Knowledge triple extraction in cybersecurity with adversarial active learning
Aiming at the problem that using pipeline methods for extracting cybersecurity knowledge triples may cause the errors propagation of entity recognition and did not consider the correlation between entity recognition and relation extraction,and training triple extraction model lacked labeled corpora,...
Saved in:
Main Authors: | Tao LI, Yuanbo GUO, Ankang JU |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2020-10-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2020174/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Research on Spurious-Negative Sample Augmentation-Based Quality Evaluation Method for Cybersecurity Knowledge Graph
by: Bin Chen, et al.
Published: (2024-12-01) -
Research on Parameter-Efficient Knowledge Graph Completion Methods and Their Performance in the Cybersecurity Field
by: Bin Chen, et al.
Published: (2025-01-01) -
Editorial: Cybersecurity and artificial intelligence: advances, challenges, opportunities, threats
by: Pavlos Papadopoulos, et al.
Published: (2025-01-01) -
Adversarial example generation method for SAR images based on mask extraction
by: ZHANG Jianwu, et al.
Published: (2024-03-01) -
Cybersecurity Technology Foresight: 2040 Scenarios for Turkey
by: Serhat Çakır, et al.
Published: (2023-06-01)