• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Capturing semantic features to improve Chinese event detection

    2022-05-28 15:17:20XiaoboMaYongbinLiuChunpingOuyang
    關(guān)鍵詞:法網(wǎng)

    Xiaobo Ma|Yongbin Liu|Chunping Ouyang,2

    1School of Computing,University of South China,Hengyang,China

    2Hunan provincial base for scientific and technological innovation cooperation,Hunan,China

    Abstract Current Chinese event detection methods commonly use word embedding to capture semantic representation,but these methods find it difficult to capture the dependence relationship between the trigger words and other words in the same sentence.Based on the simple evaluation,it is known that a dependency parser can effectively capture dependency relationships and improve the accuracy of event categorisation.This study proposes a novel architecture that models a hybrid representation to summarise semantic and structural information from both characters and words.This model can capture rich semantic features for the event detection task by incorporating the semantic representation generated from the dependency parser.The authors evaluate different models on kbp 2017 corpus.The experimental results show that the proposed method can significantly improve performance in Chinese event detection.

    KEYWORDS dependency parser,event detection,hybrid representation learning,semantic feature

    1|INTRODUCTION

    Event Detection (ED) is a key step in event extraction which aims to recognise event instances of a particular type in plain text.Specifically,given a sentence,ED is required to decide whether the sentence contains event triggers,and if so,it needs to identify the specificeventtype.For example,in the sentence‘He boughta plane ticket and arrived in Sydney on November 17th’,an event detection system will detect a ‘transaction’ event triggered by‘bought’,and a‘movement’event triggered by‘a(chǎn)rrived’.

    Chinese event extraction has had progress recently.To date,many methods [1-3] have been proposed and have obtained state-of-the-art performance.However,the existing event extraction methods find it challenging to capture sufficient semantic information from plain text,because a word may have different meanings in different sentences.For example,in Table 1 S1 is a sentence in which the word‘下課’is equivalent to resign,but in S2,the same word‘下課’is used to express the meaning that the class is over.Also,the wordtrigger mismatch problem still exists,because triggers do not exactly match with a word.In Table 1 in S3,the event should be triggered by ‘落入法網(wǎng)’ which is a cross-word trigger.Because the word segmentation tool divides ‘落入法網(wǎng)’ into‘落入’and ‘法網(wǎng)’ that makes it impossible to extract the complete trigger.In S4,there is more than one trigger in the word ‘擊斃’ (shoot and kill).A ‘shoot’ event triggered by ‘擊’and a ‘kill’ event triggered by ‘?dāng)馈?These triggers are called inside-word triggers.

    To improve event detection quality,previous methods often captured additional information,such as syntactic features.The dependency parser is an effective way to capture syntactic features.Using the dependency parser,a sentence can be labelled with structured information that contains a dependency relation.An arc represents a dependency relation that connects a dependency word to a headword in a sentence.For example,in Figure 1,an arc represents a dependency relation (dobj) that connects the dependency word‘合并’(merger)to the headword‘公司’ (company).The dependency relation provides rich semantic features for models and performs reasonably well.For example,in Figure 1,‘合并’(merger)is a trigger word.From thedependency relation between ‘合并’ (merger) and its entities‘公司’(company)we can exploit its entities to assist the classification of the trigger and discern the event type of‘Merge-Org’.These related entities called cue words can provide available information to assist the trigger classification.However,with traditional word embedding it is difficult to take full advantage of these cue words because they are scattered in a sentence.Therefore,we connect cue words to trigger comments by adding dependency relations.In most cases,these additional features can provide helpful information.

    TABLE 1 Examples of word polysemy and word-trigger mismatch

    FIGURE 1 Example of a Merge‐Org event triggered by ‘合并’ (merger)

    With this objective,we propose a hybrid representation method to learn information from words,chars,and dependency relations.More concretely,we first learn two separate characterlevel and word-level representations using token-level neural networks.Then,we obtain the dependency information from the dependency parser and generate its representation by One-Hot Encoding.Our analysis proves that the feature generated from the dependency parser are beneficial for event detection.Finally,we design appropriate hybrid paradigms to capture the hybrid representation.Our model achieved the micro-averaged F1 scores of 59.86 and 53.44,respectively,for trigger identification and trigger classification.

    2|METHODOLOGY

    Our model can be divided into two stages which process hybrid representation via dynamic multi-pooling convolutional neural networks.The first stage is trigger identification,where we use a neural network to capture the potential trigger nuggets containing the concerning character by exploiting the triggers' character compositional structures.The second stage is used to determine the event's specific type,given the potential trigger nuggets.This is called trigger type classification.We use the dependency information extract from a dependency parser to generate a feature representation via tokenlevel neural networks in these two stages.Then,we combine it with the word feature representation and obtain a hybrid representation.

    Figure 2 depicts the architecture of our event detection approach,which involves the following four components:(a)representation of the input sequence;(b)feature representation based on the dependency parser;(c)hybrid representation;and(d) dynamic multi-polling convolutional neural network.

    2.1|Representation of the input sequence

    To better capture information on different levels,we propose using two levels of embedding,namely,word level embedding and character level embedding.To further enhance performance,we use pre-trained weights to initialise the embedding.Then,a two token-level neural network is used to obtain features from characters and words.The network architecture is similar to NPNs [4].LetT=t1,t2,…,tnbe tokens in the sentence wheretiis theith token.Then,letxibe the concatenation of the embedding (word or character) oftiand theti’s relative position totc,a convolutional layer with the window size assis introduced to capture compositional semantics as follows:

    FIGURE 2 Architecture of event detection,where αTi and αTc are the gates described in Section 2.3

    Equation(1)shows the convolutional process,wherewiis theith filter of the convolutional layer,xi:i+jis the concatenation of embeddings fromxjtohj+s-1,andbiis a bias.Equation (2) gives the important signals of different parts of the sentence by using dynamic multi-pooling whererefers to the pooling result of the left oftc,andrefers to the pooling result of the right oftc.Then,we concatenateandto obtain the word-level representationfwordoftc.By using the same procedure on character-level sequences,we can also obtain the character-level representationfchar.

