Author of the publication

Using Generative Adversarial Networks to Break and Protect Text Captchas.

, , , , , , , , and . ACM Trans. Priv. Secur., 23 (2): 7:1-7:29 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Rangasamy's outsourcing algorithm for solving quadratic congruence equations., , and . CoRR, (2022)Domain Adaptation for Semantic Parsing., , , and . IJCAI, page 3723-3729. ijcai.org, (2020)Scheduled for July 2020, Yokohama, Japan, postponed due to the Corona pandemic..Efficient SimRank-based Similarity Join Over Large Graphs., , , , and . Proc. VLDB Endow., 6 (7): 493-504 (2013)WIP Event Detection System at TAC KBP 2017 Event Nugget Track., , and . TAC, NIST, (2017)WIP Event Detection System at TAC KBP 2016 Event Nugget Track., , , and . TAC, NIST, (2016)ProTrix: Building Models for Planning and Reasoning over Tables with Sentence Context., and . CoRR, (2024)Combining Graph-Based Learning With Automated Data Collection for Code Vulnerability Detection., , , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2021)Leveraging Tweet Ranking in an Optimization Frameworkfor Tweet Timeline Generation., , , and . JCDL, page 245-246. ACM, (2016)Learning to Organize a Bag of Words into Sentences with Neural Networks: An Empirical Study., , , , , and . NAACL-HLT, page 1682-1691. Association for Computational Linguistics, (2021)Natural Answer Generation with Heterogeneous Memory., and . NAACL-HLT, page 185-195. Association for Computational Linguistics, (2018)