Author of the publication

An LSTM-CTC based verification system for proxy-word based OOV keyword search.

, , , and . ICASSP, page 5655-5659. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Calibration of word posterior estimation in confusion networks for keyword search., , , and . APSIPA, page 148-151. IEEE, (2015)An LSTM-CTC based verification system for proxy-word based OOV keyword search., , , and . ICASSP, page 5655-5659. IEEE, (2017)A weak Galerkin method for the nonlinear Navier-Stokes problem., , and . Comput. Appl. Math., 43 (1): 71 (February 2024)MR raster positioning analysis and precise planning application., , , , and . ISCIT, page 258-262. IEEE, (2016)Low-resource Tibetan Dialect Acoustic Modeling Based on Transfer Learning., , , and . SLTU, page 6-10. ISCA, (2018)Optimization of spatial-temporal graph: A taxi demand forecasting model based on spatial-temporal tree., , , , and . Inf. Fusion, (April 2024)The TNT Team System Descriptions of Cantonese and Mongolian for IARPA OpenASR20., , , , , , , , , and . Interspeech, page 4344-4348. ISCA, (2021)MFAGCN: Multi-Feature Based Attention Graph Convolutional Network for Traffic Prediction., , , and . WASA (1), volume 12937 of Lecture Notes in Computer Science, page 227-239. Springer, (2021)Multimodal Traffic Travel Time Prediction., , , and . IJCNN, page 1-9. IEEE, (2021)AdvRefactor: A Resampling-Based Defense Against Adversarial Attacks., , , , , , and . PCM (2), volume 11165 of Lecture Notes in Computer Science, page 815-825. Springer, (2018)