• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Capturing semantic features to improve Chinese event detection

    2022-05-28 15:17:20XiaoboMaYongbinLiuChunpingOuyang
    關(guān)鍵詞:法網(wǎng)

    Xiaobo Ma|Yongbin Liu|Chunping Ouyang,2

    1School of Computing,University of South China,Hengyang,China

    2Hunan provincial base for scientific and technological innovation cooperation,Hunan,China

    Abstract Current Chinese event detection methods commonly use word embedding to capture semantic representation,but these methods find it difficult to capture the dependence relationship between the trigger words and other words in the same sentence.Based on the simple evaluation,it is known that a dependency parser can effectively capture dependency relationships and improve the accuracy of event categorisation.This study proposes a novel architecture that models a hybrid representation to summarise semantic and structural information from both characters and words.This model can capture rich semantic features for the event detection task by incorporating the semantic representation generated from the dependency parser.The authors evaluate different models on kbp 2017 corpus.The experimental results show that the proposed method can significantly improve performance in Chinese event detection.

    KEYWORDS dependency parser,event detection,hybrid representation learning,semantic feature

    1|INTRODUCTION

    Event Detection (ED) is a key step in event extraction which aims to recognise event instances of a particular type in plain text.Specifically,given a sentence,ED is required to decide whether the sentence contains event triggers,and if so,it needs to identify the specificeventtype.For example,in the sentence‘He boughta plane ticket and arrived in Sydney on November 17th’,an event detection system will detect a ‘transaction’ event triggered by‘bought’,and a‘movement’event triggered by‘a(chǎn)rrived’.

    Chinese event extraction has had progress recently.To date,many methods [1-3] have been proposed and have obtained state-of-the-art performance.However,the existing event extraction methods find it challenging to capture sufficient semantic information from plain text,because a word may have different meanings in different sentences.For example,in Table 1 S1 is a sentence in which the word‘下課’is equivalent to resign,but in S2,the same word‘下課’is used to express the meaning that the class is over.Also,the wordtrigger mismatch problem still exists,because triggers do not exactly match with a word.In Table 1 in S3,the event should be triggered by ‘落入法網(wǎng)’ which is a cross-word trigger.Because the word segmentation tool divides ‘落入法網(wǎng)’ into‘落入’and ‘法網(wǎng)’ that makes it impossible to extract the complete trigger.In S4,there is more than one trigger in the word ‘擊斃’ (shoot and kill).A ‘shoot’ event triggered by ‘擊’and a ‘kill’ event triggered by ‘?dāng)馈?These triggers are called inside-word triggers.

    To improve event detection quality,previous methods often captured additional information,such as syntactic features.The dependency parser is an effective way to capture syntactic features.Using the dependency parser,a sentence can be labelled with structured information that contains a dependency relation.An arc represents a dependency relation that connects a dependency word to a headword in a sentence.For example,in Figure 1,an arc represents a dependency relation (dobj) that connects the dependency word‘合并’(merger)to the headword‘公司’ (company).The dependency relation provides rich semantic features for models and performs reasonably well.For example,in Figure 1,‘合并’(merger)is a trigger word.From thedependency relation between ‘合并’ (merger) and its entities‘公司’(company)we can exploit its entities to assist the classification of the trigger and discern the event type of‘Merge-Org’.These related entities called cue words can provide available information to assist the trigger classification.However,with traditional word embedding it is difficult to take full advantage of these cue words because they are scattered in a sentence.Therefore,we connect cue words to trigger comments by adding dependency relations.In most cases,these additional features can provide helpful information.

    TABLE 1 Examples of word polysemy and word-trigger mismatch

    FIGURE 1 Example of a Merge‐Org event triggered by ‘合并’ (merger)

    With this objective,we propose a hybrid representation method to learn information from words,chars,and dependency relations.More concretely,we first learn two separate characterlevel and word-level representations using token-level neural networks.Then,we obtain the dependency information from the dependency parser and generate its representation by One-Hot Encoding.Our analysis proves that the feature generated from the dependency parser are beneficial for event detection.Finally,we design appropriate hybrid paradigms to capture the hybrid representation.Our model achieved the micro-averaged F1 scores of 59.86 and 53.44,respectively,for trigger identification and trigger classification.

    2|METHODOLOGY

    Our model can be divided into two stages which process hybrid representation via dynamic multi-pooling convolutional neural networks.The first stage is trigger identification,where we use a neural network to capture the potential trigger nuggets containing the concerning character by exploiting the triggers' character compositional structures.The second stage is used to determine the event's specific type,given the potential trigger nuggets.This is called trigger type classification.We use the dependency information extract from a dependency parser to generate a feature representation via tokenlevel neural networks in these two stages.Then,we combine it with the word feature representation and obtain a hybrid representation.

    Figure 2 depicts the architecture of our event detection approach,which involves the following four components:(a)representation of the input sequence;(b)feature representation based on the dependency parser;(c)hybrid representation;and(d) dynamic multi-polling convolutional neural network.

    2.1|Representation of the input sequence

    To better capture information on different levels,we propose using two levels of embedding,namely,word level embedding and character level embedding.To further enhance performance,we use pre-trained weights to initialise the embedding.Then,a two token-level neural network is used to obtain features from characters and words.The network architecture is similar to NPNs [4].LetT=t1,t2,…,tnbe tokens in the sentence wheretiis theith token.Then,letxibe the concatenation of the embedding (word or character) oftiand theti’s relative position totc,a convolutional layer with the window size assis introduced to capture compositional semantics as follows:

    FIGURE 2 Architecture of event detection,where αTi and αTc are the gates described in Section 2.3

    Equation(1)shows the convolutional process,wherewiis theith filter of the convolutional layer,xi:i+jis the concatenation of embeddings fromxjtohj+s-1,andbiis a bias.Equation (2) gives the important signals of different parts of the sentence by using dynamic multi-pooling whererefers to the pooling result of the left oftc,andrefers to the pooling result of the right oftc.Then,we concatenateandto obtain the word-level representationfwordoftc.By using the same procedure on character-level sequences,we can also obtain the character-level representationfchar.

