Author of the publication

Incorporating Zoning Information into Argument Mining from Biomedical Literature.

, , , and . LREC, page 6162-6169. European Language Resources Association, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy Efficient and Robust Beamforming for MISO Cognitive Small Cell Networks., , , and . IEEE Internet of Things Journal, 5 (6): 5002-5014 (2018)Incorporating Zoning Information into Argument Mining from Biomedical Literature., , , and . LREC, page 6162-6169. European Language Resources Association, (2022)A new method of the virtual TDOA estimation for the passive radar source localization based on PSAAA., , , , and . WCSP, page 1-6. IEEE, (2016)Applying Social Gamification in a Gamified Point System., and . HCI (31), volume 12211 of Lecture Notes in Computer Science, page 148-161. Springer, (2020)Optimal energy harvesting-aided spectrum sensing sensors scheduling in cognitive radio networks., , , and . WCSP, page 1-5. IEEE, (2017)Argument mining as a multi-hop generative machine reading comprehension task., , , and . EMNLP (Findings), page 10846-10858. Association for Computational Linguistics, (2023)SuicidEmoji: Derived Emoji Dataset and Tasks for Suicide-Related Social Content., , , , , and . SIGIR, page 1136-1141. ACM, (2024)ConspEmoLLM: Conspiracy Theory Detection Using an Emotion-Based Large Language Model., , , , and . ECAI, volume 392 of Frontiers in Artificial Intelligence and Applications, page 4649-4656. IOS Press, (2024)Research on Innovative Design of Industrial Heritage's Regeneration through a Combination of Extenics and BIM: TangShan Cooling Tower as an Example., , and . ITQM, volume 214 of Procedia Computer Science, page 727-736. Elsevier, (2022)Robust Unsupervised Domain Adaptation from A Corrupted Source., , , , and . ICDM, page 1299-1304. IEEE, (2022)