Research Article

The Named Entity Recognition of Chinese Cybersecurity Using an Active Learning Strategy

Figure 4

Comparison of F1 of different models on the general datasets.
(a) F1 comparison of different methods on LOC
(b) F1 comparison of different methods on PER
(c) F1 comparison of different methods on ORG