{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T14:45:00Z","timestamp":1750689900995,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T00:00:00Z","timestamp":1690416000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,27]]},"DOI":"10.1145\/3613330.3613346","type":"proceedings-article","created":{"date-parts":[[2023,9,28]],"date-time":"2023-09-28T16:09:21Z","timestamp":1695917361000},"page":"71-78","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Cybersecurity Named Entity Recognition Based on Word-level Enhancement and Multi-task Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5631-6413","authenticated-orcid":false,"given":"Yiqin","family":"Lu","sequence":"first","affiliation":[{"name":"School of Electronic and Information, South China University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3582-2659","authenticated-orcid":false,"given":"Hong","family":"Qi","sequence":"additional","affiliation":[{"name":"School of Electronic and Information, South China University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3763-458X","authenticated-orcid":false,"given":"Jiancheng","family":"Qin","sequence":"additional","affiliation":[{"name":"School of Electronic and Information, South China University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8449-2847","authenticated-orcid":false,"given":"Jiarui","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Electronic and Information, South China University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-5091-4582","authenticated-orcid":false,"given":"Weiqiang","family":"Pan","sequence":"additional","affiliation":[{"name":"School of Electronic and Information, South China University of Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2023,9,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/csr51186.2021.9527981"},{"issue":"05","key":"e_1_3_2_1_2_1","first-page":"590","article-title":"A review of Chinese named entity recognition based on deep learning","volume":"22","author":"Honghao Zheng","year":"2021","unstructured":"Zheng Honghao , Song Xuhui , Yu Hongtao , Li Shaomei , Hao Yinuo . 2021 . A review of Chinese named entity recognition based on deep learning . Journal of University of Information Engineering , 22 ( 05 ), 590 - 596 . Zheng Honghao, Song Xuhui, Yu Hongtao, Li Shaomei, Hao Yinuo. 2021. A review of Chinese named entity recognition based on deep learning. Journal of University of Information Engineering, 22(05), 590-596.","journal-title":"Journal of University of Information Engineering"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2020.2981314"},{"key":"e_1_3_2_1_4_1","unstructured":"TranThiHong Hanh Antoine Doucet Nicolas Sidere JoseG. Moreno and Senja Pollak. Named entity recognition architecture combining contextual and global features.  TranThiHong Hanh Antoine Doucet Nicolas Sidere JoseG. Moreno and Senja Pollak. Named entity recognition architecture combining contextual and global features."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1631\/fitee.2000286"},{"key":"e_1_3_2_1_6_1","volume-title":"International Conference on Computational Linguistics (August","author":"Yadav Vikas","year":"2018","unstructured":"Vikas Yadav and Steven Bethard . 2018 . A Survey on Recent Advances in Named Entity Recognition from Deep Learning models . International Conference on Computational Linguistics (August 2018). Vikas Yadav and Steven Bethard. 2018. A Survey on Recent Advances in Named Entity Recognition from Deep Learning models. International Conference on Computational Linguistics (August 2018)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/icsess.2018.8663820"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_9_1","volume-title":"Bidirectional LSTM-CRF Models for Sequence Tagging","author":"Huang Zhiheng","year":"2015","unstructured":"Zhiheng Huang , Wei Xu , and Kai Yu. 2015. Bidirectional LSTM-CRF Models for Sequence Tagging . Cornell University - arXiv ( August 2015 ). Zhiheng Huang, Wei Xu, and Kai Yu. 2015. Bidirectional LSTM-CRF Models for Sequence Tagging. Cornell University - arXiv (August 2015)."},{"key":"e_1_3_2_1_10_1","volume-title":"Attention is All you Need. Neural Information Processing Systems (June","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani , Noam Shazeer , Niki Parmar , Jakob Uszkoreit , Llion Jones , Aidan N. Gomez , Lukasz Kaiser , and Illia Polosukhin . 2017. Attention is All you Need. Neural Information Processing Systems (June 2017 ). Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, AidanN. Gomez, Lukasz Kaiser, and Illia Polosukhin. 