Author of the publication

Reinforcing language model for speech translation with auxiliary data.

, , and . ASRU, page 502-506. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Concept semantics driven computer aided product innovation design., , , and . J. Comput. Methods Sci. Eng., 16 (3): 575-590 (2016)An Exploration of Directly Using Word as ACOUSTIC Modeling Unit for Speech Recognition., , , , and . SLT, page 64-69. IEEE, (2018)Token-wise Training for Attention Based End-to-end Speech Recognition., , , and . ICASSP, page 6276-6280. IEEE, (2019)Generative Design Exploration Framework based on Subjective Evaluation., and . IJCCI (ECTA-FCTA), page 303-306. SciTePress, (2011)Language Modeling with Linguistic Cluster Constraints., and . TSD, volume 4629 of Lecture Notes in Computer Science, page 1. Springer, (2007)CNN-based DGA Detection with High Coverage., , , , , and . ISI, page 62-67. IEEE, (2019)Research on the Video Advertising Detection Based on PNN and Text Detection Method., , and . J. Inf. Hiding Multim. Signal Process., 8 (5): 1082-1091 (2017)A Blockchain-Enhanced Transaction Model for Microgrid Energy Trading., , , , , , , , and . IEEE Access, (2020)Black-Box Adversarial Attacks Against Deep Learning Based Malware Binaries Detection with GAN., , , , and . ECAI, volume 325 of Frontiers in Artificial Intelligence and Applications, page 2536-2542. IOS Press, (2020)Intelligent Fuzzing Algorithm for 5G NAS Protocol Based on Predefined Rules., , , and . ICCCN, page 1-7. IEEE, (2022)