DatasetSubmission commited on
Commit
6317825
·
verified ·
1 Parent(s): 6b97810

Add etg_croissant_anonymous.json

Browse files
Files changed (1) hide show
  1. etg_croissant_anonymous.json +444 -0
etg_croissant_anonymous.json ADDED
@@ -0,0 +1,444 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "@context": {
3
+ "@language": "en",
4
+ "@vocab": "https://schema.org/",
5
+ "cr": "http://mlcommons.org/croissant/",
6
+ "sc": "https://schema.org/",
7
+ "dct": "http://purl.org/dc/terms/",
8
+ "rai": "http://mlcommons.org/croissant/RAI/",
9
+ "prov": "http://www.w3.org/ns/prov#"
10
+ },
11
+ "@type": "sc:Dataset",
12
+ "conformsTo": "http://mlcommons.org/croissant/1.0",
13
+ "dct:conformsTo": "http://mlcommons.org/croissant/1.0",
14
+ "name": "HackerSignal",
15
+ "description": "HackerSignal is a large-scale, multi-source dataset linking hacker community discourse, exploit databases, vulnerability advisories, and fix commits through a shared CVE identifier space. It spans 64 public forum/source identifiers across eight source layers, covers 1991\u20132026, and supports three benchmark tasks: (1) CVE linkage retrieval (cross-source temporal out-of-distribution entity grounding over 340K NVD descriptions), (2) exploit type classification (8-class vulnerability type prediction with temporal OOD evaluation), and (3) temporal CVE-disjoint generalization (prospective retrieval where the gold CVE sets in train and test are disjoint).",
16
+ "url": "https://huggingface.co/datasets/DatasetSubmission/HackerSignal",
17
+ "version": "1.0.0",
18
+ "license": "https://creativecommons.org/licenses/by/4.0/",
19
+ "usageInfo": "Code and metadata are CC BY 4.0 unless otherwise noted. Source text follows source-specific release modes documented in docs/release_governance.md; terms-ambiguous sources may be metadata_or_pointer_only.",
20
+ "isAccessibleForFree": true,
21
+ "datePublished": "2026",
22
+ "inLanguage": [
23
+ "en",
24
+ "zh",
25
+ "ru"
26
+ ],
27
+ "citation": "Anonymous (2026). HackerSignal \u2014 A Multi-Source Dataset for Hacker Community Analysis and CVE Linkage. Submitted to NeurIPS Evaluations & Datasets Track.",
28
+ "cr:citeAs": "Anonymous (2026). HackerSignal \u2014 A Multi-Source Dataset for Hacker Community Analysis and CVE Linkage. Submitted to NeurIPS Evaluations & Datasets Track.",
29
+ "creator": [
30
+ {
31
+ "@type": "sc:Person",
32
+ "name": "Anonymous"
33
+ }
34
+ ],
35
+ "keywords": [
36
+ "cybersecurity",
37
+ "exploit",
38
+ "vulnerability",
39
+ "CVE",
40
+ "hacker forum",
41
+ "threat intelligence",
42
+ "NLP",
43
+ "information retrieval",
44
+ "text classification",
45
+ "benchmark"
46
+ ],
47
+ "prov:wasDerivedFrom": [
48
+ {
49
+ "@type": "cr:FileObject",
50
+ "name": "NVD (National Vulnerability Database)",
51
+ "contentUrl": "https://services.nvd.nist.gov/rest/json/cves/2.0",
52
+ "description": "US government public-domain CVE records via REST API."
53
+ },
54
+ {
55
+ "@type": "cr:FileObject",
56
+ "name": "CISA KEV (Known Exploited Vulnerabilities)",
57
+ "contentUrl": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
58
+ "description": "US government public-domain catalog of actively exploited vulnerabilities."
59
+ },
60
+ {
61
+ "@type": "cr:FileObject",
62
+ "name": "GitHub Advisory Database",
63
+ "contentUrl": "https://github.com/advisories",
64
+ "description": "Security advisories via GraphQL API, licensed CC BY 4.0."
65
+ },
66
+ {
67
+ "@type": "cr:FileObject",
68
+ "name": "ExploitDB",
69
+ "contentUrl": "https://www.exploit-db.com/",
70
+ "description": "Public exploit archive, licensed CC BY-SA 4.0."
