Textual Adversarial Attacks in Cybersecurity Named Entity Recognition
COMPUTERS & SECURITY(2025)
Key words
Cyber Threat Intelligence,Named Entity Recognition,Fine-tuned models,Adversarial examples,Word substitution,Adversarial detection
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined