90 results on '"Li, Zhoujun"'
Search Results
2. QURG: Question Rewriting Guided Context-Dependent Text-to-SQL Semantic Parsing
3. Read Then Respond: Multi-granularity Grounding Prediction for Knowledge-Grounded Dialogue Generation
4. KnowPrefix-Tuning: A Two-Stage Prefix-Tuning Framework for Knowledge-Grounded Dialogue Generation
5. HanoiT: Enhancing Context-aware Translation via Selective Context
6. LogLG: Weakly Supervised Log Anomaly Detection via Log-Event Graph Construction
7. Modeling Intra-class and Inter-class Constraints for Out-of-Domain Detection
8. DialCSP: A Two-Stage Attention-Based Model for Customer Satisfaction Prediction in E-commerce Customer Service
9. Learning to Select Relevant Knowledge for Neural Machine Translation
10. Entity Relative Position Representation Based Multi-head Selection for Joint Entity and Relation Extraction
11. LARQ: Learning to Ask and Rewrite Questions for Community Question Answering
12. Joint Bilinear End-to-End Dependency Parsing with Prior Knowledge
13. BiGCNN: Bidirectional Gated Convolutional Neural Network for Chinese Named Entity Recognition
14. Super Root: A New Stealthy Rooting Technique on ARM Devices
15. Capsule Networks for Chinese Opinion Questions Machine Reading Comprehension
16. FGST: Fine-Grained Spatial-Temporal Based Regression for Stationless Bike Traffic Prediction
17. Improved Neural Machine Translation with Chinese Phonologic Features
18. Response Selection of Multi-turn Conversation with Deep Neural Networks
19. Unrest News Amount Prediction with Context-Aware Attention LSTM
20. Hijacking Your Routers via Control-Hijacking URLs in Embedded Devices with Web Interfaces
21. Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution and Compilation Optimization
22. Event Extraction with Deep Contextualized Word Representation and Multi-attention Layer
23. H-Binder: A Hardened Binder Framework on Android Systems
24. HypTracker: A Hypervisor to Detect Malwares Through System Call Analysis on ARM
25. DTRP: A Flexible Deep Framework for Travel Route Planning
26. Idology and Its Applications in Public Security and Network Security
27. Semi-Supervised Network Embedding
28. PPNE: Property Preserving Network Embedding
29. An Open Domain Topic Prediction Model for Answer Selection
30. Query Classification by Leveraging Explicit Concept Information
31. Bring User Interest to Related Entity Recommendation
32. Integrity Verification of Replicated File with Proxy in Cloud Computing
33. Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage
34. Characterization of Android Applications with Root Exploit by Using Static Feature Analysis
35. Non-malleable Extractors with Shorter Seeds and Their Applications
36. Exploring Social Network Information for Solving Cold Start in Product Recommendation
37. Friendship Link Recommendation Based on Content Structure Information
38. Inferring Diffusion Networks with Sparse Cascades by Structure Transfer
39. Exploiting Description Knowledge for Keyphrase Extraction
40. An Improved Remote Data Possession Checking Protocol in Cloud Storage
41. Popularity Prediction of Burst Event in Microblogging
42. Overcoming Weak Expectations via the Rnyi Entropy and the Expanded Computational Entropy
43. Anonymous Transferable Conditional E-cash
44. Ancestor Excludable Hierarchical ID-Based Encryption Revisited
45. Collaborative Filtering Using Multidimensional Psychometrics Model
46. Collaborative Filtering Based on Rating Psychology
47. Interaction-Based Social Relationship Type Identification in Microblog
48. Multiple-Bank E-Cash without Random Oracles
49. SQL Injection Detection via Program Tracing and Machine Learning
50. Data Sparsity: A Key Disadvantage of User-Based Collaborative Filtering?
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.