{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T06:44:46Z","timestamp":1768891486726,"version":"3.49.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T00:00:00Z","timestamp":1732579200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T00:00:00Z","timestamp":1732579200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61771001"],"award-info":[{"award-number":["61771001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s40747-024-01661-3","type":"journal-article","created":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T09:10:54Z","timestamp":1732612254000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Quality assessment of cyber threat intelligence knowledge graph based on adaptive joining of embedding model"],"prefix":"10.1007","volume":"11","author":[{"given":"Bin","family":"Chen","sequence":"first","affiliation":[]},{"given":"Hongyi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Di","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Yitang","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0497-7903","authenticated-orcid":false,"given":"Chengwei","family":"Pan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,26]]},"reference":[{"key":"1661_CR1","unstructured":"Singhal A (2012) Introducing the knowledge graph: things, not strings. Official google blog. 5(16):3. https:\/\/blog.google\/products\/search\/introducing-knowledge-graph-things-not\/"},{"issue":"05","key":"1661_CR2","doi-asserted-by":"publisher","first-page":"56","DOI":"10.19363\/J.cnki.cn10-1380\/tn.2020.09.05","volume":"5","author":"C Dong","year":"2020","unstructured":"Dong C, Jiang B, Lu ZG et al (2020) Knowledge graph for cyberspace security intelligence: a survey. J Cyber Secur 5(05):56\u201376. https:\/\/doi.org\/10.19363\/J.cnki.cn10-1380\/tn.2020.09.05","journal-title":"J Cyber Secur"},{"key":"1661_CR3","doi-asserted-by":"publisher","unstructured":"Bordes A, Usunier N, Garcia-Duran A et al (2013) Translating embeddings for modeling multi-relational data. In: Advances in neural information processing systems, p 26. https:\/\/doi.org\/10.5555\/2999792.2999923","DOI":"10.5555\/2999792.2999923"},{"key":"1661_CR4","doi-asserted-by":"publisher","unstructured":"Wang Z, Zhang J, Feng J et al (2014) Knowledge graph embedding by translating on hyperplanes. In: Proceedings of the AAAI conference on artificial intelligence, vol 28, no 1. https:\/\/doi.org\/10.1609\/aaai.v28i1.8870","DOI":"10.1609\/aaai.v28i1.8870"},{"key":"1661_CR5","doi-asserted-by":"publisher","unstructured":"Ji G , He S , Xu L et al (2015) Knowledge graph embedding via dynamic mapping matrix. In: Meeting of the association for computational linguistics & the international joint conference on natural language processing.https:\/\/doi.org\/10.3115\/v1\/P15-1067","DOI":"10.3115\/v1\/P15-1067"},{"key":"1661_CR6","doi-asserted-by":"publisher","unstructured":"Lin Y, Liu Z, Sun M et al (2015) Learning entity and relation embeddings for knowledge graph completion. In: Proceedings of the AAAI conference on artificial intelligence, vol 29, no 1. https:\/\/doi.org\/10.1609\/aaai.v29i1.9491","DOI":"10.1609\/aaai.v29i1.9491"},{"key":"1661_CR7","doi-asserted-by":"publisher","unstructured":"Xiao H, Huang M, Hao Y et al (2016) TransG: a generative mixture model for knowledge graph embedding. Comput Sci. https:\/\/doi.org\/10.18653\/v1\/P16-1219","DOI":"10.18653\/v1\/P16-1219"},{"key":"1661_CR8","doi-asserted-by":"publisher","unstructured":"Th\u00e9o T, Welbl J, Riedel S et al (2016) Complex embeddings for simple link prediction. JMLR.org. https:\/\/doi.org\/10.48550\/arXiv.1606.06357","DOI":"10.48550\/arXiv.1606.06357"},{"key":"1661_CR9","doi-asserted-by":"publisher","unstructured":"Nguyen DQ, Nguyen DQ, Nguyen TD et al (2019) A convolutional neural network-based model for knowledge base completion and its application to search personalization. IOS