Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Negation scope detection with recurrent neural networks models in review texts., , , and . IJHPCN, 13 (2): 211-221 (2019)Mining predicate-based entailment rules using deep contextual architecture., , , and . Neurocomputing, (2019)Preimage Attacks on Round-reduced Keccak-224/256 via an Allocating Approach., and . IACR Cryptology ePrint Archive, (2019)Comparing and analysing three kinds of conformal predictor., , , , and . FSKD, page 684-688. IEEE, (2012)Detecting suspicious transactions in a virtual-currency-enabled online social network., , , , , and . J. Netw. Comput. Appl., (February 2023)Aligning Translation-Specific Understanding to General Understanding in Large Language Models., , , , , , and . CoRR, (2024)LID 2020: The Learning from Imperfect Data Challenge Results., , , , , , , , , and 25 other author(s). CoRR, (2020)Middle-aged and elderly users' continuous usage intention of health maintenance-oriented WeChat official accounts: empirical study based on a hybrid model in China., , , , , , , , and . BMC Medical Informatics Decis. Mak., 21 (1): 257 (2021)Model Construction of Enterprise Financial Early Warning Based on Quantum FOA-SVR., , , , , , , and . Sci. Program., (2021)Event-triggered learning synchronization of coupled heterogeneous recurrent neural networks., , , , and . Knowl. Based Syst., (October 2023)