    2.2|Feature representation based on the dependency parser

    The dependency parser is the focus on most works in dependency grammar that are based on the dependency relation.Syntactic dependencies can be used to obtain deep semantic information.Syntactic dependencies are used in the neural network model by directly incorporating them into embedding.In this work,we use three different feature abstraction layers to represent three features:

    · POS:part of speech

    · DR:dependency relation

    · DIS:distance from the HEAD

    These three features are based on the results of the dependency parser.Dependency parsing for training was done with the Stanford Neutral Network dependency parser [5].

    POS is a generalisation of the word which plays an important role in natural languages processing tasks such as named syntactic analysis,entity recognition and event extraction.A noun or pronoun can act as a subject in a sentence,but an interjection cannot.This is because the grammatical component has a restriction on the speech component.Therefore,POS is applicable as an abstract feature to express different characteristics of text semantic information.We take POS as a feature to reinforce word-based features.There are 28 parts of speech in Chinese,we use a 28-dimensional one hot vector to represent the parts of speech.It means that the POS of each word in a sentence can be represented as a 28-dimensional feature vector.Each dimension of the 28-dimensional vector represents a part of speech.The POS of a word is expressed if one of the values is 1,and the remaining 27-dimensional values are 0.

    Dependency relation expresses the semantic relationships between the components of the sentence.For the event extraction task,trigger words usually are the predicate verbs.We find that,in the KBP corpus,the most popular dependent grammatical role of the trigger words is HEAD that accounts for 56%,and the role of the verb object accounts for 19%.Therefore,we consider that a dependency relation is available to improve trigger detection.On the feature layer of the dependency relation,the vector dimension is 18 (17 relationship types and one ‘other’ type).We find that 17 kinds of the dependency relation are frequently used in syntactic dependencies,and in order to reduce the complexity of feature representation,we classify the other dependency relation as the‘other’type.

    The distance from the HEAD is the length of the dependency path.Concretely,if a word and HEAD are directly related,we say that the distance of the HEAD is 1.If the path includes one intermediate dependency,the distance of the HEAD is 2.For example,in the sentence of Figure 1,‘宣布’(announced)is the HEAD,and the dependency path of‘公司’(company) are as follows:

    宣布c→comp合并→dobj公司

    Here,‘宣布’ (announced) is the HEAD in this sentence,‘合并’ (merger) creates an intermediate dependency between the HEAD and ‘公司’ (company).Therefore,for the word‘公司’(company),its distance from the HEAD is 2.HEAD is the root node in syntactic dependencies that usually represent the core word in a sentence.Triggers represent the important content in events.Based on the analysis of the trigger in the KBP corpus,we find that HEAD and trigger words are similar.It means that the distance from the HEAD can be used to measure whether a word is a trigger in a certain sense.On the feature layer of DIS,we use a seven-dimensional vector to represent the distance from 0 to 6.In addition,if it is greater than 6,we still identify its value as 6.

    2.3|Hybrid representation learning

    For Chinese event detection,only employing word-level representation or character-level representation cannot obtain sufficient information.Because characters reveal the inner compositional structure of event triggers [6],while words can provide more accurate and less ambiguous semantics than characters [7].For example,if we understand the word ‘逃離’(flee) in a character-level representation,it is a trigger consisting of ‘逃’ (escape) and ‘離’ (leave).While in a word-level representation,the word-level sequences can provide more explicit information to distinguish the semantics of‘離’(leave)in this context with the character in other words like ‘離婚’(divorce).

    After the embedding layer,we can obtain a word-level feature representationfword,a character-level representationfcharand a feature representationIn this work,we exploit a paradigm of Task-specific Hybrid [4] to combine these representations.Specifically,we first learn two gates to model the information flow for the trigger identification and event type classifier:sis the sigmoid function,andare the weight matrices,andbis the bias term.

    Based on the three feature layers in 2.2,we obtain three features representation.Then,we construct a 53-dimensional vectorby concatenating these three feature representations.Finally,we obtain the concatenation of the feature and word as a new representation:

    According to the gates which are introduced to trigger the nugget generator and the event type classifier,we can obtain the final vector as the input:

    wherefTiis the hybrid feature for the trigger identification andfTcis the hybrid feature for the event type classifier.αTiand (1 -αTi),respectively,represent the importance ofandin trigger identification.αTcplays a similar role in event type classifiers.

    2.4|Dynamic multi‐pooling convolutional neural networks

    Traditional convolutional neural networks use only one pooling layer,which implements a max operation.It means that traditional convolutional neural networks only capture the most important information in the representation of a sentence.In event extraction,one sentence may contain two or more events,and an argument may play a different role with a different trigger.However,traditional convolutional neural networks capture the most useful information of an entire sentence and will lose other important information in the same sentence.To address this problem,Chen et al.[8] propose a dynamic multi-pooling convolutional neural network(DMCNN)that can obtain more valuable information without losing the max-pooling value.

    In this study,the neural network that we used is similar to the DMCNN.We now describe the neural network for this study.Figure 3 describes the architecture of trigger identification.

    First,the concatenation of the embedding and the relative positionxiis obtained.We concatenatexito the feature vector,which we have explained in Section 2.2,resulting in the lexicallevel features.