Press. https:\/\/doi.org\/10.3233\/sw-180318","DOI":"10.3233\/sw-180318"},{"key":"1661_CR10","doi-asserted-by":"publisher","unstructured":"Yang B, Yih WT, He X et al (2014) Embedding entities and relations for learning and inference in knowledge bases. https:\/\/doi.org\/10.48550\/arXiv.1412.6575","DOI":"10.48550\/arXiv.1412.6575"},{"key":"1661_CR11","doi-asserted-by":"publisher","unstructured":"Wang X, Jiang Y, Bach N et al (2020) Automated concatenation of embeddings for structured prediction. https:\/\/doi.org\/10.48550\/arXiv.2010.05006","DOI":"10.48550\/arXiv.2010.05006"},{"key":"1661_CR12","unstructured":"Li L (2018) Study on the multi-dimensional analysis model of threat intelligence credibility in cyberspace. Master's thesis"},{"key":"1661_CR13","doi-asserted-by":"publisher","DOI":"10.1126\/science.aag2612","author":"D George","year":"2017","unstructured":"George D, Lehrach W, Kansky K et al (2017) A generative vision model that trains with high data efficiency and breaks text-based CAPTCHAs. Science (New York, N Y). https:\/\/doi.org\/10.1126\/science.aag2612","journal-title":"Science (New York, N. Y.)"},{"key":"1661_CR14","doi-asserted-by":"publisher","unstructured":"Yao L, Mao C, Luo Y (2019) KG-BERT: BERT for knowledge graph completion. https:\/\/doi.org\/10.48550\/arXiv.1909.03193","DOI":"10.48550\/arXiv.1909.03193"},{"key":"1661_CR15","doi-asserted-by":"publisher","unstructured":"Cheng X, Li X (2018) Trust evaluation in online social networks based on knowledge graph. In: The 2018 international conference. https:\/\/doi.org\/10.1145\/3302425.3302480","DOI":"10.1145\/3302425.3302480"},{"key":"1661_CR16","doi-asserted-by":"publisher","unstructured":"Mikolov T, Sutskever I, Chen K et al (2013) Distributed representations of words and phrases and their compositionality. In: Advances in neural information processing systems, p 26. https:\/\/doi.org\/10.48550\/arXiv.1310.4546","DOI":"10.48550\/arXiv.1310.4546"},{"key":"1661_CR17","doi-asserted-by":"publisher","unstructured":"Sun Z, Deng ZH, Nie JY et al (2019) RotatE: knowledge graph embedding by relational rotation in complex space. 2019. https:\/\/doi.org\/10.48550\/arXiv.1902.10197","DOI":"10.48550\/arXiv.1902.10197"},{"key":"1661_CR18","doi-asserted-by":"publisher","DOI":"10.3390\/jcp1040031","author":"K Perumalla","year":"2021","unstructured":"Perumalla K (2021) CyBERT: cybersecurity claim classification by fine-tuning the BERT language model. J Cybersecur Priv. https:\/\/doi.org\/10.3390\/jcp1040031","journal-title":"J Cybersecur Priv"},{"key":"1661_CR19","doi-asserted-by":"publisher","unstructured":"Das SS, Serra E, Halappanavar M et al (2021) V2W-BERT: a framework for effective hierarchical multiclass classification of software vulnerabilities. https:\/\/doi.org\/10.48550\/arXiv.2102.11498","DOI":"10.48550\/arXiv.2102.11498"},{"issue":"1","key":"1661_CR20","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/JRPROC.1961.287775","volume":"49","author":"M Minsky","year":"1961","unstructured":"Minsky M (1961) Steps toward artificial intelligence. Proc IRE 49(1):8\u201330. https:\/\/doi.org\/10.1109\/JRPROC.1961.287775","journal-title":"Proc IRE"},{"key":"1661_CR21","doi-asserted-by":"publisher","unstructured":"Xiong W, Hoang T, Wang WY (2017) DeepPath: A reinforcement learning method for knowledge graph reasoning. In: Proceedings of the 2017 conference on empirical methods in natural language processing. https:\/\/doi.org\/10.18653\/v1\/D17-1060","DOI":"10.18653\/v1\/D17-1060"},{"key":"1661_CR22","doi-asserted-by":"publisher","unstructured":"Li Z, Jin X, Guan S et al (2021) Search from history and reason for future: two-stage reasoning on temporal knowledge graphs. https:\/\/doi.org\/10.48550\/arXiv.2106.00327","DOI":"10.48550\/arXiv.2106.00327"},{"key":"1661_CR23","doi-asserted-by":"publisher","unstructured":"Amjadian E, Prayogo N, Mcdonnell S et al (2021) Attended-over distributed specificity for information extraction in cybersecurity. In: IEEE aerospace