71
+ },
72
+ {
73
+ "@type": "cr:FileObject",
74
+ "name": "CVEfixes",
75
+ "contentUrl": "https://zenodo.org/records/7029359",
76
+ "description": "Fix commits and CVE metadata from Zenodo, licensed CC BY 4.0."
77
+ },
78
+ {
79
+ "@type": "cr:FileObject",
80
+ "name": "HackerOne Public Reports",
81
+ "contentUrl": "https://huggingface.co/datasets",
82
+ "description": "Public bug bounty reports from HuggingFace Hub."
83
+ },
84
+ {
85
+ "@type": "cr:FileObject",
86
+ "name": "DeepDarkCTI",
87
+ "contentUrl": "https://github.com/fastfire/deepdarkCTI",
88
+ "description": "Cyber threat intelligence from GitHub public dataset."
89
+ }
90
+ ],
91
+ "prov:wasGeneratedBy": {
92
+ "@type": "prov:Activity",
93
+ "name": "HackerSignal ETL Pipeline",
94
+ "description": "Collection scripts executed by the dataset authors between January and April 2026 using public APIs, public dataset ingestion, web scraping of publicly accessible pages, and pre-processed dataset imports. The pipeline performs HTML stripping, encoding normalization, text truncation (8000 chars), exact deduplication by SHA-256 fingerprint, author pseudonymization, and source-layer normalization.",
95
+ "prov:startedAtTime": "2026-01-01",
96
+ "prov:endedAtTime": "2026-04-30"
97
+ },
98
+ "rai:dataCollection": "Data was collected through four mechanisms: (1) Public APIs \u2014 NVD (NIST REST), GitHub Advisory Database (GraphQL), CISA KEV (JSON feed), HackerOne (HuggingFace Hub); (2) Public dataset ingestion \u2014 Gayanku (Kaggle), HackForums (Kaggle), DTL Exploits (GitHub/AZSecure), CVEfixes (Zenodo), DeepDarkCTI (GitHub), Kaeli hacker forums (Kaggle), CrackingArena (Kaggle), ZeroDay (GitHub); (3) Web scraping and public forum APIs \u2014 ExploitDB (CSV), Vulnerability-Lab, ZeroScience Lab, 0x00sec, HackerSploit, ParrotSec, Hack The Box, Go4Expert, Full Disclosure mailing list archive, Seebug; (4) Pre-processed datasets from HuggingFace Hub. All sources were publicly accessible at collection time; no authentication was bypassed.",
99
+ "rai:dataCollectionType": "Web scraping, API, Surveys/Interviews",
100
+ "rai:dataCollectionTimeframe": {
101
+ "@type": "sc:DateTime",
102
+ "startDate": "2026-01-01",
103
+ "endDate": "2026-04-30"
104
+ },
105
+ "rai:dataCollectionRawData": "Raw scraped HTML is not distributed. The processed JSONL files are the primary artifact. Collection and preprocessing scripts are available in the src/etg/collectors/ directory of the code repository.",
106
+ "rai:dataCollectionMissingData": "Coverage is limited by public API availability, rate limits, and pagination depth for forum sources. Posts behind authentication walls are excluded. Some timestamps reflect scraping date rather than original publication date. Author information is pseudonymized and not recoverable. Some legacy forum imports do not preserve thread structure.",
107
+ "rai:dataPreprocessingProtocol": "HTML tags stripped from forum post content; HTML entities unescaped; text truncated at 8000 characters; encoding errors replaced with Unicode replacement character (U+FFFD); source provenance normalized into source_dataset, source_layer, forum_id, and optional thread/category fields; exact duplicates removed across sources by normalized-text SHA-256 fingerprint; near-duplicates removed via MinHash-LSH (128 permutations, 3-char k-shingles, Jaccard > 0.7); author strings pseudonymized via SHA-256 hashing of source-namespaced author identifiers.",
108
+ "rai:dataLimitations": "Forum sources skew toward English-language Western cybersecurity communities; threats emerging from non-English communities may be underrepresented. High-volume historical forum imports skew toward 2015\u20132017 or earlier. Task 1 (CVE-R) and Task 3 (TG) labels are metadata-derived CVE linkages (source URL or CVE regex extraction), not manually adjudicated ground truth; CVE-index absence is not a manual negative annotation. Task 2 (ETC) labels are derived from structured metadata fields (ExploitDB exploit descriptions, 0day.today exploit type fields, HackerOne vulnerability type prefixes) mapped to an 8-class taxonomy via deterministic rules; they are not human-validated annotations. Approximately 8.18% near-duplicate content remains after exact deduplication. The corpus contains 1,569,263 rows under eight tokens, useful for interaction analysis but not for text classification tasks.",
