Fig. 4From: Joint contrastive learning and belief rule base for named entity recognition in cybersecurityPerformance of recognition for ten categories of cybersecurity entities achieved by various modelsBack to article page