Author of the publication

Accelerating Toeplitz Neural Network with Constant-time Inference Complexity.

, and . EMNLP, page 12206-12215. Association for Computational Linguistics, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TD-EUA: Task-Decomposable Edge User Allocation with QoE Optimization., , , , , , , and . ICSOC, volume 12571 of Lecture Notes in Computer Science, page 215-231. Springer, (2020)Matching Cross Network for Learning to Rank in Personal Search., , , and . WWW, page 2835-2841. ACM / IW3C2, (2020)An Improvement of PAA on Trend-Based Approximation for Time Series., , , , , , and . ICA3PP (2), volume 11335 of Lecture Notes in Computer Science, page 248-262. Springer, (2018)Charformer: Fast Character Transformers via Gradient-based Subword Tokenization., , , , , , , , , and . CoRR, (2021)Hierarchically Gated Recurrent Neural Network for Sequence Modeling., , and . CoRR, (2023)An Assessment of Data Location Vulnerability for Human Factors Using Linear Regression and Collaborative Filtering., , , and . Inf., 11 (9): 449 (2020)Segmentation mask and feature similarity loss guided GAN for object-oriented image-to-image translation., , , , , and . Inf. Process. Manag., 59 (3): 102926 (2022)Brain tumor segmentation with deep convolutional symmetric neural network., , , , and . Neurocomputing, (2020)MACE: A Multi-pattern Accommodated and Efficient Anomaly Detection Method in the Frequency Domain., , , , , , , and . CoRR, (2023)Backdoor Attack on Deep Learning-Based Medical Image Encryption and Decryption Network., , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)