Author of the publication

Modeling Coverage for Neural Machine Translation.

, , , , and . ACL (1), The Association for Computer Linguistics, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Innovative Talent Cultivation Pattern of Software Engineering under Internet Plus., , , , and . ICCSE, page 180-183. IEEE, (2019)Improved Integral Attack on Reduced-Round Simeck., , and . IEEE Access, (2019)A low cost interpolation based detection algorithm for medium-size massive MIMO-OFDM systems., , , and . ISCIT, page 1-5. IEEE, (2017)PathAFL: Path-Coverage Assisted Fuzzing., , , , and . AsiaCCS, page 598-609. ACM, (2020)The Fourth ACM International Conference on Web Search and Data Mining (WSDM 2011)., and . SIGWEB Newsl., 2011 (Summer): 1:1-1:4 (2011)A Network Intrusion Detection Method Based on Deep Multi-scale Convolutional Neural Network., , , , and . Int. J. Wirel. Inf. Networks, 27 (4): 503-517 (2020)Image Inpainting of Thangka Murals Using Edge-Assisted Feature Fusion and Self Attention Based Local Refine Network., , , , , and . IEEE Access, (2023)Research on Medical Image Encryption Method Based on Improved Krill Herb Algorithm and Chaotic Systems., , , , and . Int. J. Netw. Secur., 22 (3): 484-489 (2020)GSAPSO-MQC: medical image encryption based on genetic simulated annealing particle swarm optimization and modified quantum chaos system., and . Evol. Intell., 14 (4): 1817-1829 (2021)Deep Attention Residual Hashing., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 101-A (3): 654-657 (2018)