    2.2|Feature representation based on the dependency parser

    The dependency parser is the focus on most works in dependency grammar that are based on the dependency relation.Syntactic dependencies can be used to obtain deep semantic information.Syntactic dependencies are used in the neural network model by directly incorporating them into embedding.In this work,we use three different feature abstraction layers to represent three features:

    · POS:part of speech

    · DR:dependency relation

    · DIS:distance from the HEAD

    These three features are based on the results of the dependency parser.Dependency parsing for training was done with the Stanford Neutral Network dependency parser [5].

    POS is a generalisation of the word which plays an important role in natural languages processing tasks such as named syntactic analysis,entity recognition and event extraction.A noun or pronoun can act as a subject in a sentence,but an interjection cannot.This is because the grammatical component has a restriction on the speech component.Therefore,POS is applicable as an abstract feature to express different characteristics of text semantic information.We take POS as a feature to reinforce word-based features.There are 28 parts of speech in Chinese,we use a 28-dimensional one hot vector to represent the parts of speech.It means that the POS of each word in a sentence can be represented as a 28-dimensional feature vector.Each dimension of the 28-dimensional vector represents a part of speech.The POS of a word is expressed if one of the values is 1,and the remaining 27-dimensional values are 0.

    Dependency relation expresses the semantic relationships between the components of the sentence.For the event extraction task,trigger words usually are the predicate verbs.We find that,in the KBP corpus,the most popular dependent grammatical role of the trigger words is HEAD that accounts for 56%,and the role of the verb object accounts for 19%.Therefore,we consider that a dependency relation is available to improve trigger detection.On the feature layer of the dependency relation,the vector dimension is 18 (17 relationship types and one ‘other’ type).We find that 17 kinds of the dependency relation are frequently used in syntactic dependencies,and in order to reduce the complexity of feature representation,we classify the other dependency relation as the‘other’type.

    The distance from the HEAD is the length of the dependency path.Concretely,if a word and HEAD are directly related,we say that the distance of the HEAD is 1.If the path includes one intermediate dependency,the distance of the HEAD is 2.For example,in the sentence of Figure 1,‘宣布’(announced)is the HEAD,and the dependency path of‘公司’(company) are as follows:

    宣布c→comp合并→dobj公司

    Here,‘宣布’ (announced) is the HEAD in this sentence,‘合并’ (merger) creates an intermediate dependency between the HEAD and ‘公司’ (company).Therefore,for the word‘公司’(company),its distance from the HEAD is 2.HEAD is the root node in syntactic dependencies that usually represent the core word in a sentence.Triggers represent the important content in events.Based on the analysis of the trigger in the KBP corpus,we find that HEAD and trigger words are similar.It means that the distance from the HEAD can be used to measure whether a word is a trigger in a certain sense.On the feature layer of DIS,we use a seven-dimensional vector to represent the distance from 0 to 6.In addition,if it is greater than 6,we still identify its value as 6.

    2.3|Hybrid representation learning

    For Chinese event detection,only employing word-level representation or character-level representation cannot obtain sufficient information.Because characters reveal the inner compositional structure of event triggers [6],while words can provide more accurate and less ambiguous semantics than characters [7].For example,if we understand the word ‘逃離’(flee) in a character-level representation,it is a trigger consisting of ‘逃’ (escape) and ‘離’ (leave).While in a word-level representation,the word-level sequences can provide more explicit information to distinguish the semantics of‘離’(leave)in this context with the character in other words like ‘離婚’(divorce).

    After the embedding layer,we can obtain a word-level feature representationfword,a character-level representationfcharand a feature representationIn this work,we exploit a paradigm of Task-specific Hybrid [4] to combine these representations.Specifically,we first learn two gates to model the information flow for the trigger identification and event type classifier:sis the sigmoid function,andare the weight matrices,andbis the bias term.

    Based on the three feature layers in 2.2,we obtain three features representation.Then,we construct a 53-dimensional vectorby concatenating these three feature representations.Finally,we obtain the concatenation of the feature and word as a new representation:

    According to the gates which are introduced to trigger the nugget generator and the event type classifier,we can obtain the final vector as the input:

    wherefTiis the hybrid feature for the trigger identification andfTcis the hybrid feature for the event type classifier.αTiand (1 -αTi),respectively,represent the importance ofandin trigger identification.αTcplays a similar role in event type classifiers.

    2.4|Dynamic multi‐pooling convolutional neural networks

    Traditional convolutional neural networks use only one pooling layer,which implements a max operation.It means that traditional convolutional neural networks only capture the most important information in the representation of a sentence.In event extraction,one sentence may contain two or more events,and an argument may play a different role with a different trigger.However,traditional convolutional neural networks capture the most useful information of an entire sentence and will lose other important information in the same sentence.To address this problem,Chen et al.[8] propose a dynamic multi-pooling convolutional neural network(DMCNN)that can obtain more valuable information without losing the max-pooling value.

    In this study,the neural network that we used is similar to the DMCNN.We now describe the neural network for this study.Figure 3 describes the architecture of trigger identification.

    First,the concatenation of the embedding and the relative positionxiis obtained.We concatenatexito the feature vector,which we have explained in Section 2.2,resulting in the lexicallevel features.