conference. IEEE. https:\/\/doi.org\/10.1109\/AERO50100.2021.9438369","DOI":"10.1109\/AERO50100.2021.9438369"},{"key":"1661_CR24","doi-asserted-by":"crossref","unstructured":"Pennington J, Socher R, Manning CD (2014) Glove: global vectors for word representation. In: Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP), pp 1532\u20131543. https:\/\/aclanthology.org\/D14-1162\/","DOI":"10.3115\/v1\/D14-1162"},{"key":"1661_CR25","doi-asserted-by":"publisher","unstructured":"Aghaei E, Niu X, Shadid W et al (2022) SecureBERT: a domain-specific language model for cybersecurity. https:\/\/doi.org\/10.48550\/arXiv.2204.02685","DOI":"10.48550\/arXiv.2204.02685"},{"issue":"1","key":"1661_CR26","doi-asserted-by":"publisher","first-page":"299","DOI":"10.32604\/cmc.2023.0","volume":"77","author":"Z Zhen","year":"2023","unstructured":"Zhen Z, Gao J (2023) Chinese cyber threat intelligence named entity recognition via Roberta-WWM-RDCNN-CRF. Comput Mater Continua 77(1):299\u2013323. https:\/\/doi.org\/10.32604\/cmc.2023.0","journal-title":"Comput Mater Continua"},{"key":"1661_CR27","doi-asserted-by":"publisher","unstructured":"Balaevi I, Allen C, Hospedales TM (2019) TuckER: tensor factorization for knowledge graph completion. https:\/\/doi.org\/10.18653\/v1\/D19-1522","DOI":"10.18653\/v1\/D19-1522"},{"key":"1661_CR28","doi-asserted-by":"publisher","first-page":"1201","DOI":"10.1007\/s40747-023-01205-1","volume":"10","author":"H Li","year":"2024","unstructured":"Li H, Shi Z, Pan C et al (2024) Cybersecurity knowledge graphs construction and quality assessment. Complex Intell Syst 10:1201\u20131217. https:\/\/doi.org\/10.1007\/s40747-023-01205-1","journal-title":"Complex Intell Syst"},{"key":"1661_CR29","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2020.2988841","author":"B Pan","year":"2023","unstructured":"Pan B, Li C, Che H et al (2023) Low-rank tensor regularized graph fuzzy learning for multi-view data processing. IEEE Trans Consum Electron. https:\/\/doi.org\/10.1109\/TFUZZ.2020.2988841","journal-title":"IEEE Trans Consum Electron"},{"key":"1661_CR30","doi-asserted-by":"publisher","unstructured":"Lample G, Ballesteros M, Subramanian S et al (2016) Neural architectures for named entity recognition. arXiv:1603.01360. https:\/\/doi.org\/10.48550\/arXiv.1603.01360","DOI":"10.48550\/arXiv.1603.01360"},{"key":"1661_CR31","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/BF00992696","volume":"8","author":"RJ Williams","year":"1992","unstructured":"Williams RJ (1992) Simple statistical gradient-following algorithms for connectionist reinforcement learning. Mach Learn 8:229\u2013256. https:\/\/doi.org\/10.1007\/BF00992696","journal-title":"Mach Learn"},{"key":"1661_CR32","doi-asserted-by":"publisher","unstructured":"Liu Y, Ott M, Goyal N et al (2019) RoBERTa: a robustly optimized BERT pretraining approach. https:\/\/doi.org\/10.48550\/arXiv.1907.11692","DOI":"10.48550\/arXiv.1907.11692"},{"key":"1661_CR33","doi-asserted-by":"publisher","unstructured":"Devlin J, Chang M W, Lee K et al (2018) Bert: pre-training of deep bidirectional transformers for language understanding. https:\/\/doi.org\/10.48550\/arXiv.1810.04805. arXiv:1810.04805","DOI":"10.48550\/arXiv.1810.04805"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01661-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-024-01661-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01661-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T20:20:26Z","timestamp":1738268426000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-024-01661-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,26]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["1661"],"URL":"https:\/\/doi.org\/10.1007\/s40747-024-01661-3","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,26]]},"assertion":[{"value":"20 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare they have no financial interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"54"}}