Research Article

The Named Entity Recognition of Chinese Cybersecurity Using an Active Learning Strategy

Figure 6

Comparison of F1 of different models on different cybersecurity entities.
(a) F1 comparison of different methods on LOC
(b) F1 comparison of different methods on ORG
(c) F1 comparison of different methods on PER
(d) F1 comparison of different methods on RT
(e) F1 comparison of different methods on SW
(f) F1 comparison of different methods on VUL_ID