Update README.md
Browse files
README.md
CHANGED
|
@@ -12,31 +12,24 @@ tags:
|
|
| 12 |
|
| 13 |
## Dataset Overview
|
| 14 |
|
| 15 |
-
Security datasets are scattered on the Internet (CVE, CAPEC, CWE, etc.) and provided in CSV, JSON or XML formats. This makes it difficult to get a holistic view of the interconnectedness of information across different data sources. On the other hand, many datasets focus on specific attack vectors or limited environments, limiting generalisability
|
| 16 |
|
| 17 |
To solve these limits, security data can be extracted from diverse data sources, organised using a tabular data format and linked to existing knowledge graphs (KGs). This is called Semantic Table Interpretation. The KGs schema will help align different terminologies and understand the relationships between concepts.
|
| 18 |
|
| 19 |
Although humans can manually annotate tabular data, understanding the semantics of tables and annotating large volumes of data remains complex, resource-heavy and time-consuming. This has led to scientific challenges such as Tabular Data to Knowledge Graph Challenge - SemTab [https://www.cs.ox.ac.uk/isg/challenges/sem-tab/](https://www.cs.ox.ac.uk/isg/challenges/sem-tab/).
|
| 20 |
|
| 21 |
-
We provide in this repository the secu-table. This dataset aims to provide a holistic view of security data extracted from security data sources and organized in tables. It is constructed using the pipeline presented by this figure: 
|
| 22 |
|
| 23 |
## Dataset
|
| 24 |
The current version of the dataset consists of three releases:
|
| 25 |
-
- First release here
|
| 26 |
-
- Second release is here
|
| 27 |
|
| 28 |
## Dataset evaluation
|
| 29 |
-
The evaluation was conducted by running several experiments using open source LLMs
|
| 30 |
-
- Mistral
|
| 31 |
-
- Falcon
|
| 32 |
-
|
| 33 |
-
and close source LLM
|
| 34 |
-
- GPT-4o mini
|
| 35 |
-
|
| 36 |
-
on the ground truth by considering the three main tasks of semantic table interpretation:
|
| 37 |
- Cell Entity Annotation (CEA)
|
| 38 |
-
- Column Type Annotation
|
| 39 |
-
- Column Property Annotation.
|
| 40 |
|
| 41 |
In the first set of experiments, we consider only the fact that the LLMs can reply to the question without considering selective prediction as presented in this picture: 
|
| 42 |
|
|
@@ -59,7 +52,7 @@ Put the prompt here (Jean)
|
|
| 59 |
\end{lstlisting} -->
|
| 60 |
|
| 61 |
## Evaluation results
|
| 62 |
-
The
|
| 63 |
|
| 64 |
### Results without Selective Prediction
|
| 65 |
The results without selective prediction are presented in the following tables. The tables show the performance of the LLMs on the CEA tasks with sepses knowledge graph.
|
|
@@ -88,4 +81,4 @@ this tables show the performance of the LLMs for the SP score by considering the
|
|
| 88 |
|gpt-4o-mini | 0.456 |
|
| 89 |
|falcon3-7b-instruct | 0.270 |
|
| 90 |
|
| 91 |
-
|
|
|
|
| 12 |
|
| 13 |
## Dataset Overview
|
| 14 |
|
| 15 |
+
Security datasets are scattered on the Internet (CVE, CAPEC, CWE, etc.) and provided in CSV, JSON or XML formats. This makes it difficult to get a holistic view of the interconnectedness of information across different data sources. On the other hand, many datasets focus on specific attack vectors or limited environments, limiting generalisability. There is a lack of detailed annotations in datasets, making it difficult to train supervised learning models.
|
| 16 |
|
| 17 |
To solve these limits, security data can be extracted from diverse data sources, organised using a tabular data format and linked to existing knowledge graphs (KGs). This is called Semantic Table Interpretation. The KGs schema will help align different terminologies and understand the relationships between concepts.
|
| 18 |
|
| 19 |
Although humans can manually annotate tabular data, understanding the semantics of tables and annotating large volumes of data remains complex, resource-heavy and time-consuming. This has led to scientific challenges such as Tabular Data to Knowledge Graph Challenge - SemTab [https://www.cs.ox.ac.uk/isg/challenges/sem-tab/](https://www.cs.ox.ac.uk/isg/challenges/sem-tab/).
|
| 20 |
|
| 21 |
+
We provide in this repository the secu-table dataset. This dataset aims to provide a holistic view of security data extracted from security data sources and organized in tables. It is constructed using the pipeline presented by this figure: 
|
| 22 |
|
| 23 |
## Dataset
|
| 24 |
The current version of the dataset consists of three releases:
|
| 25 |
+
- First release [here](https://huggingface.co/datasets/jiofidelus/SecuTable/tree/v1.0) contains the first dataset which was created. It is composed of 1135 tables.
|
| 26 |
+
- Second release is [here](https://huggingface.co/datasets/jiofidelus/SecuTable/tree/main) consists of 1554 tables. This release is being used to evaluate the capabilities of open source LLMs to solve semantic table interpretation tasks during the SemTab challenge [https://sem-tab-challenge.github.io/2025/](https://sem-tab-challenge.github.io/2025/) hosted by the 24th international semantic web conference (ISWC) 2025. It is composed of two folders. The first folder contains the ground truth, composed of 76 tables, corresponding to 8922 entities. This subset will allow people working with the secu-table dataset to see how the dataset annotation should be done.
|
| 27 |
|
| 28 |
## Dataset evaluation
|
| 29 |
+
The evaluation was conducted by running several experiments using open source LLMs (Mistral, Falcon) and closed source LLM (GPT-4o mini) on the [ground truth consisting of 76 tables](https://huggingface.co/datasets/jiofidelus/SecuTable/tree/main/secutable_v2/ground_truth) by considering the three main tasks of semantic table interpretation:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 30 |
- Cell Entity Annotation (CEA)
|
| 31 |
+
- Column Type Annotation (CTA)
|
| 32 |
+
- Column Property Annotation (CPA).
|
| 33 |
|
| 34 |
In the first set of experiments, we consider only the fact that the LLMs can reply to the question without considering selective prediction as presented in this picture: 
|
| 35 |
|
|
|
|
| 52 |
\end{lstlisting} -->
|
| 53 |
|
| 54 |
## Evaluation results
|
| 55 |
+
The results are divided into two parts: the first part presents the results without selective prediction, and the second part presents the results with selective prediction.
|
| 56 |
|
| 57 |
### Results without Selective Prediction
|
| 58 |
The results without selective prediction are presented in the following tables. The tables show the performance of the LLMs on the CEA tasks with sepses knowledge graph.
|
|
|
|
| 81 |
|gpt-4o-mini | 0.456 |
|
| 82 |
|falcon3-7b-instruct | 0.270 |
|
| 83 |
|
| 84 |
+
## Citations
|