Fig. 6From: Joint contrastive learning and belief rule base for named entity recognition in cybersecurityThe performance of JCLB with different optimization algorithms for BRBBack to article page