    Next,the lexical-level features are given as input to the convolution layer to capture the compositional semantics and obtain feature maps.Concretely,a convolution operation produces a new feature by exploiting a filter(also called kernel)to scan a window ofhwords.Letxi:i+jrefer to the concatenation of wordsxi,xi+1,…,xi+j.Filters are applied to a window ofhwords in the sentencex1:h,x2:h+1,…,xn-h+1:nto produce a feature mapciwhere the indexiranges from 1 ton‐h+1.In our case,one filter produces one feature for one positioni:cij=σ(wj·xi:i+h-1+bias)whereσis a nonlinearity (tanh in our case),jranges from 1 tom,m is the number of filters.

    Then,the feature map outputcjis divided intoisections according to the number of triggers in a sentence.For example,if one sentence has one trigger then the sentence will be divided into two sections,and when this sentence has two triggers,these two triggers will divide the sentence into three sections.Through dynamic multi-pooling,the final output of one filter is given bypji=max(cji)to obtainpjifor each feature map and allpjiare concatenated to form a vector P.

    We concatenate the feature vectors above and the lexical feature into a single vectorFword.We adopt a similar method to obtain the char-level feature vectorFchar.Finally,we use hybrid representation learning which is expressed in Section 2.3 to produce two hybrid representations for the dense layer of trigger identification and trigger type classification.

    FIGURE 3 Example of trigger identification and trigger type classification.‘NIL’ means this character is not in any trigger

    2.5|Training and classification

    Following previous works,we consider event identification as a multi-class classification problem.The hybrid representationfN,which is learned from the architecture described in Section 2.3,is the input of convolutional neural networks.The input is a tokenised sentence.We also use the dropout layer[9]to prevent over-fitting.

    Then,convolution layers are used to capture semantics and generate feature maps by filters.Traditional convolutional neural networks usually get one max value for a feature map by taking one feature map as a pool.In our case,we use dynamic multi-pooling to get a multi max value by splitting each feature map into multiple parts.By concatenating the sentence-level and lexical feature,we get a single vector F and it is fed into a classifier.The process of getting the final output can be expressed as follows:

    WTis the transformation matrix,bis a bias term andZis the final output of the network.

    Finally,we use the softmax activation function to predict each type's probabilistic score,then pick the highest probability as the final result.We use two different classifiers to predict the span type in trigger detection and the event type in trigger type classification.In Figure 3,we give an example to show how classifiers get a trigger word and predict the event type.When the classifiers took a character as the potential trigger or potential trigger,one classifier extracts the best match in different possible trigger words containing this character.Then,another classifier will predict the event type triggered by this trigger.

    3|EXPERIMENTS

    3.1|Dataset and evaluation metric

    We evaluate the networks in this study using the TAC KBP 2017 Event Nugget Detection Evaluation dataset [10] that is widely used for ED.In the evaluation corpora,there are 693 documents in which half of the documents are newswire and the other half of the documents are texts from the discussion forum.Table 2 shows the number of each event type in the corpora.We used the Stanford CoreNLP toolkit [11] to preprocess all documents for sentence splitting and word segmentation.The grammar analysis tools adopted the Stanford Neutral Network dependency parser.

    Similar to[1,4,12,13],we used the same training set with 506 documents,the same development set with 20 documents and the rest 167 documents were used for testing.

    We follow standard evaluation procedures:A trigger is correct if its event subtype and offsets match those of a reference trigger.Finally,we used precision (P),recall (R) and the F-measure (F) to evaluate the results.

    TABLE 2 Number of nugget per event type

    3.2|Experimental setting

    For training the classifier,we divide the train set into positive instances and negative instances.A character included in trigger words is considered a positive instance,otherwise the character is considered a negative instance.In our case,we set the ratio of positive instances to negative instances to 1:20.In order to efficiently train neural networks,we limit the maximum sentence length of 220 in the character-level representation,and also limit the maximum sentence length of 130 in the word-level representation.The word embedding dimension and char embedding dimension are 100.For the activation function of the convolutional neural network,we use the same sigmoid function as the DMCNN[8].For evaluation,we limit the length of the triggers of 3.Because most of the triggers in the labelled corpus are not longer than 3.Besides,we set the batch size as 128.The dropout rate was set to 0.5.The parameters were initialised with a uniform distribution between-0.1 and 0.1.

    3.3|Experiments and results

    For our method,we use the pre-trained word embedding,respectively,learned by Skip-Gram and BERT.We select five state-of-the-art methods for comparison:

    FBRNN:Ghaeimi et al.[1] used forward-backward recurrent neural networks to detect events that can be either words or phrases.This method is one of the first efforts to handle multi-word events and also the first attempt to use RNNs for event detection.

    DMCNN:Chen et al.[8] proposed a dynamic multipooling convolutional neural network that uses a dynamic multi-pooling layer according to event triggers and arguments.This event extraction method aims to automatically extract lexical-level and sentence-level features without using complicated NLP tools.

    CLIZH (KBP2017 Best):Makarov and Clematide [13]incorporated many heuristic features into the LSTM encoder,which achieved the best performance in TAC KBP2017 evaluation.

    NPN (Task-specific):Lin et al.[4] proposed Nugget Proposal Networks for Chinese event detection which using hybrid representation to capture features,and designed three kinds of hybrid paradigms(Concat,General and Task-specific)to obtain the hybrid representation.In our study,we use the result of Taskspecific as a baseline to compare with our method.

    JMCEE:Xu et al.[14]proposed a Chinese multiple events extraction framework that adopts a pre-trained BERT encoder and utilises multiple sets of binary classifiers to determine the spans to complete event extraction.

