Skip to main content

Table 3 The samples according to word embedding method

From: Network security situation prediction based on feature separation and dual attention mechanism

Sample

1

2

3

\(x_{1}\)

0.04

(1.8, 0.4, 0.1)

(−0.5, −1.3, 0.9)

\(x_{2}\)

0.65

(−1.9, −0.3, −0.4)

(0.9, 1.7, 0.1)

\(x_{3}\)

0.25

(−1.9, −0.3, −0.4)

(0.9, 1.7, 0.1)

\(x_{4}\)

0.11

(−0.1, −0.6, −0.1)

(−0.4, −0.5, −1.5)