Fig. 3From: Joint contrastive learning and belief rule base for named entity recognition in cybersecurityStructure of the BRBBack to article page