Author of the publication

Drug-drug Interaction Extraction via Recurrent Neural Network with Multiple Attention Layers.

, , , and . CoRR, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Drug-drug Interaction Extraction via Recurrent Neural Network with Multiple Attention Layers., , , and . CoRR, (2017)Topic-Grained Text Representation-Based Model for Document Retrieval., , , , , , , and . ICANN (3), volume 13531 of Lecture Notes in Computer Science, page 776-788. Springer, (2022)A Multimodal Adversarial Attack Framework Based on Local and Random Search Algorithms., , , and . Int. J. Comput. Intell. Syst., 14 (1): 1934-1947 (2021)Textual adversarial attacks by exchanging text-self words., , , , , , , , and . Int. J. Intell. Syst., 37 (12): 12212-12234 (December 2022)Towards an Efficient and Robust Adversarial Attack Against Neural Text Classifier., , , , , and . Int. J. Pattern Recognit. Artif. Intell., 36 (11): 2253007:1-2253007:22 (2022)SummScore: A Comprehensive Evaluation Metric for Summary Quality Based on Cross-Encoder., , , , , , and . APWeb/WAIM (2), volume 13422 of Lecture Notes in Computer Science, page 69-84. Springer, (2022)A More Context-Aware Approach for Textual Adversarial Attacks Using Probability Difference-Guided Beam Search., , , , , , , , , and . IEEE Trans. Knowl. Data Eng., 36 (6): 2316-2328 (June 2024)A Unified Summarization Model with Semantic Guide and Keyword Coverage Mechanism., , , , , , and . ICANN (5), volume 12895 of Lecture Notes in Computer Science, page 333-344. Springer, (2021)Improving JavaScript Malware Classifier's Security against Evasion by Particle Swarm Optimization., , , , and . Trustcom/BigDataSE/ISPA, page 1734-1740. IEEE, (2016)Incremental Learning of GAN for Detecting Multiple Adversarial Attacks., , , , and . ICANN (3), volume 11729 of Lecture Notes in Computer Science, page 673-684. Springer, (2019)