{"id":"https://openalex.org/W4404520497","doi":"https://doi.org/10.1109/tccn.2024.3502516","title":"Overlapping Entity Relation Extraction for Cybersecurity Based on Complex Tagging and Rule-Enhanced Prompt Learning","display_name":"Overlapping Entity Relation Extraction for Cybersecurity Based on Complex Tagging and Rule-Enhanced Prompt Learning","publication_year":2024,"publication_date":"2024-11-19","ids":{"openalex":"https://openalex.org/W4404520497","doi":"https://doi.org/10.1109/tccn.2024.3502516"},"language":"en","primary_location":{"id":"doi:10.1109/tccn.2024.3502516","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tccn.2024.3502516","pdf_url":null,"source":{"id":"https://openalex.org/S2484188435","display_name":"IEEE Transactions on Cognitive Communications and Networking","issn_l":"2332-7731","issn":["2332-7731","2372-2045"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cognitive Communications and Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012085281","display_name":"Zhaoyun Ding","orcid":"https://orcid.org/0000-0002-7167-5801"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhaoyun Ding","raw_affiliation_strings":["National Key Laboratory of Information Systems Engineering, National University of Defense Technology, Changsha, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"National Key Laboratory of Information Systems Engineering, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Fei Wang","orcid":"https://orcid.org/0009-0008-0898-9665"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fei Wang","raw_affiliation_strings":["National Key Laboratory of Information Systems Engineering, National University of Defense Technology, Changsha, China"],"raw_orcid":"https://orcid.org/0009-0008-0898-9665","affiliations":[{"raw_affiliation_string":"National Key Laboratory of Information Systems Engineering, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082402770","display_name":"Fan Wu","orcid":"https://orcid.org/0000-0003-3615-1217"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fan Wu","raw_affiliation_strings":["School of Computer Science and Engineering, Central South University, Changsha, China","School of Computer Science and Engineering, Central South University, China"],"raw_orcid":"https://orcid.org/0000-0003-3615-1217","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007306443","display_name":"Lehai Xin","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lehai Xin","raw_affiliation_strings":["National Key Laboratory of Information Systems Engineering, National University of Defense Technology, Changsha, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"National Key Laboratory of Information Systems Engineering, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100399811","display_name":"Kai Liu","orcid":"https://orcid.org/0000-0001-7252-5939"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Liu","raw_affiliation_strings":["National Key Laboratory of Information Systems Engineering, National University of Defense Technology, Changsha, China"],"raw_orcid":"https://orcid.org/0000-0001-7252-5939","affiliations":[{"raw_affiliation_string":"National Key Laboratory of Information Systems Engineering, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067670271","display_name":"Deqi Cao","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Deqi Cao","raw_affiliation_strings":["National Key Laboratory of Information Systems Engineering, National University of Defense Technology, Changsha, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"National Key Laboratory of Information Systems Engineering, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5012085281"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.24922368,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"11","issue":"2","first_page":"1064","last_page":"1077"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12016","display_name":"Web Data Mining and Analysis","score":0.979200005531311,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8787091970443726},{"id":"https://openalex.org/keywords/relation","display_name":"Relation (database)","score":0.6125984787940979},{"id":"https://openalex.org/keywords/relationship-extraction","display_name":"Relationship extraction","score":0.502225399017334},{"id":"https://openalex.org/keywords/rule-based-system","display_name":"Rule-based system","score":0.49977970123291016},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.423128604888916},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.41386252641677856},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.3376331329345703}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8787091970443726},{"id":"https://openalex.org/C25343380","wikidata":"https://www.wikidata.org/wiki/Q277521","display_name":"Relation (database)","level":2,"score":0.6125984787940979},{"id":"https://openalex.org/C153604712","wikidata":"https://www.wikidata.org/wiki/Q7310755","display_name":"Relationship extraction","level":3,"score":0.502225399017334},{"id":"https://openalex.org/C149271511","wikidata":"https://www.wikidata.org/wiki/Q1417149","display_name":"Rule-based system","level":2,"score":0.49977970123291016},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.423128604888916},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.41386252641677856},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.3376331329345703}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tccn.2024.3502516","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tccn.2024.3502516","pdf_url":null,"source":{"id":"https://openalex.org/S2484188435","display_name":"IEEE