Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/110625
DC Field | Value | Language |
---|---|---|
dc.contributor | Department of Computing | - |
dc.creator | Hu, C | - |
dc.creator | Wu, T | - |
dc.creator | Liu, C | - |
dc.creator | Chang, C | - |
dc.date.accessioned | 2024-12-27T06:27:07Z | - |
dc.date.available | 2024-12-27T06:27:07Z | - |
dc.identifier.uri | http://hdl.handle.net/10397/110625 | - |
dc.language.iso | en | en_US |
dc.publisher | Springer Singapore | en_US |
dc.rights | © The Author(s) 2024. This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/. | en_US |
dc.rights | The following publication Hu, C., Wu, T., Liu, C. et al. Joint contrastive learning and belief rule base for named entity recognition in cybersecurity. Cybersecurity 7, 19 (2024) is available at https://doi.org/10.1186/s42400-024-00206-y. | en_US |
dc.subject | Belief rule base | en_US |
dc.subject | Contrastive learning | en_US |
dc.subject | Cybersecurity | en_US |
dc.subject | Named entity recognition | en_US |
dc.title | Joint contrastive learning and belief rule base for named entity recognition in cybersecurity | en_US |
dc.type | Journal/Magazine Article | en_US |
dc.identifier.volume | 7 | - |
dc.identifier.doi | 10.1186/s42400-024-00206-y | - |
dcterms.abstract | Named Entity Recognition (NER) in cybersecurity is crucial for mining information during cybersecurity incidents. Current methods rely on pre-trained models for rich semantic text embeddings, but the challenge of anisotropy may affect subsequent encoding quality. Additionally, existing models may struggle with noise detection. To address these issues, we propose JCLB, a novel model that Joins Contrastive Learning and Belief rule base for NER in cybersecurity. JCLB utilizes contrastive learning to enhance similarity in the vector space between token sequence representations of entities in the same category. A Belief Rule Base (BRB) is developed using regexes to ensure accurate entity identification, particularly for fixed-format phrases lacking semantics. Moreover, a Distributed Constraint Covariance Matrix Adaptation Evolution Strategy (D-CMA-ES) algorithm is introduced for BRB parameter optimization. Experimental results demonstrate that JCLB, with the D-CMA-ES algorithm, significantly improves NER accuracy in cybersecurity. | - |
dcterms.accessRights | open access | en_US |
dcterms.bibliographicCitation | Cybersecurity, 2024, v. 7, 19 | - |
dcterms.isPartOf | Cybersecurity | - |
dcterms.issued | 2024 | - |
dc.identifier.scopus | 2-s2.0-85189198222 | - |
dc.identifier.eissn | 2523-3246 | - |
dc.identifier.artn | 19 | - |
dc.description.validate | 202412 bcch | - |
dc.description.oa | Version of Record | en_US |
dc.identifier.FolderNumber | OA_Scopus/WOS | en_US |
dc.description.fundingSource | Others | en_US |
dc.description.fundingText | NSFC; Hong Kong Scholars Program | en_US |
dc.description.pubStatus | Published | en_US |
dc.description.oaCategory | CC | en_US |
Appears in Collections: | Journal/Magazine Article |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
s42400-024-00206-y.pdf | 3.49 MB | Adobe PDF | View/Open |
Page views
21
Citations as of Apr 14, 2025
Downloads
5
Citations as of Apr 14, 2025

Google ScholarTM
Check
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.