Chrome Extension
WeChat Mini Program
Use on ChatGLM

Textual Adversarial Attacks in Cybersecurity Named Entity Recognition

COMPUTERS & SECURITY(2025)

Cited 0|Views5
Key words
Cyber Threat Intelligence,Named Entity Recognition,Fine-tuned models,Adversarial examples,Word substitution,Adversarial detection
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined