Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks., and . CCNC, page 1-6. IEEE, (2019)Single Shot Multibox Detector With Deconvolutional Region Magnification Procedure., , , , and . IEEE Access, (2021)Self-Instruct: Aligning Language Model with Self Generated Instructions., , , , , , and . CoRR, (2022)Study on underwater wet arc welding training with haptic device., , , , and . VECIMS, page 191-195. IEEE, (2009)Do NLP Models Know Numbers? Probing Numeracy in Embeddings., , , , and . EMNLP/IJCNLP (1), page 5306-5314. Association for Computational Linguistics, (2019)Generalized Gaussian Multiterminal Source Coding: The Symmetric Case., , , , and . CoRR, (2017)Fine-grained Hallucination Detection and Editing for Language Models., , , , , , and . CoRR, (2024)OLMo: Accelerating the Science of Language Models., , , , , , , , , and 33 other author(s). CoRR, (2024)Tuning Language Models by Proxy., , , , , and . CoRR, (2024)One Embedder, Any Task: Instruction-Finetuned Text Embeddings., , , , , , , , , and . CoRR, (2022)