a Read-only memory (ROM), a random access memory (RAM, randomAccessMemory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
In yet another aspect, the present invention further provides a non-transitory computer readable storage medium having stored thereon a computer program which, when executed by a processor, is implemented to perform the audit tag configuration policy generation method provided by the above methods, the method comprising: acquiring an interception standard document of a target client and an auditing standard specification document of a product; based on the auditing standard specification document and the interception standard document, extracting a plurality of text information and a plurality of picture information; generating inquiry instruction information based on each text information and each picture information; and inputting the inquiry instruction information into a preset question-answer model to obtain an audit tag configuration strategy output by the preset question-answer model.
In another aspect, the present invention also provides a computer program product, where the computer program product includes a computer program, where the computer program can be stored on a non-transitory computer readable storage medium, and when the computer program is executed by a processor, the computer can execute the audit tag configuration policy generating method provided by the above methods.
The apparatus embodiments described above are merely illustrative, wherein the elements illustrated as separate elements may or may not be physically separate, and the elements shown as elements may or may not be physical elements, may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
From the above description of the embodiments, it will be apparent to those skilled in the art that the embodiments may be implemented by means of software plus necessary general hardware platforms, or of course may be implemented by means of hardware. Based on this understanding, the foregoing technical solution may be embodied essentially or in a part contributing to the prior art in the form of a software product, which may be stored in a computer readable storage medium, such as ROM/RAM, a magnetic disk, an optical disk, etc., including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method described in the respective embodiments or some parts of the embodiments.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and are not limiting; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. An audit tag configuration policy generation method, comprising:
acquiring an interception standard document of a target client and an auditing standard specification document of a product;
based on the auditing standard specification document and the interception standard document, extracting a plurality of text information and a plurality of picture information;
generating inquiry instruction information based on each text information and each picture information;
and inputting the inquiry instruction information into a preset question-answer model to obtain an audit tag configuration strategy output by the preset question-answer model.
2. The method for generating an audit tag configuration policy according to claim 1, wherein the extracting a plurality of text information and a plurality of picture information based on the audit standard specification document and the interception standard document includes:
sequentially carrying out text extraction and picture extraction on the auditing standard specification document and the interception standard document to obtain a plurality of text extraction information and picture information associated with the text extraction information;
and carrying out semantic sentence breaking processing on each text extraction information to obtain each text information.
3. The audit tag configuration policy generation method according to claim 1, wherein the generating inquiry instruction information based on each of the text information and each of the picture information includes:
coding each piece of picture information to obtain picture coding information;
and generating inquiry instruction information in a preset inquiry format based on the picture coding information and the associated text information.
4. The audit tag configuration policy generation method according to claim 1, wherein the interception standard document and audit standard specification document include one or more of multi-level tag information, definition description information, and sample information.
5. The method for generating an audit tag configuration policy according to claim 4, wherein after inputting the query instruction information to a preset question-answer model to obtain an audit tag configuration policy output by the preset question-answer model, further comprises:
obtaining training samples of different sensitive content types, wherein the training samples are configured with sample tags corresponding to the audit tag configuration strategies;
iteratively training a preset content auditing model based on each training sample and each corresponding sample label;
and auditing the content to be audited by using the trained content auditing model to obtain a content auditing result.
6. The method for generating an audit tag configuration policy according to claim 1, wherein before inputting the query instruction information into a preset question-answer model to obtain an audit tag configuration policy output by the preset question-answer model, the method further comprises:
acquiring a plurality of different auditing topics;
for any one of the audit topics: repeatedly inputting the auditing questions into the preset question-answering model to obtain a plurality of times of first feedback information output by the preset question-answering model,
ranking the first feedback information to train a reward model according to ranking results;
for any one of the audit topics: inputting the auditing questions into the preset question-answering model to obtain second feedback information output by the preset question-answering model;
scoring the second feedback information using the trained reward model;
and carrying out parameter adjustment on the preset question-answer model based on the scoring result and the auditing questions.
7. The method for generating an audit tag configuration policy according to claim 1, wherein before inputting the query instruction information into a preset question-answer model to obtain an audit tag configuration policy output by the preset question-answer model, the method further comprises:
acquiring a plurality of inquiry questions with different interception standards and audits, wherein each inquiry question is configured with answer information;
and carrying out parameter adjustment on the preset question-answer model based on each question and the corresponding answer information.
8. An audit tag configuration policy generation apparatus, comprising:
the acquisition module is used for acquiring the interception standard document of the target client and the auditing standard specification document of the product;
the extraction module is used for extracting a plurality of text information and a plurality of picture information based on the auditing standard specification document and the interception standard document;
the generation module is used for generating inquiry instruction information based on the text information and the picture information;
and the label configuration module is used for inputting the inquiry instruction information into a preset question-answer model to obtain an audit label configuration strategy output by the preset question-answer model.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and running on the processor, wherein the processor implements the audit tag configuration policy generation method of any of claims 1 to 7 when the program is executed by the processor.
10. A non-transitory computer readable storage medium having stored thereon a computer program, wherein the computer program when executed by a processor implements the audit tag configuration policy generation method according to any of claims 1 to 7.
CN202311583480.4A 2023-11-23 2023-11-23 Method, device, equipment and storage medium for generating audit tag configuration strategy Pending CN117556100A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311583480.4A CN117556100A (en) 2023-11-23 2023-11-23 Method, device, equipment and storage medium for generating audit tag configuration strategy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311583480.4A CN117556100A (en) 2023-11-23 2023-11-23 Method, device, equipment and storage medium for generating audit tag configuration strategy

