Author of the publication

Reverse Engineering Configurations of Neural Text Generation Models.

, , , , , and . ACL, page 275-279. Association for Computational Linguistics, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Synthesizer: Rethinking Self-Attention in Transformer Models., , , , , and . CoRR, (2020)Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature Learning., , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Choppy: Cut Transformer for Ranked List Truncation., , , , and . SIGIR, page 1513-1516. ACM, (2020)StructFormer: Joint Unsupervised Induction of Dependency and Constituency Structure from Masked Language Modeling., , , , , and . ACL/IJCNLP (1), page 7196-7209. Association for Computational Linguistics, (2021)Synthesizer: Rethinking Self-Attention for Transformer Models., , , , , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 10183-10192. PMLR, (2021)StructFormer: Joint Unsupervised Induction of Dependency and Constituency Structure from Masked Language Modeling., , , , , and . CoRR, (2020)Surprise: Result List Truncation via Extreme Value Theory., , , , and . SIGIR, page 2404-2408. ACM, (2023)Generative Models are Unsupervised Predictors of Page Quality: A Colossal-Scale Study., , , , , and . WSDM, page 301-309. ACM, (2021)Traffic Correlation for Deanonymizing Cryptocurrency Wallet Through Tor., , , , and . BlockSys, volume 1679 of Communications in Computer and Information Science, page 292-305. Springer, (2022)Reverse Engineering Configurations of Neural Text Generation Models., , , , , and . ACL, page 275-279. Association for Computational Linguistics, (2020)