2017. Attention is All you Need. Neural Information Processing Systems (June 2017)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1"},{"key":"e_1_3_2_1_12_1","volume-title":"DeBERTa: Decoding-enhanced BERT with Disentangled Attention","author":"He Pengcheng","year":"2020","unstructured":"Pengcheng He , Xiaodong Liu , Jianfeng Gao , and Weizhu Chen . 2020. DeBERTa: Decoding-enhanced BERT with Disentangled Attention . Cornell University - arXiv ( June 2020 ). Pengcheng He, Xiaodong Liu, Jianfeng Gao, and Weizhu Chen. 2020. DeBERTa: Decoding-enhanced BERT with Disentangled Attention. Cornell University - arXiv (June 2020)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/itnec48623.2020.9085102"},{"key":"e_1_3_2_1_14_1","volume-title":"Named Entity Recognition for Information Security Domain. DAMDID\/RCDL (January","author":"Mazharov Ivan","year":"2018","unstructured":"Ivan Mazharov and Boris V. Dobrov . 2018. Named Entity Recognition for Information Security Domain. DAMDID\/RCDL (January 2018 ). Ivan Mazharov and BorisV. Dobrov. 2018. Named Entity Recognition for Information Security Domain. DAMDID\/RCDL (January 2018)."},{"key":"e_1_3_2_1_15_1","unstructured":"Xuemei Gu . Jiayong Liu Pengsen Cheng and Xiang He. 2020. Malware name recognition in tweets based on enhanced BiLSTM-CRF model. Comput Sci 47 2 (2020) 245-250.  Xuemei Gu . Jiayong Liu Pengsen Cheng and Xiang He. 2020. Malware name recognition in tweets based on enhanced BiLSTM-CRF model. Comput Sci 47 2 (2020) 245-250."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ctisc54888.2022.9849830"},{"key":"e_1_3_2_1_17_1","volume-title":"ERNIE: Enhanced Representation through Knowledge Integration","author":"Sun Yu","year":"2019","unstructured":"Yu Sun , Wang Shuohuan , Yukun Li , Shikun Feng , Xu-Yi Chen , Han Zhang , Xin Tian , Zhu Danxiang , Hao Tian , and Hua Wu . 2019 . ERNIE: Enhanced Representation through Knowledge Integration . Cornell University - arXiv (April 2019). Yu Sun, Wang Shuohuan, Yukun Li, Shikun Feng, Xu-Yi Chen, Han Zhang, Xin Tian, Zhu Danxiang, Hao Tian, and Hua Wu. 2019. ERNIE: Enhanced Representation through Knowledge Integration. Cornell University - arXiv (April 2019)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313743"},{"key":"e_1_3_2_1_19_1","volume-title":"MTLAT: A Multi-Task Learning Framework Based on Adversarial Training for Chinese Cybersecurity NER. In IFIP International Conference on Network and Parallel Computing. Springer, 43-54","author":"Yaopeng Han","year":"2020","unstructured":"Han Yaopeng , Lu Zhigang , Jiang Bo , Liu Yuling , Zhang Chen , Jiang Zhengwei , and Li Ning . 2020 . MTLAT: A Multi-Task Learning Framework Based on Adversarial Training for Chinese Cybersecurity NER. In IFIP International Conference on Network and Parallel Computing. Springer, 43-54 . Han Yaopeng, Lu Zhigang, Jiang Bo, Liu Yuling, Zhang Chen, Jiang Zhengwei, and Li Ning. 2020. MTLAT: A Multi-Task Learning Framework Based on Adversarial Training for Chinese Cybersecurity NER. In IFIP International Conference on Network and Parallel Computing. Springer, 43-54."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1017"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSCA53499.2021.9650256"},{"key":"e_1_3_2_1_22_1","volume-title":"Transfer Learning for Scientific Data Chain Extraction in Small Chemical Corpus with BERT-CRF Model. International ACM SIGIR Conference on Research and Development in Information Retrieval (September","author":"Pang Na","year":"2019","unstructured":"Na Pang , Li Qian , Weimin Lyu , and Jin-Dong Yang . 2019 . Transfer Learning for Scientific Data Chain Extraction in Small Chemical Corpus with BERT-CRF Model. International ACM SIGIR Conference on Research and Development in Information Retrieval (September 2019). Na Pang, Li Qian, Weimin Lyu, and Jin-Dong Yang. 2019. Transfer Learning for Scientific Data Chain Extraction in Small Chemical Corpus with BERT-CRF Model. International ACM SIGIR Conference on Research and Development in Information Retrieval (September 2019)."}],"event":{"name":"ICDLT 2023: 2023 7th International Conference on Deep Learning Technologies","acronym":"ICDLT 2023","location":"Dalian China"},"container-title":["Proceedings of the 2023 7th International Conference on Deep Learning Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613330.3613346","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3613330.3613346","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:19Z","timestamp":1750178779000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613330.3613346"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,27]]},"references-count":22,"alternative-id":["10.1145\/3613330.3613346","10.1145\/3613330"],"URL":"https:\/\/doi.org\/10.1145\/3613330.3613346","relation":{},"subject":[],"published":{"date-parts":[[2023,7,27]]},"assertion":[{"value":"2023-09-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}