Search

Your search keyword '"Li, Zhoujun"' showing total 73 results

Search Constraints

Start Over You searched for: Author "Li, Zhoujun" Remove constraint Author: "Li, Zhoujun" Publisher springer international publishing Remove constraint Publisher: springer international publishing
73 results on '"Li, Zhoujun"'

Search Results

1. Learning to Select Relevant Knowledge for Neural Machine Translation

2. Entity Relative Position Representation Based Multi-head Selection for Joint Entity and Relation Extraction

3. LARQ: Learning to Ask and Rewrite Questions for Community Question Answering

4. Joint Bilinear End-to-End Dependency Parsing with Prior Knowledge

5. BiGCNN: Bidirectional Gated Convolutional Neural Network for Chinese Named Entity Recognition

6. Super Root: A New Stealthy Rooting Technique on ARM Devices

7. Capsule Networks for Chinese Opinion Questions Machine Reading Comprehension

8. FGST: Fine-Grained Spatial-Temporal Based Regression for Stationless Bike Traffic Prediction

10. Improved Neural Machine Translation with Chinese Phonologic Features

11. Response Selection of Multi-turn Conversation with Deep Neural Networks

12. Unrest News Amount Prediction with Context-Aware Attention LSTM

13. Hijacking Your Routers via Control-Hijacking URLs in Embedded Devices with Web Interfaces

14. Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution and Compilation Optimization

15. Event Extraction with Deep Contextualized Word Representation and Multi-attention Layer

20. H-Binder: A Hardened Binder Framework on Android Systems

21. HypTracker: A Hypervisor to Detect Malwares Through System Call Analysis on ARM

22. DTRP: A Flexible Deep Framework for Travel Route Planning

23. Idology and Its Applications in Public Security and Network Security

24. Semi-Supervised Network Embedding

25. PPNE: Property Preserving Network Embedding

26. An Open Domain Topic Prediction Model for Answer Selection

27. Query Classification by Leveraging Explicit Concept Information

29. Bring User Interest to Related Entity Recommendation

30. Integrity Verification of Replicated File with Proxy in Cloud Computing

31. Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage

32. Characterization of Android Applications with Root Exploit by Using Static Feature Analysis

33. Non-malleable Extractors with Shorter Seeds and Their Applications

34. Exploring Social Network Information for Solving Cold Start in Product Recommendation

35. Friendship Link Recommendation Based on Content Structure Information

36. Inferring Diffusion Networks with Sparse Cascades by Structure Transfer

37. Exploiting Description Knowledge for Keyphrase Extraction

38. An Improved Remote Data Possession Checking Protocol in Cloud Storage

39. Popularity Prediction of Burst Event in Microblogging

46. Interaction-Based Social Relationship Type Identification in Microblog

47. Multiple-Bank E-Cash without Random Oracles

Catalog

Books, media, physical & digital resources