Transactions on Cognitive Communications and Networking","issn_l":"2332-7731","issn":["2332-7731","2372-2045"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cognitive Communications and Networking","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.41999998688697815,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[{"id":"https://openalex.org/G1491834576","display_name":null,"funder_award_id":"2023SK2020","funder_id":"https://openalex.org/F4320330214","funder_display_name":"Key Research and Development Program of Hunan Province of China"},{"id":"https://openalex.org/G2795870502","display_name":null,"funder_award_id":"2024JJ4068","funder_id":"https://openalex.org/F4320322843","funder_display_name":"Natural Science Foundation of\u00a0Hunan Province"},{"id":"https://openalex.org/G4016464524","display_name":null,"funder_award_id":"62320106006","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4285073634","display_name":null,"funder_award_id":"62341201","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6863796122","display_name":null,"funder_award_id":"62372472","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322843","display_name":"Natural Science Foundation of\u00a0Hunan Province","ror":null},{"id":"https://openalex.org/F4320330214","display_name":"Key Research and Development Program of Hunan Province of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W2120615054","https://openalex.org/W2962739339","https://openalex.org/W3030163527","https://openalex.org/W3102021238","https://openalex.org/W3172642864","https://openalex.org/W3176489198","https://openalex.org/W3185341429","https://openalex.org/W3195893957","https://openalex.org/W4320525735","https://openalex.org/W4320525799","https://openalex.org/W6679436768","https://openalex.org/W6713582272","https://openalex.org/W6737778391","https://openalex.org/W6739901393","https://openalex.org/W6755207826","https://openalex.org/W6759579507","https://openalex.org/W6763701032","https://openalex.org/W6768021236","https://openalex.org/W6771917389","https://openalex.org/W6776974286","https://openalex.org/W6784682006","https://openalex.org/W6810033100","https://openalex.org/W6839582719","https://openalex.org/W6852980431","https://openalex.org/W6853081542"],"related_works":["https://openalex.org/W2976808399","https://openalex.org/W2609844752","https://openalex.org/W4392969631","https://openalex.org/W4285246823","https://openalex.org/W4226278302","https://openalex.org/W4221160509","https://openalex.org/W2547211086","https://openalex.org/W2538200646","https://openalex.org/W1968988659","https://openalex.org/W2888033806"],"abstract_inverted_index":{"Cyberspace":[0],"security":[1],"is":[2,73,133,219],"one":[3],"of":[4,14,23,30,58,70,137,178,209,216,233],"the":[5,12,15,28,56,68,103,158,191,207,214,217,222],"areas":[6],"that":[7,123],"must":[8],"be":[9],"prioritized":[10],"in":[11,27,99],"development":[13],"Internet":[16],"and":[17,40,66,85,110,127,148,166,181,205,227],"artificial":[18],"intelligence.":[19],"The":[20,153],"fourth":[21],"paradigm":[22],"\u201cPre-train,":[24],"Prompt,":[25],"Predict\u201d":[26],"field":[29],"natural":[31],"language":[32],"processing":[33],"(NLP)":[34],"has":[35],"significantly":[36],"enhanced":[37],"NLP":[38],"efficiency":[39,204],"accuracy":[41],"by":[42,106],"shifting":[43],"downstream":[44],"tasks":[45],"from":[46],"masked":[47],"to":[48,201],"generative,":[49],"marking":[50],"a":[51,92,119,134,144,149,163,228],"new":[52],"leap":[53],"forward.":[54],"In":[55],"realm":[57],"cyberspace":[59],"security,":[60],"where":[61],"information":[62,77],"flows":[63],"are":[64,188],"vast":[65],"multifaceted,":[67],"focus":[69],"this":[71,89],"paper":[72,90],"on":[74,82,221],"extracting":[75,95],"multi-relational":[76],"among":[78,113],"multiple":[79,114],"entities.":[80],"Based":[81],"complex":[83,125],"tagging":[84,126],"rule-enhanced":[86,128],"prompting":[87,129,183],"learning,":[88],"proposes":[91],"method":[93],"for":[94],"overlapping":[96,234],"entity":[97,108,141,154,168,235],"relationships":[98],"cybersecurity.":[100],"To":[101],"address":[102],"challenges":[104],"posed":[105],"\u201coverlapping":[107],"relationships\u201d":[109],"\u201cnested":[111,159],"entities\u201d":[112],"entities,":[115],"we":[116],"have":[117],"designed":[118],"triple":[120],"extraction":[121],"model":[122,132,156,203,218],"integrates":[124],"learning.":[130],"This":[131],"pipeline":[135],"consisting":[136],"three":[138],"parts:":[139],"an":[140],"recognition":[142,155],"model,":[143,194],"rule":[145],"injection":[146,171],"module,":[147],"relation":[150,192],"classification":[151,193],"model.":[152],"tackles":[157],"entity\u201d":[160],"problem":[161],"through":[162],"multi-label":[164],"layer":[165],"performs":[167],"classification.":[169],"Rule":[170],"serves":[172],"two":[173],"purposes:":[174],"constraining":[175],"possible":[176],"combinations":[177],"knowledge":[179],"triples":[180],"constructing":[182],"learning":[184],"templates.":[185],"These":[186],"templates":[187],"input":[189],"into":[190],"which":[195],"cleverly":[196],"utilizes":[197],"suspended":[198],"position":[199],"markers":[200],"improve":[202],"maximize":[206],"utilization":[208],"global":[210],"semantic":[211],"information.":[212],"Finally,":[213],"effectiveness":[215],"validated":[220],"general":[223],"dataset":[224,232],"DUIE":[225],"2.0":[226],"self-constructed":[229],"Chinese":[230],"cybersecurity":[231],"relationships.":[236]},"counts_by_year":[],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
