{"id":"https://openalex.org/W3172754339","doi":"https://doi.org/10.1109/cscwd49262.2021.9437858","title":"A Method for Extracting Unstructured Threat Intelligence Based on Dictionary Template and Reinforcement Learning","display_name":"A Method for Extracting Unstructured Threat Intelligence Based on Dictionary Template and Reinforcement Learning","publication_year":2021,"publication_date":"2021-05-05","ids":{"openalex":"https://openalex.org/W3172754339","doi":"https://doi.org/10.1109/cscwd49262.2021.9437858","mag":"3172754339"},"language":"en","primary_location":{"id":"doi:10.1109/cscwd49262.2021.9437858","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd49262.2021.9437858","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079647672","display_name":"Xuren Wang","orcid":"https://orcid.org/0000-0003-4959-0454"},"institutions":[{"id":"https://openalex.org/I96852419","display_name":"Capital Normal University","ror":"https://ror.org/005edt527","country_code":"CN","type":"education","lineage":["https://openalex.org/I96852419"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xuren Wang","raw_affiliation_strings":["Information Engineering College, Capital Normal University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Information Engineering College, Capital Normal University, Beijing, China","institution_ids":["https://openalex.org/I96852419"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100418997","display_name":"Rong Chen","orcid":"https://orcid.org/0000-0001-5848-6398"},"institutions":[{"id":"https://openalex.org/I96852419","display_name":"Capital Normal University","ror":"https://ror.org/005edt527","country_code":"CN","type":"education","lineage":["https://openalex.org/I96852419"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rong Chen","raw_affiliation_strings":["Information Engineering College, Capital Normal University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Information Engineering College, Capital Normal University, Beijing, China","institution_ids":["https://openalex.org/I96852419"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071563499","display_name":"Binghua Song","orcid":"https://orcid.org/0009-0009-3577-0797"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Binghua Song","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078108605","display_name":"Jie Yang","orcid":"https://orcid.org/0000-0001-5696-363X"},"institutions":[{"id":"https://openalex.org/I96852419","display_name":"Capital Normal University","ror":"https://ror.org/005edt527","country_code":"CN","type":"education","lineage":["https://openalex.org/I96852419"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Yang","raw_affiliation_strings":["Information Engineering College, Capital Normal University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Information Engineering College, Capital Normal University, Beijing, China","institution_ids":["https://openalex.org/I96852419"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020151253","display_name":"Zhengwei Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhengwei Jiang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100434637","display_name":"Xiaoqing Zhang","orcid":"https://orcid.org/0000-0001-9759-2265"},"institutions":[{"id":"https://openalex.org/I96852419","display_name":"Capital Normal University","ror":"https://ror.org/005edt527","country_code":"CN","type":"education","lineage":["https://openalex.org/I96852419"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoqing Zhang","raw_affiliation_strings":["Information Engineering College, Capital Normal University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Information Engineering College, Capital Normal University, Beijing, China","institution_ids":["https://openalex.org/I96852419"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001111155","display_name":"Xiaomeng Li","orcid":"https://orcid.org/0009-0007-7175-3172"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaomeng Li","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073658311","display_name":"Shengqin Ao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shengqin Ao","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5079647672"],"corresponding_institution_ids":["https://openalex.org/I96852419"],"apc_list":null,"apc_paid":null,"fwci":1.7677,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.87379815,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"262","last_page":"267"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9824000000953674,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9746000170707703,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.841444194316864},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6043654084205627},{"id":"https://openalex.org/keywords/ambiguity","display_name":"Ambiguity","score":0.5186790227890015},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4499076008796692},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4489337205886841},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.