Research Article
The Named Entity Recognition of Chinese Cybersecurity Using an Active Learning Strategy
Figure 4
Comparison of F1 of different models on the general datasets.
(a) F1 comparison of different methods on LOC |
(b) F1 comparison of different methods on PER |
(c) F1 comparison of different methods on ORG |