    Next,the lexical-level features are given as input to the convolution layer to capture the compositional semantics and obtain feature maps.Concretely,a convolution operation produces a new feature by exploiting a filter(also called kernel)to scan a window ofhwords.Letxi:i+jrefer to the concatenation of wordsxi,xi+1,…,xi+j.Filters are applied to a window ofhwords in the sentencex1:h,x2:h+1,…,xn-h+1:nto produce a feature mapciwhere the indexiranges from 1 ton‐h+1.In our case,one filter produces one feature for one positioni:cij=σ(wj·xi:i+h-1+bias)whereσis a nonlinearity (tanh in our case),jranges from 1 tom,m is the number of filters.

    Then,the feature map outputcjis divided intoisections according to the number of triggers in a sentence.For example,if one sentence has one trigger then the sentence will be divided into two sections,and when this sentence has two triggers,these two triggers will divide the sentence into three sections.Through dynamic multi-pooling,the final output of one filter is given bypji=max(cji)to obtainpjifor each feature map and allpjiare concatenated to form a vector P.

    We concatenate the feature vectors above and the lexical feature into a single vectorFword.We adopt a similar method to obtain the char-level feature vectorFchar.Finally,we use hybrid representation learning which is expressed in Section 2.3 to produce two hybrid representations for the dense layer of trigger identification and trigger type classification.

    FIGURE 3 Example of trigger identification and trigger type classification.‘NIL’ means this character is not in any trigger

    2.5|Training and classification

    Following previous works,we consider event identification as a multi-class classification problem.The hybrid representationfN,which is learned from the architecture described in Section 2.3,is the input of convolutional neural networks.The input is a tokenised sentence.We also use the dropout layer[9]to prevent over-fitting.

    Then,convolution layers are used to capture semantics and generate feature maps by filters.Traditional convolutional neural networks usually get one max value for a feature map by taking one feature map as a pool.In our case,we use dynamic multi-pooling to get a multi max value by splitting each feature map into multiple parts.By concatenating the sentence-level and lexical feature,we get a single vector F and it is fed into a classifier.The process of getting the final output can be expressed as follows:

    WTis the transformation matrix,bis a bias term andZis the final output of the network.

    Finally,we use the softmax activation function to predict each type's probabilistic score,then pick the highest probability as the final result.We use two different classifiers to predict the span type in trigger detection and the event type in trigger type classification.In Figure 3,we give an example to show how classifiers get a trigger word and predict the event type.When the classifiers took a character as the potential trigger or potential trigger,one classifier extracts the best match in different possible trigger words containing this character.Then,another classifier will predict the event type triggered by this trigger.

    3|EXPERIMENTS

    3.1|Dataset and evaluation metric

    We evaluate the networks in this study using the TAC KBP 2017 Event Nugget Detection Evaluation dataset [10] that is widely used for ED.In the evaluation corpora,there are 693 documents in which half of the documents are newswire and the other half of the documents are texts from the discussion forum.Table 2 shows the number of each event type in the corpora.We used the Stanford CoreNLP toolkit [11] to preprocess all documents for sentence splitting and word segmentation.The grammar analysis tools adopted the Stanford Neutral Network dependency parser.

    Similar to[1,4,12,13],we used the same training set with 506 documents,the same development set with 20 documents and the rest 167 documents were used for testing.

    We follow standard evaluation procedures:A trigger is correct if its event subtype and offsets match those of a reference trigger.Finally,we used precision (P),recall (R) and the F-measure (F) to evaluate the results.

    TABLE 2 Number of nugget per event type

    3.2|Experimental setting

    For training the classifier,we divide the train set into positive instances and negative instances.A character included in trigger words is considered a positive instance,otherwise the character is considered a negative instance.In our case,we set the ratio of positive instances to negative instances to 1:20.In order to efficiently train neural networks,we limit the maximum sentence length of 220 in the character-level representation,and also limit the maximum sentence length of 130 in the word-level representation.The word embedding dimension and char embedding dimension are 100.For the activation function of the convolutional neural network,we use the same sigmoid function as the DMCNN[8].For evaluation,we limit the length of the triggers of 3.Because most of the triggers in the labelled corpus are not longer than 3.Besides,we set the batch size as 128.The dropout rate was set to 0.5.The parameters were initialised with a uniform distribution between-0.1 and 0.1.

    3.3|Experiments and results

    For our method,we use the pre-trained word embedding,respectively,learned by Skip-Gram and BERT.We select five state-of-the-art methods for comparison:

    FBRNN:Ghaeimi et al.[1] used forward-backward recurrent neural networks to detect events that can be either words or phrases.This method is one of the first efforts to handle multi-word events and also the first attempt to use RNNs for event detection.

    DMCNN:Chen et al.[8] proposed a dynamic multipooling convolutional neural network that uses a dynamic multi-pooling layer according to event triggers and arguments.This event extraction method aims to automatically extract lexical-level and sentence-level features without using complicated NLP tools.

    CLIZH (KBP2017 Best):Makarov and Clematide [13]incorporated many heuristic features into the LSTM encoder,which achieved the best performance in TAC KBP2017 evaluation.

    NPN (Task-specific):Lin et al.[4] proposed Nugget Proposal Networks for Chinese event detection which using hybrid representation to capture features,and designed three kinds of hybrid paradigms(Concat,General and Task-specific)to obtain the hybrid representation.In our study,we use the result of Taskspecific as a baseline to compare with our method.

    JMCEE:Xu et al.[14]proposed a Chinese multiple events extraction framework that adopts a pre-trained BERT encoder and utilises multiple sets of binary classifiers to determine the spans to complete event extraction.

