Author of the publication

IJCNLP-2017 Task 3: Review Opinion Diversification (RevOpiD-2017).

, , , , and . IJCNLP (Shared Tasks), page 17-25. Asian Federation of Natural Language Processing, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CoInNet: A Convolution-Involution Network With a Novel Statistical Attention for Automatic Polyp Segmentation., , , , , , , and . IEEE Trans. Medical Imaging, 42 (12): 3987-4000 (December 2023)Fingerprint image super-resolution via ridge orientation-based clustered coupled sparse dictionaries., , and . J. Electronic Imaging, 24 (4): 043015 (2015)A slew rate enhancement technique for operational amplifiers based on a tunable active Gm-based capacitance multiplication circuit., , and . ACM Great Lakes Symposium on VLSI, page 273-276. ACM, (2003)Automated assumption generation for compositional verification., , and . Formal Methods Syst. Des., 32 (3): 285-301 (2008)Reconsidering CEGAR: Learning Good Abstractions without Refinement., and . ICCD, page 591-598. IEEE Computer Society, (2005)An On-Chip Coupling Capacitance Measurement Technique., , and . VLSI Design, page 495-499. IEEE Computer Society, (2001)SAT-Based Image Computation with Application in Reachability Analysis., , , and . FMCAD, volume 1954 of Lecture Notes in Computer Science, page 354-371. Springer, (2000)A Wireless Intrusion Detection System for 802.11 WPA3 Networks., , , , , and . COMSNETS, page 384-392. IEEE, (2022)Modeling approaches for Silent Attrition prediction in Payment networks., , , , , , and . ICMLA, page 409-414. IEEE, (2021)Temporal Debiasing using Adversarial Loss based GNN architecture for Crypto Fraud Detection., , , , and . ICMLA, page 391-396. IEEE, (2021)