66 results on '"Li, Zhoujun"'
Search Results
2. LogLG: Weakly Supervised Log Anomaly Detection via Log-Event Graph Construction
3. Modeling Intra-class and Inter-class Constraints for Out-of-Domain Detection
4. KnowPrefix-Tuning: A Two-Stage Prefix-Tuning Framework for Knowledge-Grounded Dialogue Generation
5. DialCSP: A Two-Stage Attention-Based Model for Customer Satisfaction Prediction in E-commerce Customer Service
6. HanoiT: Enhancing Context-aware Translation via Selective Context
7. Learning to Select Relevant Knowledge for Neural Machine Translation
8. BiGCNN: Bidirectional Gated Convolutional Neural Network for Chinese Named Entity Recognition
9. LARQ: Learning to Ask and Rewrite Questions for Community Question Answering
10. Joint Bilinear End-to-End Dependency Parsing with Prior Knowledge
11. Super Root: A New Stealthy Rooting Technique on ARM Devices
12. FGST: Fine-Grained Spatial-Temporal Based Regression for Stationless Bike Traffic Prediction
13. Hijacking Your Routers via Control-Hijacking URLs in Embedded Devices with Web Interfaces
14. Event Extraction with Deep Contextualized Word Representation and Multi-attention Layer
15. Response Selection of Multi-turn Conversation with Deep Neural Networks
16. Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution and Compilation Optimization
17. Improved Neural Machine Translation with Chinese Phonologic Features
18. HypTracker: A Hypervisor to Detect Malwares Through System Call Analysis on ARM
19. PPNE: Property Preserving Network Embedding
20. Semi-Supervised Network Embedding
21. Idology and Its Applications in Public Security and Network Security
22. Query Classification by Leveraging Explicit Concept Information
23. An Open Domain Topic Prediction Model for Answer Selection
24. Inferring Diffusion Networks with Sparse Cascades by Structure Transfer
25. Non-malleable Extractors with Shorter Seeds and Their Applications
26. Friendship Link Recommendation Based on Content Structure Information
27. Integrity Verification of Replicated File with Proxy in Cloud Computing
28. Characterization of Android Applications with Root Exploit by Using Static Feature Analysis
29. Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage
30. Popularity Prediction of Burst Event in Microblogging
31. An Improved Remote Data Possession Checking Protocol in Cloud Storage
32. Collaborative Filtering Using Multidimensional Psychometrics Model
33. Ancestor Excludable Hierarchical ID-Based Encryption Revisited
34. Interaction-Based Social Relationship Type Identification in Microblog
35. Multiple-Bank E-Cash without Random Oracles
36. Collaborative Filtering Based on Rating Psychology
37. SQL Injection Detection via Program Tracing and Machine Learning
38. When Sparsity Meets Noise in Collaborative Filtering
39. Data Sparsity: A Key Disadvantage of User-Based Collaborative Filtering?
40. Image Tagging by Exploiting Feature Correlation
41. Tagging Image by Exploring Weighted Correlation between Visual Features and Tags
42. Using Concept-Level Random Walk Model and Global Inference Algorithm for Answer Summarization
43. Tagging Image with Informative and Correlative Tags
44. Probabilistic Image Tagging with Tags Expanded By Text-Based Search
45. An Iterative Method for Generating Loop Invariants
46. A Method for Mobile User Profile and Reasoning
47. Hierarchical Classification with Dynamic-Threshold SVM Ensemble for Gene Function Prediction
48. A Novel Composite Kernel for Finding Similar Questions in CQA Services
49. Automatic Topic Detection with an Incremental Clustering Algorithm
50. Server-Controlled Identity-Based Authenticated Key Exchange
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.