    As we can see in Table 3,our method has a competitive precision and recall in the task of trigger identification,resulting in the highest micro-averaged F1.Compared with the best result,our model achieves 0.49%and 1.1%improvements in terms of micro-averaged F1,respectively.In the task of trigger identification,our method achieves the best performance in both precision and micro-averaged F1.Specific to the recall value,our model performs worse than JMCEE,but we achieve a great improvement on precision than the baseline and get a higher micro-averaged F1.This shows that our model does not improve the precision by sacrificing the recall.

    The result shown in Table 3 also shows that employing the dependency parser can achieve better precision.We believe this is because the dependency parser can capture rich relational information and different complementary information to assist trigger detection.What's more,the performance is better when BERT is used as the pre-training model of our model to initialise the parameters.This is due to the effective architecture and the large-scale pre-training information of BERT.

    3.4|Ablation study

    In order to illustrate the effectiveness of various parts of our model,we conduct ablation experiments on the kbp2017 Corpus.We first compared with the model removing dependency features (Char and Word Emb).Then,on the basis of removing the dependency features,we separately remove the word-level feature(Char Emb)and character-level features(Word Emb).

    TABLE 3 Experiment results on TAC KBP 2017 dataset

    According to the results presented in Table 4,we can see that neither the character-level model (Char Emb) nor the word-level model(Word Emb)can achieve competitive results.It is possible to incorporate character-level features and wordlevel features,which is beneficial to capture the trigger's integrity.Furthermore,it can be observed that dependency features,which could take advantage of event information scattered in the sentence,help trigger identification and trigger classification.

    3.5|Influence of mismatch triggers and polysemous triggers

    In order to explore the influence of mismatch triggers and polysemous triggers,we counted the mismatch triggers and polysemous triggers on the KBP2017 dataset.First,we split triggers into two parts:match and mismatch.Then,based on the polysemy of triggers,we split triggers into two parts:polysemy and univocal.Table 5 shows the statistics of the mismatch trigger and polysemous trigger on the KBP2017 dataset.

    Based on the ablation study,we further analysed the influence of our model on trigger mismatch and polysemy.Table 6 shows the F1 score of different types of word-trigger match on the trigger identification task.Compared with the model that only considers the word feature or character feature,our method achieves better performance regardless of whether the triggers are mismatched or not.The word-based model only gets 22.77% F1 score because mismatch triggers are difficult to be separated as a specific word in the preprocessing stage.

    To further explore the effect of the character,word and dependency feature,we split the KBP2017 test set into two parts:polysemy and univocal.The F1 score of each part is shown in Table 6,in which our method achieves the best results on both the polysemy part and the univocal part.Without the dependency feature,the performance of the method drops by 2.55% in the polysemy part.The results indicate that theseadditional information can alleviate some of the misclassification of the triggers caused by polysemy.In contrast,wordbased or char-based model does not get enough semantic information,thus has a low result.

    TABLE 4 Ablation study for our method

    TABLE 5 Proportion of the mismatch triggers and polysemous triggers on KBP 2017

    TABLE 6 F1 score of mismatch trigger on trigger identification task.And F1 score of polysemous trigger on trigger classification

    4|RELATED WORK

    4.1|Feature engineering method

    Event detection is a supervised multi-class classification task that can be divided into two steps:feature selection and classification model.For event detection tasks,traditional classification models are mostly maximum entropy models or support vector machines.Chieu and Ng [15] first presented a maximum entropy approach to extract information on a dataset with better performance than the past work that used pattern-learning methods.Ahn [16] used a modular approach based on lexical features,syntactic features,and external knowledge features to complete an event extraction task on an ACE English corpus.

    In follow-up studies,the researchers proposed more advanced features for event detection.Ji and Grishman [17]proposed a cross-document feature that extracts multiple results from a set of related documents.This approach achieves the propagation of event arguments in sentences and documents.Inspired by the hypothesis of ‘early-update’,a joint framework to extract events is proposed in [18,19].Although these approaches have a high performance,the traditional classification model suffers as it is heavily dependent on feature selection.

    These methods are based on feature engineering.The feature extraction is usually a pre-order module of the prediction model in the ways.Principal component analysis or linear discriminant analysis is generally used for feature extraction.The prediction model performs the classification task on the feature extraction results.

    4.2|Deep learning method

    In recent years,deep learning is widely used in event detection tasks based on structured prediction.We report studies on event extraction with neural networks.Nguyen and Grishman [20] exploit convolutional neural networks to achieve the modelling of non-continuous skip-grams [21]and overcome the problem of complicated feature engineering.These methods achieve high performance in event detection.But the issue of data scarcity limits their improvement and performance.Chen et al.[22] propose an automatic label method for event extraction by detecting triggers and arguments for each event type.Liu et al.[2]leverage supervised attention mechanisms to model argument information for event detection.

    Recently,the researcher proposed some novel models to solve a different problem in event extraction related to our work.Zhang et al.[23] transformed the event recognition problem into semantic feature classification and proposed a deep belief network model to identify the triggers.Chen et al.[8] proposed a dynamic multi-pool convolutional neural network to capture the sentence-level information for event extraction.Lin et al.[4] proposed a hybrid representation model to solve the problem of word-trigger mismatch.Tong et al.[24,25] proposed a novel Enrichment Knowledge Distillation (EKD) model to solve the problem of the long tail.

    These methods,based on the neural network,are essentially representation learning methods.The difficulty of these methods is the evaluation of the contribution or influence of representation learning on the final output of the system.With these methods,it is difficult to capture the dependence relationship between trigger words and other words in the same sentence.This study used the dependency parser that effectively captures dependency relationships and improves the accuracy of event categorisation.

    5|CONCLUSION

    This study proposes an effective Chinese event detection model.Due to the Chinese language's nature,the Chinese tokens usually contain more internal structures,and every single character in the token may convey helpful semantic information.Our method uses the hybrid representation to capture features both in the word-level and character-level and concatenates token features with semantic features generated from the dependency parser.Besides,we use a dynamic multi-pooling convolutional neural network to store more useful information in the same sentence.The experimental results prove that the dependency parser can capture more valuable features,which improves our method's performance in event detection tasks.