109
+ "rai:dataBiases": "English-language bias: the corpus is predominantly English with multilingual content (Russian, Turkish, Persian, Arabic, Chinese) limited to deepdarkcti and several community sources. Temporal bias: bulk of structured NVD records begin in 2002; high-volume forum imports cluster around 2015\u20132017. Source selection bias: only publicly indexed or API-accessible sources are included, potentially underrepresenting closed or invitation-only communities. CISA KEV covers only actively exploited vulnerabilities, over-representing critical severity relative to true distribution. Western-centric community selection may underrepresent threat actors operating primarily in non-English forums.",
110
+ "rai:personalSensitiveInformation": "No private communications, medical records, financial records, or government classified information is intentionally included. All text was collected from publicly accessible sources. Author strings are pseudonymized via SHA-256 hashing of source-namespaced author identifiers; original author strings are not recoverable from the released dataset. Public forum usernames are not distributed. The release supports takedown and correction requests through the repository issue tracker.",
111
+ "rai:dataUseCases": "Intended uses: defensive cybersecurity research, temporal retrieval, provenance-aware benchmark design, vulnerability lifecycle analysis, exploit prediction and early warning systems, cross-lingual threat intelligence, graph neural network research on exploit\u2013CVE\u2013fix commit knowledge graphs, and pre-training domain-adapted language models for cybersecurity. Prohibited uses: training systems for automated exploit code generation or malware; de-anonymizing forum participants or linking pseudonymous identities outside approved research protocols; operational blocking, law-enforcement, or employment decisions based solely on model outputs; republishing source text from metadata_or_pointer_only sources.",
112
+ "rai:dataSocialImpact": "HackerSignal enables earlier detection of vulnerability exploitation activity by connecting hacker community discourse to the CVE lifecycle. Positive impacts include faster defensive response times and better understanding of exploit emergence patterns. Potential negative impacts include misuse for automated attack generation or targeting of individuals; these are mitigated through responsible-use restrictions, author pseudonymization, source-level release governance, and explicit prohibition of offensive applications in the dataset license.",
113
+ "rai:dataReleaseMaintenancePlan": "Maintained by the dataset maintainer (contact via repository issue tracker). Annual updates planned to incorporate new CVE records, CISA KEV entries, and newly published advisories. Versioning follows semantic versioning (MAJOR.MINOR.PATCH). All tagged versions remain available on HuggingFace Hub. Takedown and correction requests acknowledged within 10 business days; disputed text removed in next patch release. Sources that change terms post-release are downgraded to metadata_or_pointer_only until permissions are clarified.",
114
+ "rai:hasSyntheticData": "none",
115
+ "distribution": [
116
+ {
117
+ "@type": "cr:FileObject",
118
+ "@id": "hf-repo",
119
+ "name": "HuggingFace Repository",
120
+ "contentUrl": "https://huggingface.co/datasets/DatasetSubmission/HackerSignal",
121
+ "encodingFormat": "application/jsonlines",
122
+ "sha256": "See versioned manifest checksums in the HuggingFace repository."
