Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Analysis of Overlay Cognitive Wireless Networks with an Untrusted Secondary User., , , , , , , and . ICSPCC, page 1-5. IEEE, (2018)Hybrid Decoding: Decoding with Partial Hypotheses Combination over Multiple SMT Systems., , , , and . COLING (Posters), page 214-222. Chinese Information Processing Society of China, (2010)Unsupervised Keyphrase Extraction by Jointly Modeling Local and Global Context., , , and . EMNLP (1), page 155-164. Association for Computational Linguistics, (2021)Hierarchical Recurrent Neural Network for Document Modeling., , , , , and . EMNLP, page 899-907. The Association for Computational Linguistics, (2015)Benchmarking Multimodal AutoML for Tabular Data with Text Fields., , , , and . NeurIPS Datasets and Benchmarks, (2021)Stack-based Multi-layer Attention for Transition-based Dependency Parsing., , , , and . EMNLP, page 1677-1682. Association for Computational Linguistics, (2017)Bag of Tricks for Image Classification with Convolutional Neural Networks, , , , , and . (2018)cite arxiv:1812.01187Comment: 10 pages, 9 tables, 4 figures.An integrated methodology for enterprise financial management capability evaluation based on EDAS technique and group decision making.. J. Intell. Fuzzy Syst., 46 (1): 2281-2296 (January 2024)A resampling ensemble algorithm for classification of imbalance problems., , , , and . Neurocomputing, (2014)Design of a New Seven-Dimensional Hyperchaotic Circuit and Its Application in Secure Communication., , , , , , and . IEEE Access, (2019)