    As we can see in Table 3,our method has a competitive precision and recall in the task of trigger identification,resulting in the highest micro-averaged F1.Compared with the best result,our model achieves 0.49%and 1.1%improvements in terms of micro-averaged F1,respectively.In the task of trigger identification,our method achieves the best performance in both precision and micro-averaged F1.Specific to the recall value,our model performs worse than JMCEE,but we achieve a great improvement on precision than the baseline and get a higher micro-averaged F1.This shows that our model does not improve the precision by sacrificing the recall.

    The result shown in Table 3 also shows that employing the dependency parser can achieve better precision.We believe this is because the dependency parser can capture rich relational information and different complementary information to assist trigger detection.What's more,the performance is better when BERT is used as the pre-training model of our model to initialise the parameters.This is due to the effective architecture and the large-scale pre-training information of BERT.

    3.4|Ablation study

    In order to illustrate the effectiveness of various parts of our model,we conduct ablation experiments on the kbp2017 Corpus.We first compared with the model removing dependency features (Char and Word Emb).Then,on the basis of removing the dependency features,we separately remove the word-level feature(Char Emb)and character-level features(Word Emb).

    TABLE 3 Experiment results on TAC KBP 2017 dataset

    According to the results presented in Table 4,we can see that neither the character-level model (Char Emb) nor the word-level model(Word Emb)can achieve competitive results.It is possible to incorporate character-level features and wordlevel features,which is beneficial to capture the trigger's integrity.Furthermore,it can be observed that dependency features,which could take advantage of event information scattered in the sentence,help trigger identification and trigger classification.

    3.5|Influence of mismatch triggers and polysemous triggers

    In order to explore the influence of mismatch triggers and polysemous triggers,we counted the mismatch triggers and polysemous triggers on the KBP2017 dataset.First,we split triggers into two parts:match and mismatch.Then,based on the polysemy of triggers,we split triggers into two parts:polysemy and univocal.Table 5 shows the statistics of the mismatch trigger and polysemous trigger on the KBP2017 dataset.

    Based on the ablation study,we further analysed the influence of our model on trigger mismatch and polysemy.Table 6 shows the F1 score of different types of word-trigger match on the trigger identification task.Compared with the model that only considers the word feature or character feature,our method achieves better performance regardless of whether the triggers are mismatched or not.The word-based model only gets 22.77% F1 score because mismatch triggers are difficult to be separated as a specific word in the preprocessing stage.

    To further explore the effect of the character,word and dependency feature,we split the KBP2017 test set into two parts:polysemy and univocal.The F1 score of each part is shown in Table 6,in which our method achieves the best results on both the polysemy part and the univocal part.Without the dependency feature,the performance of the method drops by 2.55% in the polysemy part.The results indicate that theseadditional information can alleviate some of the misclassification of the triggers caused by polysemy.In contrast,wordbased or char-based model does not get enough semantic information,thus has a low result.

    TABLE 4 Ablation study for our method

    TABLE 5 Proportion of the mismatch triggers and polysemous triggers on KBP 2017

    TABLE 6 F1 score of mismatch trigger on trigger identification task.And F1 score of polysemous trigger on trigger classification

    4|RELATED WORK

    4.1|Feature engineering method

    Event detection is a supervised multi-class classification task that can be divided into two steps:feature selection and classification model.For event detection tasks,traditional classification models are mostly maximum entropy models or support vector machines.Chieu and Ng [15] first presented a maximum entropy approach to extract information on a dataset with better performance than the past work that used pattern-learning methods.Ahn [16] used a modular approach based on lexical features,syntactic features,and external knowledge features to complete an event extraction task on an ACE English corpus.

    In follow-up studies,the researchers proposed more advanced features for event detection.Ji and Grishman [17]proposed a cross-document feature that extracts multiple results from a set of related documents.This approach achieves the propagation of event arguments in sentences and documents.Inspired by the hypothesis of ‘early-update’,a joint framework to extract events is proposed in [18,19].Although these approaches have a high performance,the traditional classification model suffers as it is heavily dependent on feature selection.

    These methods are based on feature engineering.The feature extraction is usually a pre-order module of the prediction model in the ways.Principal component analysis or linear discriminant analysis is generally used for feature extraction.The prediction model performs the classification task on the feature extraction results.

    4.2|Deep learning method

    In recent years,deep learning is widely used in event detection tasks based on structured prediction.We report studies on event extraction with neural networks.Nguyen and Grishman [20] exploit convolutional neural networks to achieve the modelling of non-continuous skip-grams [21]and overcome the problem of complicated feature engineering.These methods achieve high performance in event detection.But the issue of data scarcity limits their improvement and performance.Chen et al.[22] propose an automatic label method for event extraction by detecting triggers and arguments for each event type.Liu et al.[2]leverage supervised attention mechanisms to model argument information for event detection.

    Recently,the researcher proposed some novel models to solve a different problem in event extraction related to our work.Zhang et al.[23] transformed the event recognition problem into semantic feature classification and proposed a deep belief network model to identify the triggers.Chen et al.[8] proposed a dynamic multi-pool convolutional neural network to capture the sentence-level information for event extraction.Lin et al.[4] proposed a hybrid representation model to solve the problem of word-trigger mismatch.Tong et al.[24,25] proposed a novel Enrichment Knowledge Distillation (EKD) model to solve the problem of the long tail.

    These methods,based on the neural network,are essentially representation learning methods.The difficulty of these methods is the evaluation of the contribution or influence of representation learning on the final output of the system.With these methods,it is difficult to capture the dependence relationship between trigger words and other words in the same sentence.This study used the dependency parser that effectively captures dependency relationships and improves the accuracy of event categorisation.

    5|CONCLUSION

    This study proposes an effective Chinese event detection model.Due to the Chinese language's nature,the Chinese tokens usually contain more internal structures,and every single character in the token may convey helpful semantic information.Our method uses the hybrid representation to capture features both in the word-level and character-level and concatenates token features with semantic features generated from the dependency parser.Besides,we use a dynamic multi-pooling convolutional neural network to store more useful information in the same sentence.The experimental results prove that the dependency parser can capture more valuable features,which improves our method's performance in event detection tasks.