123
+ },
124
+ {
125
+ "@type": "cr:FileObject",
126
+ "@id": "public-jsonl",
127
+ "name": "unified_hacker_communities_neurips_public.jsonl",
128
+ "description": "Governed public release file enforcing source-level release modes from data/release/source_release_manifest.json.",
129
+ "contentUrl": "https://huggingface.co/datasets/DatasetSubmission/HackerSignal/resolve/main/data/unified_hacker_communities_neurips_public.jsonl",
130
+ "encodingFormat": "application/jsonlines",
131
+ "sha256": "bd409acd7ffc37ced54ac8d4808cb0a1339cb7cb8c7dd229e73b32d706805e4f"
132
+ },
133
+ {
134
+ "@type": "cr:FileObject",
135
+ "@id": "source-manifest",
136
+ "name": "source_release_manifest.json",
137
+ "description": "Machine-readable source provenance and release-mode manifest with checksums and row counts.",
138
+ "contentUrl": "https://huggingface.co/datasets/DatasetSubmission/HackerSignal/resolve/main/data/release/source_release_manifest.json",
139
+ "encodingFormat": "application/json",
140
+ "sha256": "ae692c8fe41af184ac13b324d48adb39dc49bfc88876c67086eac947c6a1d500"
141
+ }
142
+ ],
143
+ "recordSet": [
144
+ {
145
+ "@type": "cr:RecordSet",
146
+ "@id": "posts",
147
+ "name": "posts",
148
+ "description": "Forum posts, exploit advisories, vulnerability descriptions, and fix-commit messages from 64 public forum/source identifiers. Each record is one document. 7,447,646 exact-deduplicated rows spanning 1988\u20132026.",
149
+ "field": [
150
+ {
151
+ "@type": "cr:Field",
152
+ "@id": "posts/unified_id",
153
+ "name": "unified_id",
154
+ "description": "SHA-256-derived release identifier.",
155
+ "dataType": "sc:Text"
156
+ },
157
+ {
158
+ "@type": "cr:Field",
159
+ "@id": "posts/source_dataset",
160
+ "name": "source_dataset",
161
+ "description": "Input source file or dataset name.",
162
+ "dataType": "sc:Text"
163
+ },
164
+ {
165
+ "@type": "cr:Field",
166
+ "@id": "posts/source_layer",
167
+ "name": "source_layer",
168
+ "description": "Normalized layer: hacker_community, exploit_archive, vulnerability_reference, fix_commit_reference, exploit_qa_reference, or exploitation_reference.",
169
+ "dataType": "sc:Text"
170
+ },
171
+ {
172
+ "@type": "cr:Field",
173
+ "@id": "posts/text",
174
+ "name": "text",
175
+ "description": "Full text of the post or advisory (UTF-8, max 8000 chars). Withheld for metadata_or_pointer_only sources.",
176
+ "dataType": "sc:Text"
177
+ },
178
+ {
179
+ "@type": "cr:Field",
180
+ "@id": "posts/text_raw",
181
+ "name": "text_raw",
182
+ "description": "Source text before release cleaning, where available. Withheld for metadata_or_pointer_only sources.",
183
+ "dataType": "sc:Text"
184
+ },
185
+ {
186
+ "@type": "cr:Field",
187
+ "@id": "posts/timestamp",
188
+ "name": "timestamp",
189
+ "description": "Publication date-time (ISO 8601, UTC).",
190
+ "dataType": "sc:DateTime"
191
+ },
192
+ {
193
+ "@type": "cr:Field",
194
+ "@id": "posts/forum_id",
195
+ "name": "forum_id",
196
+ "description": "Source identifier (e.g. 'exploitdb', 'nvd', 'hackforums').",
197
+ "dataType": "sc:Text"
198
+ },
199
+ {
200
+ "@type": "cr:Field",
201
+ "@id": "posts/author_hash",
202
+ "name": "author_hash",
203
+ "description": "SHA-256 hash of the source-namespaced author string (pseudonymised).",
204
+ "dataType": "sc:Text"
205
+ },
206
+ {
207
+ "@type": "cr:Field",
208
+ "@id": "posts/release_mode",
209
+ "name": "release_mode",
210
+ "description": "Release-governance mode: redistributable_text, research_text_with_terms, metadata_or_pointer_only, or excluded.",
211
+ "dataType": "sc:Text"
212
+ },
213
+ {
214
+ "@type": "cr:Field",
215
+ "@id": "posts/thread_url",
216
+ "name": "thread_url",
217
+ "description": "Source thread URL when exposed by the source.",
218
+ "dataType": "sc:URL"
219
+ },
220
+ {
221
+ "@type": "cr:Field",
222
+ "@id": "posts/thread_title",
223
+ "name": "thread_title",