    ACKNOWLEDGEMENTS

    This work is supported by 973 Program(No.2014CB340504),the State Key Program of National Natural Science of China(No.61533018),National Natural Science Foundation of China (No.61402220),the Philosophy and Social Science Foundation of Hunan Province (No.16YBA323),Natural Science Foundation of Hunan Province (No.2020JJ4525) and the Scientific Research Fund of Hunan Provincial Education Department (Nos.18B279 and 19A439).

    CONFLICT OF INTERESTS

    The authors declare no conflict of interests.

    DATA AVAILABILITY STATEMENT

    Data available on request from the authors.

    ORCID

    Yongbin Liuhttps://orcid.org/0000-0002-3369-3101

    猜你喜歡
    法網(wǎng)
    “罒”和“覀”
    辛巴狗幽默日常
    487天
    法網(wǎng)延期,并準(zhǔn)備退票
    法網(wǎng)延期,影響全局
    小威“貓女”戰(zhàn)袍遭禁
    法網(wǎng)11冠
    中國(guó)金花“頂替”奧運(yùn)冠軍出戰(zhàn)法網(wǎng)
    俄教練贊法網(wǎng)女單冠軍:或超越莎娃
    兩高司法解釋織密安全生產(chǎn)刑事法網(wǎng)
    公民與法治(2016年2期)2016-05-17 04:08:16
    老汉色∧v一级毛片| 久久免费观看电影| 亚洲精品久久成人aⅴ小说| 亚洲av成人不卡在线观看播放网 | 午夜激情久久久久久久| 欧美精品一区二区免费开放| 伊人亚洲综合成人网| 亚洲成色77777| 亚洲中文av在线| 中文字幕人妻丝袜一区二区| 搡老岳熟女国产| 亚洲精品中文字幕在线视频| 侵犯人妻中文字幕一二三四区| 大片免费播放器 马上看| 国产成人免费无遮挡视频| 青春草亚洲视频在线观看| 久久这里只有精品19| 免费高清在线观看视频在线观看| 欧美在线一区亚洲| 国产有黄有色有爽视频| 亚洲,欧美精品.| 久久鲁丝午夜福利片| 久久 成人 亚洲| 精品久久久久久电影网| 人体艺术视频欧美日本| 啦啦啦中文免费视频观看日本| 99国产精品一区二区蜜桃av | 国产精品久久久人人做人人爽| 麻豆av在线久日| 亚洲国产成人一精品久久久| 亚洲情色 制服丝袜| 亚洲第一av免费看| 水蜜桃什么品种好| 欧美少妇被猛烈插入视频| 五月开心婷婷网| 国产无遮挡羞羞视频在线观看| 99久久精品国产亚洲精品| 国产欧美亚洲国产| 性色av一级| 一级毛片女人18水好多 | 国语对白做爰xxxⅹ性视频网站| 在线观看免费午夜福利视频| 看十八女毛片水多多多| 亚洲图色成人| 欧美人与性动交α欧美软件| 性少妇av在线| 亚洲九九香蕉| 成人国产一区最新在线观看 | 一个人免费看片子| 婷婷色综合www| 777久久人妻少妇嫩草av网站| 亚洲美女黄色视频免费看| 赤兔流量卡办理| 美女国产高潮福利片在线看| 日本猛色少妇xxxxx猛交久久| 又大又爽又粗| 国产免费又黄又爽又色| av不卡在线播放| 日本色播在线视频| 中文字幕另类日韩欧美亚洲嫩草| 一区二区日韩欧美中文字幕| 精品福利观看| 久久久精品94久久精品| 日韩人妻精品一区2区三区| 欧美97在线视频| 少妇 在线观看| 丰满人妻熟妇乱又伦精品不卡| 久久精品成人免费网站| 国产日韩欧美在线精品| 久久国产精品影院| 中文欧美无线码| 在线精品无人区一区二区三| 美女视频免费永久观看网站| 两个人看的免费小视频| 在线观看免费午夜福利视频| 国产av精品麻豆| 尾随美女入室| 80岁老熟妇乱子伦牲交| 亚洲精品一区蜜桃| 丰满饥渴人妻一区二区三| 中文字幕精品免费在线观看视频| 青春草亚洲视频在线观看| 一级毛片 在线播放| 久久九九热精品免费| 最近中文字幕2019免费版| 久久精品国产亚洲av涩爱| 欧美日韩亚洲高清精品| 91九色精品人成在线观看| 丰满人妻熟妇乱又伦精品不卡| 国产成人91sexporn| 成年人黄色毛片网站| a级毛片在线看网站| 国产伦人伦偷精品视频| 亚洲人成77777在线视频| 老汉色av国产亚洲站长工具| 精品国产一区二区三区四区第35| 