Author of the publication

Red Alarm for Pre-trained Models: Universal Vulnerability to Neuron-level Backdoor Attacks.

, , , , , , , , and . Mach. Intell. Res., 20 (2): 180-193 (April 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Integrated Approach to Chinese Word Segmentation and Part-of-Speech Tagging., , , and . ICCPOL, volume 4285 of Lecture Notes in Computer Science, page 299-309. Springer, (2006)A Method of Recognizing Entity and Relation., and . IJCNLP, volume 3651 of Lecture Notes in Computer Science, page 245-256. Springer, (2005)Estimating translation probabilities for social tag suggestion., , and . Expert Syst. Appl., 42 (4): 1950-1959 (2015)Chinese Word Frequency Approximation Based on Multitype Corpora., , and . J. Quant. Linguistics, 17 (2): 142-166 (2010)User Behaviors in Related Word Retrieval and New Word Detection: A Collaborative Perspective., , , , , and . ACM Trans. Asian Lang. Inf. Process., 10 (4): 20:1-20:26 (2011)Graph Neural Networks: A Review of Methods and Applications, , , , , , , and . (2018)cite arxiv:1812.08434.Chord-Conditioned Melody Choralization with Controllable Harmonicity and Polyphonicity., , and . CoRR, (2022)Overview of CAIL2018: Legal Judgment Prediction Competition., , , , , , , , , and 1 other author(s). CoRR, (2018)Multi-channel Reverse Dictionary Model., , , , , and . CoRR, (2019)COSINE: Compressive Network Embedding on Large-scale Information Networks., , , , , , and . CoRR, (2018)