224
+ "description": "Thread or advisory title when available.",
225
+ "dataType": "sc:Text"
226
+ },
227
+ {
228
+ "@type": "cr:Field",
229
+ "@id": "posts/section",
230
+ "name": "section",
231
+ "description": "Forum section or category when available.",
232
+ "dataType": "sc:Text"
233
+ }
234
+ ]
235
+ },
236
+ {
237
+ "@type": "cr:RecordSet",
238
+ "@id": "cve_index",
239
+ "name": "cve_index",
240
+ "description": "Cross-source CVE linkage index mapping post IDs to CVE identifiers. One row per (post, CVE) pair. 360,004 rows contain CVE identifiers.",
241
+ "field": [
242
+ {
243
+ "@type": "cr:Field",
244
+ "@id": "cve_index/exploit_id",
245
+ "name": "exploit_id",
246
+ "description": "Foreign key to posts/unified_id.",
247
+ "dataType": "sc:Text"
248
+ },
249
+ {
250
+ "@type": "cr:Field",
251
+ "@id": "cve_index/cve_id",
252
+ "name": "cve_id",
253
+ "description": "CVE identifier in the form CVE-YYYY-NNNNN.",
254
+ "dataType": "sc:Text"
255
+ },
256
+ {
257
+ "@type": "cr:Field",
258
+ "@id": "cve_index/exploit_text",
259
+ "name": "exploit_text",
260
+ "description": "First 500 characters of the source post text.",
261
+ "dataType": "sc:Text"
262
+ },
263
+ {
264
+ "@type": "cr:Field",
265
+ "@id": "cve_index/title",
266
+ "name": "title",
267
+ "description": "Advisory or post title.",
268
+ "dataType": "sc:Text"
269
+ },
270
+ {
271
+ "@type": "cr:Field",
272
+ "@id": "cve_index/published",
273
+ "name": "published",
274
+ "description": "Publication date-time (ISO 8601, UTC).",
275
+ "dataType": "sc:DateTime"
276
+ },
277
+ {
278
+ "@type": "cr:Field",
279
+ "@id": "cve_index/source",
280
+ "name": "source",
281
+ "description": "Source identifier matching posts/forum_id.",
282
+ "dataType": "sc:Text"
283
+ }
284
+ ]
285
+ },
286
+ {
287
+ "@type": "cr:RecordSet",
288
+ "@id": "task1_cve_linkage_retrieval",
289
+ "name": "task1_cve_linkage_retrieval",
290
+ "description": "Task 1 \u2014 CVE Linkage Retrieval (CVE-R). Given exploit/advisory evidence text, retrieve the metadata-linked NVD CVE entry from a corpus of 340,536 CVE descriptions. Temporal split: train (<2022, 56,692 queries), val (2022\u20132023, 2,584 queries), test (2024+, 1,990 queries). Sources include CISA KEV, CVEfixes, and HackerOne (low/medium CVE-linkage audit risk only). Evaluated as a ranking problem (Recall@K for K in {1,5,10}, MRR).",
291
+ "field": [
292
+ {
293
+ "@type": "cr:Field",
294
+ "@id": "task1/id",
295
+ "name": "id",
296
+ "description": "SHA-256-derived release identifier, foreign key to posts/unified_id.",
297
+ "dataType": "sc:Text"
298
+ },
299
+ {
300
+ "@type": "cr:Field",
301
+ "@id": "task1/text",
302
+ "name": "text",
303
+ "description": "Exploit or advisory text (>=8 tokens after cleaning).",
304
+ "dataType": "sc:Text"
305
+ },
306
+ {
307
+ "@type": "cr:Field",
308
+ "@id": "task1/cve_id",
309
+ "name": "cve_id",
310
+ "description": "Gold CVE identifier (metadata-derived linkage to NVD corpus).",
311
+ "dataType": "sc:Text"
312
+ },
313
+ {
314
+ "@type": "cr:Field",
315
+ "@id": "task1/source",
316
+ "name": "source",
317
+ "description": "Source identifier matching posts/forum_id.",
318
+ "dataType": "sc:Text"
319
+ },
320
+ {
321
+ "@type": "cr:Field",
322
+ "@id": "task1/timestamp",
323
+ "name": "timestamp",
324
+ "description": "Publication date-time (ISO 8601, UTC).",
325
+ "dataType": "sc:DateTime"
326
+ },
327
+ {
328
+ "@type": "cr:Field",
329
+ "@id": "task1/split",
330
+ "name": "split",
331
+ "description": "train / val / test (temporal split by query timestamp).",
332
+ "dataType": "sc:Text"
333
+ }
334
+ ]
335
+ },
336
+ {
337
+ "@type": "cr:RecordSet",
338
+ "@id": "task2_exploit_type_classification",
339
+ "name": "task2_exploit_type_classification",
340
