Author of the publication

Neural Deepfake Detection with Factual Structure of Text.

, , , , , , , and . EMNLP (1), page 2461-2470. Association for Computational Linguistics, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Memetic clonal selection algorithm with EDA vaccination for unconstrained binary quadratic programming problems., , , and . Expert Syst. Appl., 38 (6): 7817-7827 (2011)Dynamic metric embedding model for point-of-interest prediction., , , and . Future Gener. Comput. Syst., (2018)Position: short object lifetimes require a delete-optimized storage system., , , , , , and . ACM SIGOPS European Workshop, page 6. ACM, (2004)Mitigating application-level denial of service attacks on Web servers: A client-transparent approach., , , and . TWEB, 2 (3): 15:1-15:49 (2008)Fashion Editing with Multi-scale Attention Normalization., , , , , , , , and . CoRR, (2019)A Middleware System for Protecting Against Application Level Denial of Service Attacks., , , and . Middleware, volume 4290 of Lecture Notes in Computer Science, page 260-280. Springer, (2006)Improvements in Upgrading Xen-Virtualized Large Computer Systems., , and . ES, page 265-269. IEEE, (2014)Online Personalized Recommendation Based on Streaming Implicit User Feedback., , , , and . APWeb, volume 9313 of Lecture Notes in Computer Science, page 720-731. Springer, (2015)Separating agreement from execution for byzantine fault tolerant services., , , , and . SOSP, page 253-267. ACM, (2003)Using scanning acoustic microscopy and LM-BP algorithm for defect inspection of micro solder bumps., , , , , and . Microelectron. Reliab., (2017)