韩国精品一区二区三区| 在线观看www视频免费| 亚洲午夜精品一区,二区,三区| 国产99久久九九免费精品| 成人影院久久| 多毛熟女@视频| 亚洲av男天堂| 国产成人91sexporn| 99热国产这里只有精品6| 制服诱惑二区| 亚洲精品日韩在线中文字幕| 日本a在线网址| 免费观看av网站的网址| 日韩av不卡免费在线播放| 99国产综合亚洲精品| 久久国产精品大桥未久av| 欧美激情极品国产一区二区三区| 午夜免费男女啪啪视频观看| 午夜福利视频在线观看免费| 亚洲专区中文字幕在线| 超碰97精品在线观看| 性色av一级| 一边摸一边做爽爽视频免费| 五月天丁香电影| 丝袜美足系列| 日日夜夜操网爽| 久久99热这里只频精品6学生| 校园人妻丝袜中文字幕| 中文字幕最新亚洲高清| 欧美国产精品一级二级三级| 国产一区亚洲一区在线观看| 欧美黄色淫秽网站| 久久久精品国产亚洲av高清涩受| 亚洲五月婷婷丁香| 天堂中文最新版在线下载| 欧美xxⅹ黑人| 看十八女毛片水多多多| 久久精品人人爽人人爽视色| 国产欧美日韩精品亚洲av| 欧美黄色片欧美黄色片| 久久亚洲精品不卡| 国产精品麻豆人妻色哟哟久久| 一二三四社区在线视频社区8| 热re99久久国产66热| 国产亚洲欧美精品永久| 熟女少妇亚洲综合色aaa.| 亚洲av男天堂| 性少妇av在线| 99热国产这里只有精品6| 免费在线观看黄色视频的| 亚洲伊人久久精品综合| 国产成人一区二区三区免费视频网站 | 亚洲精品日本国产第一区| 少妇猛男粗大的猛烈进出视频| 50天的宝宝边吃奶边哭怎么回事| 黑人欧美特级aaaaaa片| 青青草视频在线视频观看| 久久九九热精品免费| 99热国产这里只有精品6| 国产成人av教育| 国产成人欧美在线观看 | 波多野结衣一区麻豆| 久久这里只有精品19| 国产高清videossex| av国产久精品久网站免费入址| 亚洲三区欧美一区| av在线老鸭窝| 成年人免费黄色播放视频| 国产成人精品久久二区二区91| 一区二区三区精品91| 成年女人毛片免费观看观看9 | 七月丁香在线播放| 欧美少妇被猛烈插入视频| 精品高清国产在线一区| 一级a爱视频在线免费观看| 嫩草影视91久久| 亚洲国产精品999| 99精国产麻豆久久婷婷| 只有这里有精品99| 操美女的视频在线观看| 我的亚洲天堂| 下体分泌物呈黄色| 久久精品国产a三级三级三级| 日本欧美视频一区| 国产亚洲欧美在线一区二区| 精品福利永久在线观看| 精品一区二区三区四区五区乱码 | a 毛片基地| 99久久人妻综合| 国产欧美日韩精品亚洲av| 老鸭窝网址在线观看| 99热网站在线观看| 激情五月婷婷亚洲| 王馨瑶露胸无遮挡在线观看| 天堂俺去俺来也www色官网| 巨乳人妻的诱惑在线观看| 午夜福利免费观看在线| 亚洲一区二区三区欧美精品| 日本vs欧美在线观看视频| 亚洲国产精品一区三区| 黄色视频在线播放观看不卡| 欧美成人精品欧美一级黄| 亚洲国产毛片av蜜桃av| 国产91精品成人一区二区三区 | 日韩免费高清中文字幕av| 精品国产超薄肉色丝袜足j| 国产野战对白在线观看| 午夜福利,免费看| 大型av网站在线播放| 人成视频在线观看免费观看| av福利片在线| 国产高清国产精品国产三级| 咕卡用的链子| 亚洲精品国产av蜜桃| 一本一本久久a久久精品综合妖精| 亚洲黑人精品在线| 日韩大片免费观看网站| 免费在线观看日本一区| 久久人人爽人人片av| 亚洲第一av免费看| 亚洲av电影在线进入| 两性夫妻黄色片| 亚洲精品国产一区二区精华液| 亚洲中文日韩欧美视频| 亚洲五月色婷婷综合| 男女无遮挡免费网站观看| 亚洲七黄色美女视频| kizo精华| 免费女性裸体啪啪无遮挡网站| 国产精品秋霞免费鲁丝片| av一本久久久久| 欧美性长视频在线观看| 女人高潮潮喷娇喘18禁视频| 亚洲,欧美,日韩| 午夜福利视频在线观看免费| 看十八女毛片水多多多| 免费观看a级毛片全部| 久久午夜综合久久蜜桃| 老司机影院成人| av在线老鸭窝| 国产成人精品在线电影| 操出白浆在线播放| 亚洲欧美日韩高清在线视频 | 欧美日韩综合久久久久久| videos熟女内射| 国产精品av久久久久免费| 国产精品人妻久久久影院| 亚洲三区欧美一区| 国产视频首页在线观看| 久久精品久久精品一区二区三区| 久久国产精品影院| 两个人免费观看高清视频| 大话2 男鬼变身卡| 桃花免费在线播放| 午夜福利视频精品| 久久久久久久大尺度免费视频| 国产一卡二卡三卡精品| 成人手机av| 国产一区二区 视频在线| 亚洲欧美精品综合一区二区三区| 国产真人三级小视频在线观看| 久久精品人人爽人人爽视色| 精品国产一区二区久久| 美女福利国产在线| 纯流量卡能插随身wifi吗| 国产欧美日韩精品亚洲av| 成年人黄色毛片网站| 欧美日韩视频高清一区二区三区二| 欧美日韩精品网址| 亚洲国产毛片av蜜桃av| 中文字幕另类日韩欧美亚洲嫩草| 精品一区二区三区四区五区乱码 | 蜜桃国产av成人99| 人妻一区二区av| 亚洲人成电影观看| 久久热在线av| 亚洲三区欧美一区| 午夜福利,免费看| 日本色播在线视频| 亚洲精品久久午夜乱码| 日韩一区二区三区影片| 亚洲视频免费观看视频| 日韩伦理黄色片| 一本久久精品| 在线观看免费视频网站a站| 免费看十八禁软件| 一级毛片电影观看| 久久国产精品影院| 久久av网站| 一区在线观看完整版| 久久综合国产亚洲精品| 亚洲熟女毛片儿| 亚洲,欧美精品.