    ACKNOWLEDGEMENTS

    This work is supported by 973 Program(No.2014CB340504),the State Key Program of National Natural Science of China(No.61533018),National Natural Science Foundation of China (No.61402220),the Philosophy and Social Science Foundation of Hunan Province (No.16YBA323),Natural Science Foundation of Hunan Province (No.2020JJ4525) and the Scientific Research Fund of Hunan Provincial Education Department (Nos.18B279 and 19A439).

    CONFLICT OF INTERESTS

    The authors declare no conflict of interests.

    DATA AVAILABILITY STATEMENT

    Data available on request from the authors.

    ORCID

    Yongbin Liuhttps://orcid.org/0000-0002-3369-3101

    猜你喜歡
    法網(wǎng)
    “罒”和“覀”
    辛巴狗幽默日常
    487天
    法網(wǎng)延期,并準(zhǔn)備退票
    法網(wǎng)延期,影響全局
    小威“貓女”戰(zhàn)袍遭禁
    法網(wǎng)11冠
    中國(guó)金花“頂替”奧運(yùn)冠軍出戰(zhàn)法網(wǎng)
    俄教練贊法網(wǎng)女單冠軍:或超越莎娃
    兩高司法解釋織密安全生產(chǎn)刑事法網(wǎng)
    公民與法治(2016年2期)2016-05-17 04:08:16
    色综合欧美亚洲国产小说| а√天堂www在线а√下载| 搡女人真爽免费视频火全软件 | 三级国产精品欧美在线观看| 亚洲一区二区三区不卡视频| 欧美日韩国产亚洲二区| 国产精品久久久久久久久免 | 亚洲美女视频黄频| 亚洲精品一区av在线观看| 精品人妻偷拍中文字幕| 日韩免费av在线播放| 97人妻精品一区二区三区麻豆| 婷婷色综合大香蕉| 人妻制服诱惑在线中文字幕| 夜夜爽天天搞| 性色av乱码一区二区三区2| 国产一区二区激情短视频| 亚洲国产精品合色在线| 可以在线观看毛片的网站| 久久久久久久亚洲中文字幕 | 欧美日韩国产亚洲二区| 日韩国内少妇激情av| 伦理电影大哥的女人| 91字幕亚洲| 久久久成人免费电影| 国产精品一及| 久久久久久大精品| 亚洲av第一区精品v没综合| 欧美成人性av电影在线观看| 欧美乱妇无乱码| 一本久久中文字幕| 91久久精品国产一区二区成人| 我要搜黄色片| 午夜亚洲福利在线播放| 乱人视频在线观看| 偷拍熟女少妇极品色| 90打野战视频偷拍视频| 男女做爰动态图高潮gif福利片| 好男人电影高清在线观看| 亚洲 欧美 日韩 在线 免费| 国产精品久久久久久久电影| 不卡一级毛片| 两个人的视频大全免费| 身体一侧抽搐| 嫩草影视91久久| 国内揄拍国产精品人妻在线| 国产主播在线观看一区二区| 日韩成人在线观看一区二区三区| av天堂在线播放| 婷婷色综合大香蕉| 两个人视频免费观看高清| 首页视频小说图片口味搜索| 麻豆一二三区av精品| 国产免费一级a男人的天堂| 国产高清视频在线观看网站| 国产欧美日韩一区二区精品| 国内精品久久久久精免费| 午夜两性在线视频| 一进一出好大好爽视频| 欧美成狂野欧美在线观看| 老女人水多毛片| 亚洲人成网站在线播放欧美日韩| 97超视频在线观看视频| 成人性生交大片免费视频hd| 成人一区二区视频在线观看| 男人舔奶头视频| 美女高潮喷水抽搐中文字幕| 国产成年人精品一区二区| 久久久久免费精品人妻一区二区| 熟女人妻精品中文字幕| 日韩高清综合在线| 久久久久九九精品影院| 一级黄片播放器| 色综合欧美亚洲国产小说| 可以在线观看的亚洲视频| 日韩av在线大香蕉| 少妇人妻精品综合一区二区 | 很黄的视频免费| 国产大屁股一区二区在线视频| 一个人看视频在线观看www免费| 动漫黄色视频在线观看| 身体一侧抽搐| 亚洲欧美日韩无卡精品| 久久精品综合一区二区三区| 嫁个100分男人电影在线观看| 亚洲欧美精品综合久久99| 国内精品久久久久精免费| 国产伦一二天堂av在线观看| 欧美一区二区精品小视频在线| 国产蜜桃级精品一区二区三区| 久久中文看片网| 中文资源天堂在线| 身体一侧抽搐| 90打野战视频偷拍视频| 99久久精品国产亚洲精品| 成人永久免费在线观看视频| 