2021
DOI: 10.1007/978-3-030-87839-9_3
|View full text |Cite
|
Sign up to set email alerts
|

Few-Sample Named Entity Recognition for Security Vulnerability Reports by Fine-Tuning Pre-trained Language Models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(1 citation statement)
references
References 26 publications
0
1
0
Order By: Relevance
“…For the first metric, we tune the alignment threshold during testing and report the highest precision when the recall reaches the given value. A higher recall value is more desirable in the security applications (Yang et al, 2021) to recover the identities of vulnerabilities missing identifiers, where the false positives can be excluded through handful manual verification. For F1 evaluation we use the decision threshold that achieves the highest macro F1 during validation.…”
Section: Experimental Settingsmentioning
confidence: 99%
“…For the first metric, we tune the alignment threshold during testing and report the highest precision when the recall reaches the given value. A higher recall value is more desirable in the security applications (Yang et al, 2021) to recover the identities of vulnerabilities missing identifiers, where the false positives can be excluded through handful manual verification. For F1 evaluation we use the decision threshold that achieves the highest macro F1 during validation.…”
Section: Experimental Settingsmentioning
confidence: 99%