| 成人手机av| 久久久久久久精品精品| 久久精品久久久久久久性| 成年人免费黄色播放视频| 日韩伦理黄色片| 丝袜美足系列| 人人妻,人人澡人人爽秒播 | 欧美日韩福利视频一区二区| av国产精品久久久久影院| 韩国精品一区二区三区| 最近中文字幕2019免费版| 一本—道久久a久久精品蜜桃钙片| 2021少妇久久久久久久久久久| 91成人精品电影| 男女免费视频国产| 欧美另类一区| 一二三四在线观看免费中文在| 欧美变态另类bdsm刘玥| 亚洲五月婷婷丁香| 成人影院久久| 亚洲精品国产区一区二| 90打野战视频偷拍视频| 国产成人91sexporn| 又黄又粗又硬又大视频| av视频免费观看在线观看| cao死你这个sao货| 亚洲精品国产一区二区精华液| 侵犯人妻中文字幕一二三四区| 一二三四社区在线视频社区8| 麻豆国产av国片精品| xxxhd国产人妻xxx| av线在线观看网站| 精品国产乱码久久久久久男人| av又黄又爽大尺度在线免费看| 日本欧美国产在线视频| 久久亚洲精品不卡| 免费高清在线观看视频在线观看| 精品第一国产精品| 18禁观看日本| 精品免费久久久久久久清纯 | 中文精品一卡2卡3卡4更新| 亚洲午夜精品一区,二区,三区| 另类亚洲欧美激情| 十八禁人妻一区二区| 久久人人爽av亚洲精品天堂| 久久久久久人人人人人| 香蕉丝袜av| 国产亚洲欧美精品永久| 99热全是精品| 黄色视频不卡| 首页视频小说图片口味搜索 | 五月开心婷婷网| 国产一区亚洲一区在线观看| 欧美日韩av久久| 欧美黄色片欧美黄色片| 亚洲欧洲国产日韩| 亚洲 欧美一区二区三区| 女人高潮潮喷娇喘18禁视频| 国产精品久久久久久人妻精品电影 | av在线播放精品| 丁香六月天网| 亚洲欧美一区二区三区国产| 成人午夜精彩视频在线观看| 波多野结衣一区麻豆| 99久久综合免费| 久久狼人影院| 亚洲熟女精品中文字幕| 精品少妇内射三级| 国产成人系列免费观看| 母亲3免费完整高清在线观看| 9色porny在线观看| 国产欧美日韩一区二区三区在线| 国产男女超爽视频在线观看| 欧美日韩亚洲国产一区二区在线观看 | 男的添女的下面高潮视频| 男女边吃奶边做爰视频| 每晚都被弄得嗷嗷叫到高潮| 一级毛片黄色毛片免费观看视频| 久久人人爽av亚洲精品天堂| 欧美精品高潮呻吟av久久| 国产精品一国产av| 天天躁日日躁夜夜躁夜夜| 午夜福利一区二区在线看| 亚洲人成电影免费在线| 一本大道久久a久久精品| 欧美精品高潮呻吟av久久| 亚洲黑人精品在线| 久久久久精品国产欧美久久久 | 高潮久久久久久久久久久不卡| 亚洲精品国产av蜜桃| 丝袜美腿诱惑在线| av网站在线播放免费| 婷婷成人精品国产| 欧美激情高清一区二区三区| 国产亚洲午夜精品一区二区久久| 老汉色∧v一级毛片| 欧美日韩亚洲综合一区二区三区_| 婷婷丁香在线五月| 性色av一级| 亚洲九九香蕉| 国产一区二区 视频在线| 亚洲国产精品国产精品| 久久人妻熟女aⅴ| 十分钟在线观看高清视频www| 国精品久久久久久国模美| 丁香六月天网| 久久精品成人免费网站| 高清不卡的av网站| 亚洲欧美激情在线| 亚洲国产精品999| 波多野结衣一区麻豆| 成人影院久久| 亚洲国产精品国产精品| 久久精品成人免费网站| 丁香六月欧美| 国产真人三级小视频在线观看| 别揉我奶头~嗯~啊~动态视频 | 亚洲色图综合在线观看| 丝瓜视频免费看黄片| 国产精品久久久久久人妻精品电影 | 日韩 亚洲 欧美在线| 亚洲成色77777| 男女国产视频网站| www.自偷自拍.com| 久久天躁狠狠躁夜夜2o2o | www.av在线官网国产| 国产成人啪精品午夜网站| 男人舔女人的私密视频| 国产精品久久久久久人妻精品电影 | 天天躁夜夜躁狠狠躁躁| 久久免费观看电影| 丝袜美足系列| 少妇被粗大的猛进出69影院| 男人操女人黄网站| 在现免费观看毛片| 岛国毛片在线播放| 久久ye,这里只有精品| 国产在线一区二区三区精| 天天躁夜夜躁狠狠久久av| 一本综合久久免费| 蜜桃在线观看..| 精品久久久久久电影网| 国产精品国产三级国产专区5o| 叶爱在线成人免费视频播放| 9色porny在线观看| 天天影视国产精品| 99热国产这里只有精品6| 丝袜脚勾引网站| 国产一区二区激情短视频 | av又黄又爽大尺度在线免费看| 久久久久久久国产电影| 电影成人av| netflix在线观看网站| kizo精华| 成人国语在线视频| 欧美日韩亚洲高清精品| 男女边摸边吃奶| 精品国产国语对白av| 18禁国产床啪视频网站| 亚洲精品乱久久久久久| 激情视频va一区二区三区| 免费观看av网站的网址| 亚洲精品久久午夜乱码| 欧美黑人精品巨大| 七月丁香在线播放| 少妇粗大呻吟视频| 国产黄色免费在线视频| 婷婷色综合www| 亚洲成av片中文字幕在线观看| www.