Publications (1)

Publication Number Publication Date
CN117556100A true CN117556100A (en) 2024-02-13

Family

ID=89820229

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311583480.4A Pending CN117556100A (en) 2023-11-23 2023-11-23 Method, device, equipment and storage medium for generating audit tag configuration strategy

Country Status (1)

Country Link
CN (1) CN117556100A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150019204A1 (en) * 2013-07-12 2015-01-15 Microsoft Corporation Feature completion in computer-human interactive learning
US20190217203A1 (en) * 2018-01-18 2019-07-18 Sony Interactive Entertainment Inc. User analysis system and method
CN113469732A (en) * 2021-06-11 2021-10-01 北京百度网讯科技有限公司 Content understanding-based auditing method and device and electronic equipment
CN116663525A (en) * 2023-07-21 2023-08-29 科大讯飞股份有限公司 Document auditing method, device, equipment and storage medium
CN116910561A (en) * 2023-07-31 2023-10-20 阿里巴巴(中国)有限公司 Data set construction method and server

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150019204A1 (en) * 2013-07-12 2015-01-15 Microsoft Corporation Feature completion in computer-human interactive learning
US20190217203A1 (en) * 2018-01-18 2019-07-18 Sony Interactive Entertainment Inc. User analysis system and method
CN113469732A (en) * 2021-06-11 2021-10-01 北京百度网讯科技有限公司 Content understanding-based auditing method and device and electronic equipment
CN116663525A (en) * 2023-07-21 2023-08-29 科大讯飞股份有限公司 Document auditing method, device, equipment and storage medium
CN116910561A (en) * 2023-07-31 2023-10-20 阿里巴巴(中国)有限公司 Data set construction method and server

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
OLESIA: "如何使用GPT-4进行内容审核", Retrieved from the Internet <URL:https://preview.lablab.ai/blog/how-to-use-gpt-4-for-content-moderation> *
刘通,陈梦曦著: "AIGC新纪元", 30 April 2023, 中国经济出版社, pages: 123 - 125 *
吴智勤;李萍;: "大数据情境下高校图书馆科研用户画像构建策略研究", 江苏理工学院学报, no. 06, 15 December 2019 (2019-12-15) *
苏江: ""ChatGPT使用指南 人人都应该掌握的AI最强工具", 31 May 2023, 北京理工大学出版社, pages: 174 *

Similar Documents

Publication Publication Date Title
US20200301954A1 (en) Reply information obtaining method and apparatus
CN110781276A (en) Text extraction method, device, equipment and storage medium
US11163936B2 (en) Interactive virtual conversation interface systems and methods
CN111858877A (en) Multi-type question intelligent question answering method, system, equipment and readable storage medium
CN110472045B (en) Short text false problem classification prediction method and device based on document embedding
CN113051374B (en) Text matching optimization method and device
CN110704586A (en) Information processing method and system
CN115391499A (en) Method for generating multitask generation model, question-answer pair generation method and related device
US20160283876A1 (en) System and method for providing automomous contextual information life cycle management
CN117351336A (en) Image auditing method and related equipment
CN117746143A (en) AIGC-based image description text generation method and device and storage medium
CN112818689B (en) Entity identification method, model training method and device
CN107783958B (en) Target statement identification method and device
CN115374259A (en) Question and answer data mining method and device and electronic equipment
CN118334350A (en) Image processing method, server, storage medium, and program product
CN112100355A (en) Intelligent interaction method, device and equipment
CN115617974B (en) Dialogue processing method, device, equipment and storage medium
CN117556057A (en) Knowledge question-answering method, vector database construction method and device
CN117556100A (en) Method, device, equipment and storage medium for generating audit tag configuration strategy
CN117370512A (en) Method, device, equipment and storage medium for replying to dialogue
CN110287396A (en) Text matching technique and device
CN114186048A (en) Question-answer replying method and device based on artificial intelligence, computer equipment and medium
CN117891927B (en) Question and answer method and device based on large language model, electronic equipment and storage medium
CN112579748B (en) Method and device for extracting specific event relation from inquiry stroke list
CN112597289B (en) Query information classification method, model training method, device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination