Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/110625
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Computing-
dc.creatorHu, C-
dc.creatorWu, T-
dc.creatorLiu, C-
dc.creatorChang, C-
dc.date.accessioned2024-12-27T06:27:07Z-
dc.date.available2024-12-27T06:27:07Z-
dc.identifier.urihttp://hdl.handle.net/10397/110625-
dc.language.isoenen_US
dc.publisherSpringer Singaporeen_US
dc.rights© The Author(s) 2024. This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.en_US
dc.rightsThe following publication Hu, C., Wu, T., Liu, C. et al. Joint contrastive learning and belief rule base for named entity recognition in cybersecurity. Cybersecurity 7, 19 (2024) is available at https://doi.org/10.1186/s42400-024-00206-y.en_US
dc.subjectBelief rule baseen_US
dc.subjectContrastive learningen_US
dc.subjectCybersecurityen_US
dc.subjectNamed entity recognitionen_US
dc.titleJoint contrastive learning and belief rule base for named entity recognition in cybersecurityen_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.volume7-
dc.identifier.doi10.1186/s42400-024-00206-y-
dcterms.abstractNamed Entity Recognition (NER) in cybersecurity is crucial for mining information during cybersecurity incidents. Current methods rely on pre-trained models for rich semantic text embeddings, but the challenge of anisotropy may affect subsequent encoding quality. Additionally, existing models may struggle with noise detection. To address these issues, we propose JCLB, a novel model that Joins Contrastive Learning and Belief rule base for NER in cybersecurity. JCLB utilizes contrastive learning to enhance similarity in the vector space between token sequence representations of entities in the same category. A Belief Rule Base (BRB) is developed using regexes to ensure accurate entity identification, particularly for fixed-format phrases lacking semantics. Moreover, a Distributed Constraint Covariance Matrix Adaptation Evolution Strategy (D-CMA-ES) algorithm is introduced for BRB parameter optimization. Experimental results demonstrate that JCLB, with the D-CMA-ES algorithm, significantly improves NER accuracy in cybersecurity.-
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationCybersecurity, 2024, v. 7, 19-
dcterms.isPartOfCybersecurity-
dcterms.issued2024-
dc.identifier.scopus2-s2.0-85189198222-
dc.identifier.eissn2523-3246-
dc.identifier.artn19-
dc.description.validate202412 bcch-
dc.description.oaVersion of Recorden_US
dc.identifier.FolderNumberOA_Scopus/WOSen_US
dc.description.fundingSourceOthersen_US
dc.description.fundingTextNSFC; Hong Kong Scholars Programen_US
dc.description.pubStatusPublisheden_US
dc.description.oaCategoryCCen_US
Appears in Collections:Journal/Magazine Article
Files in This Item:
File Description SizeFormat 
s42400-024-00206-y.pdf3.49 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Version of Record
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

21
Citations as of Apr 14, 2025

Downloads

5
Citations as of Apr 14, 2025

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.