久久亚洲精品不卡| 禁无遮挡网站| 成人一区二区视频在线观看| 亚洲乱码一区二区免费版| 国内毛片毛片毛片毛片毛片| 亚洲不卡免费看| 婷婷精品国产亚洲av| 香蕉av资源在线| 欧美乱妇无乱码| 国产精品电影一区二区三区| 天堂av国产一区二区熟女人妻| 国产极品精品免费视频能看的| 亚洲国产欧洲综合997久久,| bbb黄色大片| 亚洲国产日韩欧美精品在线观看| 欧美bdsm另类| 久久天躁狠狠躁夜夜2o2o| 老女人水多毛片| 每晚都被弄得嗷嗷叫到高潮| 欧美性感艳星| 欧美成人免费av一区二区三区| 老熟妇乱子伦视频在线观看| 丰满人妻一区二区三区视频av| 久久久国产成人免费| 国产精品电影一区二区三区| 少妇人妻一区二区三区视频| 中亚洲国语对白在线视频| 九色国产91popny在线| 精品一区二区三区视频在线| 人人妻人人看人人澡| 亚洲乱码一区二区免费版| 久久久久久久精品吃奶| 国产成人a区在线观看| 久久精品人妻少妇| 女人十人毛片免费观看3o分钟| 亚洲第一电影网av| 国产乱人视频| 成人午夜高清在线视频| 精品久久久久久久久久免费视频| 日韩免费av在线播放| 偷拍熟女少妇极品色| 亚洲久久久久久中文字幕| 日韩中文字幕欧美一区二区| 女生性感内裤真人,穿戴方法视频| 桃色一区二区三区在线观看| 三级男女做爰猛烈吃奶摸视频| 精品午夜福利在线看| 热99re8久久精品国产| 国产伦一二天堂av在线观看| 国产免费av片在线观看野外av| 毛片女人毛片| 国产亚洲精品av在线| 久久精品久久久久久噜噜老黄 | 精品午夜福利视频在线观看一区| 熟女电影av网| 女生性感内裤真人,穿戴方法视频| 首页视频小说图片口味搜索| 久久精品91蜜桃| 国产精品爽爽va在线观看网站| 极品教师在线视频| 身体一侧抽搐| 国产黄色小视频在线观看| 日韩欧美在线二视频| 永久网站在线| 国产黄色小视频在线观看| 天堂影院成人在线观看| 97碰自拍视频| 18美女黄网站色大片免费观看| 天堂网av新在线| 亚洲真实伦在线观看| 男女视频在线观看网站免费| 看片在线看免费视频| 久久国产乱子伦精品免费另类| 18美女黄网站色大片免费观看| 丁香六月欧美| 一区福利在线观看| 一进一出抽搐动态| 黄色日韩在线| 国产一区二区三区在线臀色熟女| 日本三级黄在线观看| 国产精品综合久久久久久久免费| 欧美在线一区亚洲| 国产av麻豆久久久久久久| 美女免费视频网站| 亚洲av免费高清在线观看| 午夜日韩欧美国产| 亚洲激情在线av| 狂野欧美白嫩少妇大欣赏| 国产精品一区二区三区四区免费观看 | 亚洲欧美激情综合另类| 亚洲成人免费电影在线观看| 国内毛片毛片毛片毛片毛片| 国产aⅴ精品一区二区三区波| 网址你懂的国产日韩在线| 日韩欧美国产一区二区入口| 久久久久久久久久黄片| 一区二区三区免费毛片| 成人鲁丝片一二三区免费| 天堂av国产一区二区熟女人妻| 中文亚洲av片在线观看爽| 午夜a级毛片| 久久6这里有精品| 免费在线观看成人毛片| 国产 一区 欧美 日韩| 日韩人妻高清精品专区| 最近最新免费中文字幕在线| 国产亚洲精品av在线| 欧美午夜高清在线| 欧美3d第一页| 国产免费一级a男人的天堂| 国产黄色小视频在线观看| 久久久精品大字幕| 最新中文字幕久久久久| 日本撒尿小便嘘嘘汇集6| 变态另类成人亚洲欧美熟女| 国产精品精品国产色婷婷| 精品久久久久久久久久久久久| 男人舔奶头视频| 欧美xxxx黑人xx丫x性爽| 国产又黄又爽又无遮挡在线| 日韩欧美在线乱码| 校园春色视频在线观看| 丁香六月欧美| 亚洲 国产 在线| 91在线精品国自产拍蜜月| 99热这里只有精品一区| 在线a可以看的网站| 免费av毛片视频| 一级作爱视频免费观看| 亚洲无线观看免费| 精品国产三级普通话版| 久久久久国内视频| 丁香六月欧美| 亚洲真实伦在线观看| 国产av不卡久久| 禁无遮挡网站| 国产亚洲精品av在线| 九九久久精品国产亚洲av麻豆| 精品99又大又爽又粗少妇毛片 | 亚洲内射少妇av| 亚洲av熟女| 精品久久久久久成人av| 国产乱人伦免费视频| 一a级毛片在线观看| 女人十人毛片免费观看3o分钟| 亚洲精品乱码久久久v下载方式| 激情在线观看视频在线高清| avwww免费| 最后的刺客免费高清国语| av黄色大香蕉| 小说图片视频综合网站| 国产精品,欧美在线| 一本久久中文字幕| 国产在线男女| 我的女老师完整版在线观看| 精品日产1卡2卡| 亚洲最大成人手机在线| 亚洲va日本ⅴa欧美va伊人久久| 国产精品一及| 成人性生交大片免费视频hd| 国产91精品成人一区二区三区| 欧美一区二区亚洲| 午夜激情福利司机影院| 成年版毛片免费区| 在线观看一区二区三区| 男女视频在线观看网站免费| 色尼玛亚洲综合影院| 日本成人三级电影网站| 亚洲熟妇中文字幕五十中出| 热99re8久久精品国产| 白带黄色成豆腐渣| 久久人人爽人人爽人人片va | 久久久国产成人免费| 亚洲成av人片在线播放无| 神马国产精品三级电影在线观看| 中文字幕熟女人妻在线| 