Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining Top-k Sequential Patterns in Database Graphs: A New Challenging Problem and a Sampling-based Approach., , and . CoRR, (2018)Maximizing the Coverage of Information Propagation in Social Networks., , , , , and . IJCAI, page 2104-2110. AAAI Press, (2015)Maximum a Posteriori Estimation for Information Source Detection., , , , , and . IEEE Trans. Syst. Man Cybern. Syst., 50 (6): 2242-2256 (2020)Delving Deep into Regularity: A Simple but Effective Method for Chinese Named Entity Recognition., , , , , and . NAACL-HLT (Findings), page 1863-1873. Association for Computational Linguistics, (2022)How Well Do Large Language Models Understand Syntax? An Evaluation by Asking Natural Language Questions., , , , , , and . CoRR, (2023)A Markov Chain Monte Carlo Approach for Source Detection in Networks., , , , , and . SMP, volume 774 of Communications in Computer and Information Science, page 77-88. Springer, (2017)Finding Route Hotspots in Large Labeled Networks., , , , , and . CoRR, (2019)The solution to matrix equation AX+XTC=B., , and . J. Frankl. Inst., 344 (8): 1056-1062 (2007)Efficient Document-level Event Extraction via Pseudo-Trigger-aware Pruned Complete Graph., , , , , , and . CoRR, (2021)Is It Really Useful to Jointly Parse Constituency and Dependency Trees? A Revisit., , , , and . CoRR, (2023)