精华液| 国产野战对白在线观看| 日本午夜av视频| 亚洲一区中文字幕在线| videosex国产| 成人影院久久| 久久亚洲精品不卡| xxx大片免费视频| 亚洲精品中文字幕在线视频| 美女大奶头黄色视频| 无限看片的www在线观看| 大香蕉久久网| 免费av中文字幕在线| 天天影视国产精品| 99热国产这里只有精品6| 一边摸一边做爽爽视频免费| 91九色精品人成在线观看| 欧美大码av| 亚洲成人免费av在线播放| 精品国产乱码久久久久久小说| 国产老妇伦熟女老妇高清| 国产在线免费精品| 久久综合国产亚洲精品| 久久精品熟女亚洲av麻豆精品| 一本—道久久a久久精品蜜桃钙片| 久久久久久久国产电影| 大香蕉久久成人网| 久久久久网色| 久久中文字幕一级| 亚洲中文日韩欧美视频| 国产欧美亚洲国产| 黑人欧美特级aaaaaa片| 精品人妻在线不人妻| 亚洲免费av在线视频| 自线自在国产av| 69精品国产乱码久久久| 久热爱精品视频在线9| 国产亚洲精品久久久久5区| 中文字幕av电影在线播放| 国产午夜精品一二区理论片| 日韩av免费高清视频| 国产精品久久久av美女十八| 日本vs欧美在线观看视频| 欧美日韩黄片免| 日韩av在线免费看完整版不卡| av不卡在线播放| 国产精品一区二区在线观看99| 一级毛片女人18水好多 | 国产成人免费观看mmmm| 亚洲国产欧美日韩在线播放| 免费高清在线观看视频在线观看| a 毛片基地| cao死你这个sao货| 精品久久久精品久久久| 亚洲av电影在线进入| 久久午夜综合久久蜜桃| 日韩电影二区| 中文字幕色久视频| 少妇精品久久久久久久| 精品久久久久久电影网| 国产精品一区二区精品视频观看| 欧美黑人欧美精品刺激| 国产视频首页在线观看| 久久久精品免费免费高清| 熟女少妇亚洲综合色aaa.| 国产成人系列免费观看| 亚洲成国产人片在线观看| 丝瓜视频免费看黄片| 亚洲欧洲国产日韩| 日韩制服丝袜自拍偷拍| 69精品国产乱码久久久| 欧美成人精品欧美一级黄| 亚洲一卡2卡3卡4卡5卡精品中文| 婷婷色av中文字幕| 最新的欧美精品一区二区| 国产日韩欧美视频二区| 日韩av在线免费看完整版不卡| 欧美精品亚洲一区二区| 国产精品 国内视频| 水蜜桃什么品种好| 久久免费观看电影| 亚洲精品一卡2卡三卡4卡5卡 | 黄片小视频在线播放| 国产日韩一区二区三区精品不卡| 欧美激情 高清一区二区三区| 国产精品一区二区在线不卡| kizo精华| 久久国产精品人妻蜜桃| 尾随美女入室| 亚洲欧美日韩高清在线视频 | netflix在线观看网站| 免费高清在线观看日韩| 天天躁日日躁夜夜躁夜夜| 中文字幕另类日韩欧美亚洲嫩草| 女人爽到高潮嗷嗷叫在线视频| 少妇裸体淫交视频免费看高清 | 亚洲精品一卡2卡三卡4卡5卡 | 美女中出高潮动态图| 欧美日韩亚洲国产一区二区在线观看 | 777米奇影视久久| 日韩精品免费视频一区二区三区| 少妇的丰满在线观看| 欧美亚洲日本最大视频资源| 18禁黄网站禁片午夜丰满| 国产深夜福利视频在线观看| 亚洲欧美成人综合另类久久久| 91字幕亚洲| 国产成人一区二区三区免费视频网站 | 女人被躁到高潮嗷嗷叫费观| 亚洲人成电影免费在线| 欧美+亚洲+日韩+国产| 性少妇av在线| 天天躁狠狠躁夜夜躁狠狠躁| 国产成人欧美在线观看 | 国产伦理片在线播放av一区| 两个人看的免费小视频| 国产主播在线观看一区二区 | 免费黄频网站在线观看国产| 中文字幕色久视频| 青春草视频在线免费观看| 亚洲精品国产一区二区精华液| 午夜福利乱码中文字幕| 男女国产视频网站| 亚洲成av片中文字幕在线观看| 黄色怎么调成土黄色| 在线天堂中文资源库| 99久久综合免费| 精品免费久久久久久久清纯 | av线在线观看网站| 一本—道久久a久久精品蜜桃钙片| 波多野结衣av一区二区av| 国产男人的电影天堂91| 成人午夜精彩视频在线观看| 男女国产视频网站| 中文字幕人妻丝袜一区二区| 亚洲色图综合在线观看| 国产精品一区二区在线观看99| 欧美人与性动交α欧美软件| 天天操日日干夜夜撸| 国产视频一区二区在线看| 久久九九热精品免费| 男人舔女人的私密视频| 菩萨蛮人人尽说江南好唐韦庄| 亚洲成人免费av在线播放| 色综合欧美亚洲国产小说| 久久亚洲精品不卡| 亚洲国产精品一区三区| 亚洲精品美女久久av网站| 国产成人a∨麻豆精品| 免费观看av网站的网址| 亚洲欧美中文字幕日韩二区| 国产精品 国内视频| 婷婷色av中文字幕| 又大又黄又爽视频免费| 天天躁狠狠躁夜夜躁狠狠躁| 国产男女内射视频| 欧美黄色片欧美黄色片|