99热这里只有是精品在线观看 | 久久人人爽人人爽人人片va | 亚洲午夜理论影院| 精品人妻1区二区| 免费看美女性在线毛片视频| 亚洲久久久久久中文字幕| 国产一级毛片七仙女欲春2| 女生性感内裤真人,穿戴方法视频| 久久久久精品国产欧美久久久| 亚洲国产精品999在线| 国产麻豆成人av免费视频| 一区二区三区激情视频| 国模一区二区三区四区视频| 国产精品乱码一区二三区的特点| 我要搜黄色片| 好看av亚洲va欧美ⅴa在| 免费高清视频大片| 欧洲精品卡2卡3卡4卡5卡区| 男女下面进入的视频免费午夜| xxxwww97欧美| 久久久久亚洲av毛片大全| 给我免费播放毛片高清在线观看| 日本成人三级电影网站| 一区二区三区免费毛片| 免费av不卡在线播放| 男女之事视频高清在线观看| 国产伦在线观看视频一区| 国产三级黄色录像| 日日夜夜操网爽| 在线免费观看的www视频| 亚洲av电影不卡..在线观看| 成人三级黄色视频| 又爽又黄无遮挡网站| 欧美最黄视频在线播放免费| 757午夜福利合集在线观看| 三级毛片av免费| 99久国产av精品| 亚洲av不卡在线观看| 亚洲av中文字字幕乱码综合| 精品国产亚洲在线| 亚洲欧美日韩无卡精品| 长腿黑丝高跟| 久久精品综合一区二区三区| 免费高清视频大片| 三级男女做爰猛烈吃奶摸视频| 午夜福利在线观看吧| 久久久久国产精品人妻aⅴ院| 国产单亲对白刺激| 中文资源天堂在线| 国产极品精品免费视频能看的| 国产一级毛片七仙女欲春2| 久久国产精品影院| 亚洲中文字幕日韩| 日本一本二区三区精品| 国产成人福利小说| 好看av亚洲va欧美ⅴa在| 免费在线观看亚洲国产| 欧美bdsm另类| 成人一区二区视频在线观看| 极品教师在线免费播放| 国语自产精品视频在线第100页| www.www免费av| 日韩免费av在线播放| 国产白丝娇喘喷水9色精品| 在线观看66精品国产| 日本撒尿小便嘘嘘汇集6| 亚洲综合色惰| 国产精品不卡视频一区二区 | 国产视频一区二区在线看| 色哟哟哟哟哟哟| 欧美精品啪啪一区二区三区| 国产一区二区三区视频了| 波多野结衣高清无吗| 日韩欧美一区二区三区在线观看| 亚洲最大成人av| 老鸭窝网址在线观看| 亚洲人成伊人成综合网2020| www.熟女人妻精品国产| 成人永久免费在线观看视频| 村上凉子中文字幕在线| 五月玫瑰六月丁香| 一夜夜www| 国产成人av教育| 观看免费一级毛片| 午夜免费男女啪啪视频观看 | 国产亚洲欧美在线一区二区| 欧美成人性av电影在线观看| a在线观看视频网站| 少妇丰满av| 成人高潮视频无遮挡免费网站| 色视频www国产| 嫩草影院新地址| 51国产日韩欧美| av黄色大香蕉| 免费看光身美女| 日韩免费av在线播放| 亚洲自偷自拍三级| 日本黄大片高清| 尤物成人国产欧美一区二区三区| 看免费av毛片| 国产日本99.免费观看| www.999成人在线观看| 男女床上黄色一级片免费看| 国产黄色小视频在线观看| 禁无遮挡网站| 久久婷婷人人爽人人干人人爱| 免费av观看视频| 日本撒尿小便嘘嘘汇集6| 别揉我奶头~嗯~啊~动态视频| 久久国产精品人妻蜜桃| 久久香蕉精品热| 免费一级毛片在线播放高清视频| 亚洲最大成人手机在线| 亚洲男人的天堂狠狠| 国产精品国产高清国产av| 亚洲精品在线观看二区| 亚洲专区国产一区二区| 99热这里只有是精品50| 麻豆一二三区av精品| 国产麻豆成人av免费视频| 九九热线精品视视频播放| 亚洲av免费在线观看| 男插女下体视频免费在线播放| www.999成人在线观看| 三级男女做爰猛烈吃奶摸视频| 伦理电影大哥的女人| 成年版毛片免费区| 国产免费av片在线观看野外av| 一个人观看的视频www高清免费观看| 亚洲人成伊人成综合网2020| 亚洲精品一卡2卡三卡4卡5卡| 亚洲精品粉嫩美女一区| 精品人妻熟女av久视频| 岛国在线免费视频观看| 欧美一级a爱片免费观看看| 91久久精品电影网| a级毛片a级免费在线| 99热这里只有精品一区| 每晚都被弄得嗷嗷叫到高潮| 一个人免费在线观看电影| 丰满人妻熟妇乱又伦精品不卡| 老熟妇仑乱视频hdxx| 亚洲欧美日韩卡通动漫| 别揉我奶头 嗯啊视频| 熟女电影av网| 国产av不卡久久| 少妇人妻精品综合一区二区 | 国产单亲对白刺激| 亚洲av五月六月丁香网| av福利片在线观看| 听说在线观看完整版免费高清| 国产 一区 欧美 日韩| 成人三级黄色视频| x7x7x7水蜜桃| 国产午夜福利久久久久久| 69av精品久久久久久| АⅤ资源中文在线天堂| 欧美xxxx黑人xx丫x性爽| 9191精品国产免费久久| 久久精品国产清高在天天线| 99热这里只有是精品在线观看 | 精品一区二区免费观看| 色视频www国产| 国产一区二区三区视频了| 性色av乱码一区二区三区2| 窝窝影院91人妻| 成人三级黄色视频| 一边摸一边抽搐一进一小说| 啦啦啦韩国在线观看视频| 97人妻精品一区二区三区麻豆| 亚洲人成电影免费在线| 国产乱人伦免费视频| 成人特级av手机在线观看| 国产又黄又爽又无遮挡在线| av在线观看视频网站免费| 99国产精品一区二区蜜桃av| 精品一区二区三区av网在线观看| 精品人妻偷拍中文字幕| 91在线精品国自产拍蜜月| 免费看a级黄色片| 舔av片在线| 日本三级黄在线观看| 亚洲精品亚洲一区二区| 毛片女人毛片| 国产精品98久久久久久宅男小说| av视频在线观看入口| 日本撒尿小便嘘嘘汇集6| 老熟妇仑乱视频hdxx| 午夜福利视频1000在线观看| .