Author of the publication

Chinese Semantic Role Labeling with Bidirectional Recurrent Neural Networks.

, , , and . EMNLP, page 1626-1631. The Association for Computational Linguistics, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adversarial attacks in computer vision: a survey., , , and . J. Membr. Comput., 6 (2): 130-147 (June 2024)An invisible, robust copyright protection method for DNN-generated content., , , , , and . Neural Networks, (2024)Randomized ReLU Activation for Uncertainty Estimation of Deep Neural Networks., , , , and . CoRR, (2021)QRPatch: A Deceptive Texture-Based Black-Box Adversarial Attacks with Genetic Algorithm., , , , , and . CEC, page 1-8. IEEE, (2024)Black-box adversarial patch attacks using differential evolution against aerial imagery object detectors., , , , and . Eng. Appl. Artif. Intell., (2024)A Survey on Physical Adversarial Attack in Computer Vision., , , , and . CoRR, (2022)RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World., , , , and . ICCV, page 4432-4442. IEEE, (2023)Encoding Temporal Information for Time-Aware Link Prediction., , , , , , and . EMNLP, page 2350-2354. The Association for Computational Linguistics, (2016)HeteroMorpheus: Universal Control Based on Morphological Heterogeneity Modeling., , , , , , and . CoRR, (2024)A Multi-objective Memetic Algorithm for Auto Adversarial Attack Optimization Design., , , and . CoRR, (2022)