+ "description": "Task 2 \u2014 Exploit Type Classification (ETC). Given an exploit text, predict its vulnerability type from 8 classes: injection, xss, memory_corruption, dos, file_inclusion, auth_access, rce, info_disclosure. Labels derived from ExploitDB exploit descriptions and tags, 0day.today exploit type fields, and HackerOne vulnerability type prefixes. Temporal OOD split: train (<2020, 64,413 samples), val (2020\u20132022, 4,735 samples), test (>=2023, 1,735 samples). Total labeled corpus: 70,883 samples.",
341
+ "field": [
342
+ {
343
+ "@type": "cr:Field",
344
+ "@id": "task2/id",
345
+ "name": "id",
346
+ "description": "SHA-256-derived release identifier.",
347
+ "dataType": "sc:Text"
348
+ },
349
+ {
350
+ "@type": "cr:Field",
351
+ "@id": "task2/text",
352
+ "name": "text",
353
+ "description": "Exploit or advisory text.",
354
+ "dataType": "sc:Text"
355
+ },
356
+ {
357
+ "@type": "cr:Field",
358
+ "@id": "task2/label",
359
+ "name": "label",
360
+ "description": "Vulnerability type integer: 0=injection, 1=xss, 2=memory_corruption, 3=dos, 4=file_inclusion, 5=auth_access, 6=rce, 7=info_disclosure.",
361
+ "dataType": "sc:Integer"
362
+ },
363
+ {
364
+ "@type": "cr:Field",
365
+ "@id": "task2/label_name",
366
+ "name": "label_name",
367
+ "description": "Human-readable vulnerability type class name.",
368
+ "dataType": "sc:Text"
369
+ },
370
+ {
371
+ "@type": "cr:Field",
372
+ "@id": "task2/source",
373
+ "name": "source",
374
+ "description": "Source identifier matching posts/forum_id.",
375
+ "dataType": "sc:Text"
376
+ },
377
+ {
378
+ "@type": "cr:Field",
379
+ "@id": "task2/timestamp",
380
+ "name": "timestamp",
381
+ "description": "Publication date-time (ISO 8601, UTC).",
382
+ "dataType": "sc:DateTime"
383
+ },
384
+ {
385
+ "@type": "cr:Field",
386
+ "@id": "task2/split",
387
+ "name": "split",
388
+ "description": "train / val / test (temporal OOD split: train <2020, val 2020-2022, test >=2023).",
389
+ "dataType": "sc:Text"
390
+ }
391
+ ]
392
+ },
393
+ {
394
+ "@type": "cr:RecordSet",
395
+ "@id": "task3_temporal_generalization",
396
+ "name": "task3_temporal_generalization",
397
+ "description": "Task 3 \u2014 Temporal Generalization (TG). Identical retrieval formulation to Task 1 (CVE-R) but with a strict CVE-disjointness constraint: the gold CVE sets in train and test are disjoint (C_train \u2229 C_test = \u2205). Splits are defined by CVE publication year: train uses CVEs published before 2022 (56,833 queries), val uses 2022\u20132023 (2,535 queries), test uses 2024+ (1,898 queries). Same NVD retrieval corpus of 340,536 CVE descriptions. Evaluated with Recall@K (K in {1,5,10}) and MRR.",
398
+ "field": [
399
+ {
400
+ "@type": "cr:Field",
401
+ "@id": "task3/id",
402
+ "name": "id",
403
+ "description": "SHA-256-derived release identifier, foreign key to posts/unified_id.",
404
+ "dataType": "sc:Text"
405
+ },
406
+ {
407
+ "@type": "cr:Field",
408
+ "@id": "task3/text",
409
+ "name": "text",
410
+ "description": "Exploit or advisory text (>=8 tokens after cleaning).",
411
+ "dataType": "sc:Text"
412
+ },
413
+ {
414
+ "@type": "cr:Field",
415
+ "@id": "task3/cve_id",
416
+ "name": "cve_id",
417
+ "description": "Gold CVE identifier (metadata-derived linkage; CVE publication year determines split).",
418
+ "dataType": "sc:Text"
419
+ },
420
+ {
421
+ "@type": "cr:Field",
422
+ "@id": "task3/source",
423
+ "name": "source",
424
+ "description": "Source identifier matching posts/forum_id.",
425
+ "dataType": "sc:Text"
426
+ },
427
+ {
428
+ "@type": "cr:Field",
429
+ "@id": "task3/timestamp",
430
+ "name": "timestamp",
431
+ "description": "Publication date-time (ISO 8601, UTC).",
432
+ "dataType": "sc:DateTime"
433
+ },
434
+ {
435
+ "@type": "cr:Field",
436
+ "@id": "task3/split",
437
+ "name": "split",
438
+ "description": "train / val / test (CVE-disjoint split by CVE publication year).",
439
+ "dataType": "sc:Text"
440
+ }
441
+ ]
442
+ }
443
+ ]
444
+ }