Research Article
The Named Entity Recognition of Chinese Cybersecurity Using an Active Learning Strategy
Table 5
Comparison of cybersecurity entity recognition results of different methods.
| Model | Precision | Recall |
| RANDOM-BiLSTM-CRF | 79.31 | 75.27 | MTP-BiLSTM-CRF | 78.00 | 76.00 | LTC-BiLSTM-CRF | 80.14 | 77.52 | TPCL-BiLSTM-CRF | 82.1 | 78.32 | RANDOM-BERT-RDCNN-CRF | 86.89 | 87.31 | MTP-BERT-RDCNN-CRF | 84.45 | 85.97 | LTC-BERT-RDCNN-CRF | 86.47 | 88.77 | TPCL-BERT-RDCNN-CRF | 88.01 | 89.08 |
|
|