125 results on '"Li, Zhoujun"'
Search Results
2. LogLG: Weakly Supervised Log Anomaly Detection via Log-Event Graph Construction
3. Modeling Intra-class and Inter-class Constraints for Out-of-Domain Detection
4. KnowPrefix-Tuning: A Two-Stage Prefix-Tuning Framework for Knowledge-Grounded Dialogue Generation
5. DialCSP: A Two-Stage Attention-Based Model for Customer Satisfaction Prediction in E-commerce Customer Service
6. HanoiT: Enhancing Context-aware Translation via Selective Context
7. Learning to Select Relevant Knowledge for Neural Machine Translation
8. BiGCNN: Bidirectional Gated Convolutional Neural Network for Chinese Named Entity Recognition
9. LARQ: Learning to Ask and Rewrite Questions for Community Question Answering
10. Entity Relative Position Representation Based Multi-head Selection for Joint Entity and Relation Extraction
11. Joint Bilinear End-to-End Dependency Parsing with Prior Knowledge
12. Super Root: A New Stealthy Rooting Technique on ARM Devices
13. FGST: Fine-Grained Spatial-Temporal Based Regression for Stationless Bike Traffic Prediction
14. Capsule Networks for Chinese Opinion Questions Machine Reading Comprehension
15. Hijacking Your Routers via Control-Hijacking URLs in Embedded Devices with Web Interfaces
16. Event Extraction with Deep Contextualized Word Representation and Multi-attention Layer
17. Response Selection of Multi-turn Conversation with Deep Neural Networks
18. Unrest News Amount Prediction with Context-Aware Attention LSTM
19. Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution and Compilation Optimization
20. Improved Neural Machine Translation with Chinese Phonologic Features
21. HypTracker: A Hypervisor to Detect Malwares Through System Call Analysis on ARM
22. PPNE: Property Preserving Network Embedding
23. Semi-Supervised Network Embedding
24. Idology and Its Applications in Public Security and Network Security
25. H-Binder: A Hardened Binder Framework on Android Systems
26. DTRP: A Flexible Deep Framework for Travel Route Planning
27. Query Classification by Leveraging Explicit Concept Information
28. An Open Domain Topic Prediction Model for Answer Selection
29. Inferring Diffusion Networks with Sparse Cascades by Structure Transfer
30. Non-malleable Extractors with Shorter Seeds and Their Applications
31. Friendship Link Recommendation Based on Content Structure Information
32. Exploring Social Network Information for Solving Cold Start in Product Recommendation
33. Integrity Verification of Replicated File with Proxy in Cloud Computing
34. Bring User Interest to Related Entity Recommendation
35. Characterization of Android Applications with Root Exploit by Using Static Feature Analysis
36. Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage
37. Popularity Prediction of Burst Event in Microblogging
38. An Improved Remote Data Possession Checking Protocol in Cloud Storage
39. Exploiting Description Knowledge for Keyphrase Extraction
40. Overcoming Weak Expectations via the R$$\acute{e}$$nyi Entropy and the Expanded Computational Entropy
41. Collaborative Filtering Using Multidimensional Psychometrics Model
42. Ancestor Excludable Hierarchical ID-Based Encryption Revisited
43. Interaction-Based Social Relationship Type Identification in Microblog
44. Multiple-Bank E-Cash without Random Oracles
45. Anonymous Transferable Conditional E-cash
46. Collaborative Filtering Based on Rating Psychology
47. SQL Injection Detection via Program Tracing and Machine Learning
48. When Sparsity Meets Noise in Collaborative Filtering
49. Data Sparsity: A Key Disadvantage of User-Based Collaborative Filtering?
50. On Video Recommendation over Social Network
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.