{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T01:14:33Z","timestamp":1772500473991,"version":"3.50.1"},"reference-count":31,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:00:00Z","timestamp":1725494400000},"content-version":"vor","delay-in-days":4,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004607","name":"Guangxi Natural Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Array"],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1016\/j.array.2024.100364","type":"journal-article","created":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T08:14:23Z","timestamp":1726128863000},"page":"100364","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["Threat intelligence named entity recognition techniques based on few-shot learning"],"prefix":"10.1016","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5702-9897","authenticated-orcid":false,"given":"Haiyan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Weimin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Wenying","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Liyi","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Zhaoquan","family":"Gu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.array.2024.100364_b1","doi-asserted-by":"crossref","unstructured":"Zhang K, Chen X, Jing Y, Wang S, Tang L. Survey of Research on Named Entity Recognition in Cyber Threat Intelligence. In: 2022 IEEE 7th international conference on smart cloud. smartCloud, 2022, p. 68\u201373.","DOI":"10.1109\/SmartCloud55982.2022.00017"},{"key":"10.1016\/j.array.2024.100364_b2","doi-asserted-by":"crossref","unstructured":"Top\u00e7u B, El-Kahlout \u0130D. Turkish Named Entity Recognition for Search Engine Queries. In: 2021 29th signal processing and communications applications conference. SIU, 2021, p. 1\u20134.","DOI":"10.1109\/SIU53274.2021.9509771"},{"key":"10.1016\/j.array.2024.100364_b3","doi-asserted-by":"crossref","unstructured":"Guven ZA, Unalir MO. Improving the BERT Model with Proposed Named Entity Recognition Method for Question Answering. In: 2021 6th international conference on computer science and engineering. UBMK, 2021, p. 204\u20138.","DOI":"10.1109\/UBMK52708.2021.9558992"},{"key":"10.1016\/j.array.2024.100364_b4","doi-asserted-by":"crossref","unstructured":"Punjabi S, Arsikere H, Garimella S. Language Model Bootstrapping Using Neural Machine Translation for Conversational Speech Recognition. In: 2019 IEEE automatic speech recognition and understanding workshop. ASRU, 2019, p. 487\u201393.","DOI":"10.1109\/ASRU46091.2019.9003982"},{"issue":"9","key":"10.1016\/j.array.2024.100364_b5","doi-asserted-by":"crossref","first-page":"1153","DOI":"10.1631\/FITEE.2000286","article-title":"A review on cyber security named entity recognition","volume":"22","author":"Gao","year":"2021","journal-title":"Front Inf Technol Electron Eng"},{"issue":"15","key":"10.1016\/j.array.2024.100364_b6","doi-asserted-by":"crossref","first-page":"3380","DOI":"10.3390\/s19153380","article-title":"Named-entity-recognition-based automated system for diagnosing cybersecurity situations in IoT networks","volume":"19","author":"Georgescu","year":"2019","journal-title":"Sensors"},{"key":"10.1016\/j.array.2024.100364_b7","first-page":"2018","article-title":"LSTM recurrent neural networks for cybersecurity named entity recognition","volume":"11","author":"Gasmi","year":"2018","journal-title":"ICSEA"},{"issue":"3","key":"10.1016\/j.array.2024.100364_b8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3386252","article-title":"Generalizing from a few examples: A survey on few-shot learning","volume":"53","author":"Wang","year":"2020","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"9","key":"10.1016\/j.array.2024.100364_b9","doi-asserted-by":"crossref","first-page":"4245","DOI":"10.1109\/TKDE.2020.3038670","article-title":"Few-shot named entity recognition via meta-learning","volume":"34","author":"Li","year":"2020","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"10.1016\/j.array.2024.100364_b10","article-title":"Prototypical networks for few-shot learning","volume":"30","author":"Snell","year":"2017","journal-title":"Adv Neural Inf Process Syst"},{"key":"10.1016\/j.array.2024.100364_b11","doi-asserted-by":"crossref","unstructured":"Yang Y, Katiyar A. Simple and Effective Few-Shot Named Entity Recognition with Structured Nearest Neighbor Learning. In: Proceedings of the 2020 conference on empirical methods in natural language processing. EMNLP, 2020, p. 6365\u201375.","DOI":"10.18653\/v1\/2020.emnlp-main.516"},{"key":"10.1016\/j.array.2024.100364_b12","doi-asserted-by":"crossref","unstructured":"Ye Z, Geng Y, Chen J, Chen J, Xu X, Zheng S, Wang F, Zhang J, Chen H. Zero-shot text classification via reinforced self-training. In: Proceedings of the 58th annual meeting of the association for computational linguistics.. 2020.","DOI":"10.18653\/v1\/2020.acl-main.272"},{"key":"10.1016\/j.array.2024.100364_b13","first-page":"3833","article-title":"Rethinking pre-training and self-training","volume":"33","author":"Zoph","year":"2020","journal-title":"Adv Neural Inf Process Syst"},{"key":"10.1016\/j.array.2024.100364_b14","doi-asserted-by":"crossref","unstructured":"Chen Y, Zhang Y, Zhang C, Lee G, Cheng R, Li H. Revisiting self-training for few-shot learning of language model. In: Proceedings of the 2021 conference on empirical methods in natural language processing. 