Author of the publication

MTLAT: A Multi-Task Learning Framework Based on Adversarial Training for Chinese Cybersecurity NER.

, , , , , , and . NPC, volume 12639 of Lecture Notes in Computer Science, page 43-54. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

一种社交网络Sybil用户检测方法 (Compound Approach for Sybil Users Detection in Social Networks)., , , and . 计算机科学, 43 (1): 172-177 (2016)Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks., , , and . Sensors, 19 (11): 2452 (2019)Assessing the Reliability of the MODIS LST Product to Detect Temporal Variability., , , , and . IEEE Geosci. Remote. Sens. Lett., (2023)WP-GBDT: An Approach for Winner Prediction using Gradient Boosting Decision Tree., , , and . IEEE BigData, page 5691-5698. IEEE, (2021)An Improved Method for Reversible Data Hiding in Encrypted Image., and . ICA3PP (Workshops and Symposiums), volume 9532 of Lecture Notes in Computer Science, page 24-34. Springer, (2015)Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack., , , , , and . Digit. Commun. Networks, 8 (3): 373-387 (2022)High quality multi-focus polychromatic composite image fusion algorithm based on filtering in frequency domain and synthesis in space domain., , , and . Journal of Zhejiang University - Science C, 11 (5): 365-374 (2010)An Efficient Linguistic Steganography for Chinese Text., , , and . ICME, page 2094-2097. IEEE Computer Society, (2007)An Approach for Predicting the Costs of Forwarding Contracts using Gradient Boosting., , , and . FedCSIS, volume 30 of Annals of Computer Science and Information Systems, page 451-454. (2022)Similarity Regression Of Functions In Different Compiled Forms With Neural Attentions On Dual Control-Flow Graphs., , , and . Comput. J., 67 (5): 1710-1718 (2024)