| [1]石波, 于然, 朱健. 基于知识图谱的网络空间安全威胁感知技术研究[J]. 信息安全研究, 2022, 8(8): 845853[2]Li J, Chiu B, Feng S, et al. Fewshot named entity recognition via metalearning[J]. IEEE Trans on Knowl Data Eng, 2022, 34(9): 42454256[3]Huang J, Li C, Subudhi K, et al. Fewshot named entity recognition: An empirical baseline study[C] Proc of the 2021 Conf on Empirical Methods in Natural Language Processing. 2021: 1040810423[4]Ren P, Xiao Y, Chang X, et al. A survey of deep active learning[J]. ACM Computer Surv, 2021, 54(9): 180:1180:40[5]Deb K, Agrawal S, Pratap A, et al. A fast and elitist multiobjective genetic algorithm: NSGAII[J]. IEEE Trans on Evol Computer, 2002, 6(2): 182197[6]Wang X, Liu X, Ao S, et al. DNRTI: A largescale dataset for named entity recognition in threat intelligence[C] Proc of the 19th IEEE Int Conf on Trust, Security and Privacy in Computing and Communications. Piscataway, NJ: IEEE, 2020: 18421848 |