Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image Steganalysis with Convolutional Vision Transformer., , , , , and . ICASSP, page 3089-3093. IEEE, (2022)End-to-end Semantics-based Summary Quality Assessment for Single-document Summarization., , , , , and . CoRR, (2020)Generative Steganographic Flow., , , , , and . ICME, page 1-6. IEEE, (2022)On the Intractability to Synthesize Factual Inconsistencies in Summarization., , , , , and . EACL (Findings), page 1026-1037. Association for Computational Linguistics, (2024)DocAsRef: An Empirical Study on Repurposing Reference-based Summary Quality Metrics as Reference-free Metrics., , , , , , , and . EMNLP (Findings), page 1226-1235. Association for Computational Linguistics, (2023)Persistent Summaries., , , , , and . ACM Trans. Database Syst., 47 (3): 11:1-11:42 (2022)SueNes: A Weakly Supervised Approach to Evaluating Single-Document Summarization via Negative Sampling., , , , , , and . NAACL-HLT, page 2450-2458. Association for Computational Linguistics, (2022)Strongly Secure Network Coding via Reed-Solomon Codes., , and . ICNCC, page 110-114. ACM, (2016)Generative Steganography Network., , , , , and . ACM Multimedia, page 1621-1629. ACM, (2022)Two-stage PCB Routing Using Polygon-based Dynamic Partitioning and MCTS., , , and . DATE, page 1-2. IEEE, (2023)