国产精品久久| 亚洲黑人精品在线| 国产午夜精品论理片| 淫秽高清视频在线观看| 久久精品国产亚洲av天美| 三级国产精品欧美在线观看| 超碰av人人做人人爽久久| 久久人妻av系列| 国产高清激情床上av| 国产亚洲欧美98| 此物有八面人人有两片| 久99久视频精品免费| 麻豆久久精品国产亚洲av| 超碰av人人做人人爽久久| 国产精品不卡视频一区二区 | 99久久成人亚洲精品观看| 久久这里只有精品中国| 精品久久久久久成人av| 国产一区二区在线观看日韩| 国产精品久久久久久久久免 | 天美传媒精品一区二区| 91在线观看av| 有码 亚洲区| 国产成人a区在线观看| 精华霜和精华液先用哪个| 亚洲成a人片在线一区二区| 动漫黄色视频在线观看| 男女之事视频高清在线观看| 可以在线观看毛片的网站| 久久人人爽人人爽人人片va | 真人做人爱边吃奶动态| 草草在线视频免费看| 成人鲁丝片一二三区免费| 国产男靠女视频免费网站| 日韩 亚洲 欧美在线| 99久久久亚洲精品蜜臀av| 毛片一级片免费看久久久久 | 亚洲人成网站在线播| 一a级毛片在线观看| 内地一区二区视频在线| 99久久精品热视频| 99久久成人亚洲精品观看| 高清日韩中文字幕在线| 国产精品一区二区免费欧美| 亚洲内射少妇av| 看免费av毛片| 深夜精品福利| 午夜精品一区二区三区免费看| 麻豆国产97在线/欧美| 国内精品久久久久精免费| 少妇的逼好多水| 欧美日本视频| 丰满人妻一区二区三区视频av| 国产大屁股一区二区在线视频| 精品乱码久久久久久99久播| 一本精品99久久精品77| 日韩中字成人| 亚洲精品乱码久久久v下载方式| 国产不卡一卡二| 中文字幕免费在线视频6| 久久精品久久久久久噜噜老黄 | 欧美成人性av电影在线观看| 欧美精品啪啪一区二区三区| 69av精品久久久久久| 757午夜福利合集在线观看| 99久久无色码亚洲精品果冻| 婷婷亚洲欧美| 最近最新免费中文字幕在线| 在线a可以看的网站| 一区二区三区免费毛片| 欧美区成人在线视频| 久久久久九九精品影院| 日本黄大片高清| 精品人妻熟女av久视频| 神马国产精品三级电影在线观看| aaaaa片日本免费| 久久国产乱子伦精品免费另类| 久久精品国产99精品国产亚洲性色| 美女大奶头视频| 一卡2卡三卡四卡精品乱码亚洲| 精品一区二区免费观看| 亚洲人成网站高清观看| 久久人人爽人人爽人人片va | 亚洲精品在线观看二区| 精品午夜福利视频在线观看一区| 国产成年人精品一区二区| 老司机深夜福利视频在线观看| 亚洲五月婷婷丁香| 亚洲精品日韩av片在线观看| 国产色婷婷99| 丝袜美腿在线中文| 男人舔奶头视频| av黄色大香蕉| 亚洲av一区综合| 国产极品精品免费视频能看的| 老司机午夜福利在线观看视频| www.999成人在线观看| 亚洲国产精品合色在线| 国产美女午夜福利| 久久久成人免费电影| 国产熟女xx| 十八禁人妻一区二区| 国产午夜精品久久久久久一区二区三区 | 少妇的逼水好多| 欧美xxxx黑人xx丫x性爽| 欧美一区二区精品小视频在线| 亚洲美女搞黄在线观看 | 五月玫瑰六月丁香| 国产毛片a区久久久久| 国产美女午夜福利| 久久精品国产清高在天天线| 国产免费男女视频| 最近在线观看免费完整版| 一a级毛片在线观看| 中文字幕av在线有码专区| 18美女黄网站色大片免费观看| 日韩免费av在线播放| 久久精品国产99精品国产亚洲性色| 一a级毛片在线观看| 九色国产91popny在线| 国产黄a三级三级三级人| 国产伦在线观看视频一区| 一边摸一边抽搐一进一小说| 久久国产乱子伦精品免费另类| 99热精品在线国产| 色精品久久人妻99蜜桃| 2021天堂中文幕一二区在线观| 欧美一级a爱片免费观看看| 91久久精品国产一区二区成人| 在线观看av片永久免费下载| 直男gayav资源| 俄罗斯特黄特色一大片| 在线观看免费视频日本深夜| 亚洲精品456在线播放app | 国产成人av教育| 亚洲,欧美精品.| 亚洲va日本ⅴa欧美va伊人久久| 亚洲国产色片| 国产主播在线观看一区二区| 9191精品国产免费久久| 久久久色成人| 最新中文字幕久久久久| 国产亚洲精品av在线| 1024手机看黄色片| 国产免费av片在线观看野外av| 特级一级黄色大片| 亚洲人与动物交配视频| 久久中文看片网| 婷婷亚洲欧美| 国产亚洲欧美98| 有码 亚洲区| 国产精品久久久久久久电影| 亚洲av电影不卡..在线观看| 九九热线精品视视频播放|