Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Nonrepudiable Threshold Proxy Signature Scheme against Forgery Attack., , , and . ICCSP, page 76-80. ACM, (2017)Cross-Layer Aware Routing Protocol for Hybrid Wireless Mesh Networks., , , and . J. Commun., 10 (7): 480-489 (2015)Suppression of Back-Reflection From the End Face of Si3N4 Waveguide Resonator., , , , and . IEEE Access, (2021)Incremental Speech Synthesis For Speech-To-Speech Translation., , , , , and . CoRR, (2021)How Transferable are Attribute Controllers on Pretrained Multilingual Translation Models?, and . CoRR, (2023)Prediction of Railway Freight Customer Churn Based on Deep Forest., , , and . ICIC (2), volume 12837 of Lecture Notes in Computer Science, page 479-489. Springer, (2021)Improving Zero-Shot Translation by Disentangling Positional Information., , , , and . CoRR, (2020)Cost-Effective Training in Low-Resource Neural Machine Translation., , and . CoRR, (2022)From Start to Finish: Latency Reduction Strategies for Incremental Speech Synthesis in Simultaneous Speech-to-Speech Translation., , , , , and . INTERSPEECH, page 1771-1775. ISCA, (2022)Learning an Artificial Language for Knowledge-Sharing in Multilingual Translation., and . WMT, page 188-202. Association for Computational Linguistics, (2022)