Research Article
The Named Entity Recognition of Chinese Cybersecurity Using an Active Learning Strategy
Figure 6
Comparison of F1 of different models on different cybersecurity entities.
(a) F1 comparison of different methods on LOC |
(b) F1 comparison of different methods on ORG |
(c) F1 comparison of different methods on PER |
(d) F1 comparison of different methods on RT |
(e) F1 comparison of different methods on SW |
(f) F1 comparison of different methods on VUL_ID |