2021, p. 9125\u201335.","DOI":"10.18653\/v1\/2021.emnlp-main.718"},{"key":"10.1016\/j.array.2024.100364_b15","unstructured":"Devlin J, Chang M, Lee K, Toutanova K. Bert: Pre-training of deep bidirectional transformers for language understanding. In: Proceedings of the 2019 conference of the North American chapter of the association for computational linguistics: human language technologies, volume 1 (long and short papers). 2019, p. 4171\u201386."},{"key":"10.1016\/j.array.2024.100364_b16","series-title":"Roberta: A robustly optimized bert pretraining approach","author":"Liu","year":"2019"},{"key":"10.1016\/j.array.2024.100364_b17","series-title":"ICLR","article-title":"Albert: A lite bert for self-supervised learning of language representations","author":"Lan","year":"2020"},{"key":"10.1016\/j.array.2024.100364_b18","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.inffus.2017.02.007","article-title":"Multi-view learning overview: Recent progress and new challenges","volume":"38","author":"Zhao","year":"2017","journal-title":"Inf Fusion"},{"key":"10.1016\/j.array.2024.100364_b19","first-page":"1","article-title":"Joint multi-view character embedding model for named entity recognition of Chinese car reviews","author":"Ding","year":"2023","journal-title":"Neural Comput Appl"},{"key":"10.1016\/j.array.2024.100364_b20","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1016\/j.ins.2022.03.085","article-title":"Multi-view approach to suggest moderation actions in community question answering sites","volume":"600","author":"Annamoradnejad","year":"2022","journal-title":"Inform Sci"},{"issue":"6","key":"10.1016\/j.array.2024.100364_b21","doi-asserted-by":"crossref","first-page":"283","DOI":"10.3390\/info13060283","article-title":"A novel multi-view ensemble learning architecture to improve the structured text classification","volume":"13","author":"Gon\u00e7alves","year":"2022","journal-title":"Information"},{"key":"10.1016\/j.array.2024.100364_b22","article-title":"Multi-view graph neural architecture search for biomedical entity and relation extraction","author":"Raeed","year":"2022","journal-title":"IEEE\/ACM Trans Comput Biol Bioinform"},{"key":"10.1016\/j.array.2024.100364_b23","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2019.105151","article-title":"Hybrid neural conditional random fields for multi-view sequence labeling","volume":"189","author":"Sun","year":"2020","journal-title":"Knowl-Based Syst"},{"key":"10.1016\/j.array.2024.100364_b24","article-title":"A review of research on co-training","author":"Ning","year":"2021","journal-title":"Concurr Comput: Pract Exp"},{"key":"10.1016\/j.array.2024.100364_b25","series-title":"IJCAI","first-page":"3933","article-title":"Adversarial incomplete multi-view clustering","author":"Xu","year":"2019"},{"issue":"2","key":"10.1016\/j.array.2024.100364_b26","doi-asserted-by":"crossref","first-page":"1456","DOI":"10.1109\/TII.2022.3206343","article-title":"Uncertainty-aware multiview deep learning for internet of things applications","volume":"19","author":"Xu","year":"2023","journal-title":"IEEE Trans Ind Inform"},{"key":"10.1016\/j.array.2024.100364_b27","article-title":"TABLE: Time-aware balanced multi-view learning for stock ranking","author":"Liu","year":"2024","journal-title":"Knowl-Based Syst"},{"key":"10.1016\/j.array.2024.100364_b28","series-title":"IEEE transactions on knowledge and data engineering","first-page":"1529","article-title":"Tri-training: exploiting unlabeled data using three classifiers","author":"Zhou","year":"2005"},{"key":"10.1016\/j.array.2024.100364_b29","doi-asserted-by":"crossref","unstructured":"Li W, et al. Drug Specification Named Entity Recognition Base on BiLSTM-CRF Model. In: 2019 IEEE 43rd annual computer software and applications conference. COMPSAC, Milwaukee, WI, USA; 2019, p. 429\u201333.","DOI":"10.1109\/COMPSAC.2019.10244"},{"issue":"5","key":"10.1016\/j.array.2024.100364_b30","doi-asserted-by":"crossref","first-page":"2713","DOI":"10.1109\/TCSS.2022.3183685","article-title":"Multi-information preprocessing event extraction with BiLSTM-CRF attention for academic knowledge graph construction","volume":"10","author":"Chang","year":"2023","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"10.1016\/j.array.2024.100364_b31","doi-asserted-by":"crossref","unstructured":"He B, Chen J. Named Entity Recognition Method in Network Security Domain Based on BERT-BiLSTM-CRF. In: 2021 IEEE 21st international conference on communication technology. ICCT, Tianjin, China; 2021, p. 508\u201312.","DOI":"10.1109\/ICCT52962.2021.9657857"}],"container-title":["Array"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2590005624000304?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2590005624000304?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,10,13]],"date-time":"2024-10-13T21:40:22Z","timestamp":1728855622000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2590005624000304"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9]]},"references-count":31,"alternative-id":["S2590005624000304"],"URL":"https:\/\/doi.org\/10.1016\/j.array.2024.100364","relation":{},"ISSN":["2590-0056"],"issn-type":[{"value":"2590-0056","type":"print"}],"subject":[],"published":{"date-parts":[[2024,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Threat intelligence named entity recognition techniques based on few-shot learning","name":"articletitle","label":"Article Title"},{"value":"Array","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.array.2024.100364","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 The Author(s). Published by Elsevier Inc.","name":"copyright","label":"Copyright"}],"article-number":"100364"}}