4429800510406494}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.841444194316864},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6043654084205627},{"id":"https://openalex.org/C2780522230","wikidata":"https://www.wikidata.org/wiki/Q1140419","display_name":"Ambiguity","level":2,"score":0.5186790227890015},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4499076008796692},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4489337205886841},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.4429800510406494},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cscwd49262.2021.9437858","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd49262.2021.9437858","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.49000000953674316,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W2064675550","https://openalex.org/W2113013192","https://openalex.org/W2147880316","https://openalex.org/W2472414028","https://openalex.org/W2477560686","https://openalex.org/W2502081380","https://openalex.org/W2515462165","https://openalex.org/W2538865281","https://openalex.org/W2592177089","https://openalex.org/W2598491244","https://openalex.org/W2756381707","https://openalex.org/W2776652360","https://openalex.org/W2837911466","https://openalex.org/W2962902328","https://openalex.org/W2963625095","https://openalex.org/W3082479248","https://openalex.org/W3131634850","https://openalex.org/W4239319433","https://openalex.org/W6682082992","https://openalex.org/W6753157414","https://openalex.org/W6782971342","https://openalex.org/W6791104681"],"related_works":["https://openalex.org/W2961085424","https://openalex.org/W4306674287","https://openalex.org/W3046775127","https://openalex.org/W3170094116","https://openalex.org/W4386462264","https://openalex.org/W3209574120","https://openalex.org/W3107602296","https://openalex.org/W4312192474","https://openalex.org/W4210805261","https://openalex.org/W4387297750"],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"individuals,":[3],"organizations":[4],"and":[5,38,52,71,75,78,105,115,121,132,163,188,254,277],"countries":[6],"are":[7,109],"all":[8],"threatened":[9],"by":[10],"cyber":[11,29,80],"threats":[12],"to":[13,47,63,73,111],"some":[14],"degree.":[15],"The":[16,129,173],"proposal":[17],"of":[18,28,49,89,96,101,125,180,185,192,197,207,213,229,280],"threat":[19,32,81,118,126,141,198,208,218],"intelligence":[20,33,82,119,127,142,199,209,219],"sharing":[21,34],"scheme":[22,35],"has":[23],"greatly":[24],"helped":[25],"the":[26,87,102,123,148,158,170,181,186,190,195,211,217,227,234,245,251,273,278],"protection":[27],"security.":[30],"Traditional":[31],"mainly":[36],"collects":[37],"analyzes":[39],"information":[40,88,98,184],"manually,":[41],"which":[42,108],"include":[43,135],"but":[44],"not":[45],"limited":[46],"Indicators":[48],"Compromise":[50],"(IOC)":[51],"forms":[53],"a":[54,94,152,165,204,262,266],"machine":[55],"readable":[56],"report":[57],"for":[58],"Security":[59],"Operations":[60],"Center":[61],"(SOC)":[62],"take":[64],"corresponding":[65],"action.":[66],"Therefore,":[67],"it":[68],"is":[69,221],"challenging":[70],"significant":[72],"easily":[74],"automatically":[76],"share":[77],"exchange":[79],"(CTI).":[83],"Aiming":[84],"at":[85],"extracting":[86],"CTI":[90],"efficiently,":[91],"we":[92,249],"construct":[93],"model":[95,150,155,166,176,263,271],"automatic":[97],"extraction":[99,228,236],"process":[100,196],"entity":[103,143,200,214],"recognition":[104,144,215],"relationship":[106,281],"extraction,":[107],"used":[110],"extract":[112],"effective":[113],"entities":[114],"relationships":[116],"in":[117,194,216],"reports":[120],"improve":[122],"efficiency":[124,279],"sharing.":[128],"specific":[130],"content":[131],"research":[133],"results":[134],"two":[136],"aspects:":[137],"(1)":[138],"Research":[139,225],"on":[140,157,169,226],"model.":[145],"We":[146,232],"use":[147,179],"BERT":[149,174],"as":[151],"corpus":[153,187],"pre-training":[154,175],"based":[156,168],"classic":[159],"neural":[160,259],"network":[161],"BiLSTM-CRF,":[162],"proposes":[164],"DT-BERT-BiLSTM-CRF":[167],"dictionary":[171,205],"template.":[172],"makes":[177],"full":[178],"contextual":[182],"semantic":[183],"alleviates":[189],"problem":[191],"ambiguity":[193],"recognition.":[201],"By":[202],"constructing":[203],"template":[206],"entities,":[210],"accuracy":[212],"field":[220],"further":[222],"improved.":[223],"(2)":[224],"ITC":[230],"relations.":[231],"constructed":[233],"relation":[235],"data":[237],"set":[238],"with":[239],"distant":[240],"supervision":[241],"methods.":[242],"For":[243],"alleviating":[244],"noise":[246],"annotation":[247],"data,":[248],"introduce":[250],"attention":[252],"mechanism":[253],"reinforcement":[255],"learning":[256],"into":[257],"traditional":[258],"networks,":[260],"proposing":[261],"NR-RL-PCNN-ATT.":[264],"Through":[265],"new":[267],"reward":[268],"mechanism,":[269],"our":[270],"improves":[272],"sentence":[274],"selection":[275],"quality":[276],"extraction.":[282]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
