From post

Constructing Flow Graphs from Procedural Cybersecurity Texts.

, , , , , и . ACL/IJCNLP (Findings), том ACL/IJCNLP 2021 из Findings of ACL, стр. 3945-3957. Association for Computational Linguistics, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Translating Simple Legal Text to Formal Representations., , , и . JSAI-isAI Workshops, том 9067 из Lecture Notes in Computer Science, стр. 259-273. Springer, (2014)Automated Corpus Annotation for Cybersecurity Named Entity Recognition with Small Keyword Dictionary., , и . IntelliSys (3), том 296 из Lecture Notes in Networks and Systems, стр. 155-174. Springer, (2021)Sparse Substring Pattern Set Discovery Using Linear Programming Boosting., , , и . Discovery Science, том 6332 из Lecture Notes in Computer Science, стр. 132-143. Springer, (2010)Exploring the Limits of Transfer Learning with Unified Model in the Cybersecurity Domain., , , , , и . CoRR, (2023)Constructing Flow Graphs from Procedural Cybersecurity Texts., , , , , и . ACL/IJCNLP (Findings), том ACL/IJCNLP 2021 из Findings of ACL, стр. 3945-3957. Association for Computational Linguistics, (2021)Human-Machine Interaction for Improved Cybersecurity Named Entity Recognition Considering Semantic Similarity., , и . IntelliSys (2), том 1251 из Advances in Intelligent Systems and Computing, стр. 347-361. Springer, (2020)