Author of the publication

Structural Dependency Self-attention Based Hierarchical Event Model for Chinese Financial Event Extraction.

, , , , , , , and . CCKS, volume 1466 of Communications in Computer and Information Science, page 76-88. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance evaluation of distributed iSCSI RAID., , and . SNAPI@PACT, page 11-18. ACM, (2003)An admission control algorithm based on matching game and differentiated service in wireless mesh networks., , and . Neural Comput. Appl., 32 (7): 2945-2962 (2020)Instrument-tissue Interaction Quintuple Detection in Surgery Videos., , , , , , , and . MICCAI (8), volume 13437 of Lecture Notes in Computer Science, page 399-409. Springer, (2022)Core Matrix Regression and Prediction with Regularization., , , , and . ICAIF, page 291-299. ACM, (2022)Survivable Multi-Level Ad-Hoc Group Operations., and . ICDCS Workshops, page 70-75. IEEE Computer Society, (2003)Structural Dependency Self-attention Based Hierarchical Event Model for Chinese Financial Event Extraction., , , , , , , and . CCKS, volume 1466 of Communications in Computer and Information Science, page 76-88. Springer, (2021)Investigation and Analysis of Corneal Morphology in Young Divers., , , , , , , , and . ICAI (1), volume 2014 of Communications in Computer and Information Science, page 3-12. Springer, (2023)Metabolism as means for hypoxia adaptation: metabolic profiling and flux balance analysis., , , , , and . BMC Syst. Biol., (2009)Verifying privacy enhanced mail functions with higher order logic., and . Network Threats, volume 38 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, page 11-20. DIMACS/AMS, (1996)A multi-level approach to highly efficient recognition of Chinese spam short messages., and . Frontiers Comput. Sci., 12 (1): 135-145 (2018)