From post

A Two-phase Prototypical Network Model for Incremental Few-shot Relation Classification.

, , , , и . COLING, стр. 1618-1629. International Committee on Computational Linguistics, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Wearable Ankle Robots in Post-stroke Rehabilitation of Gait: A Systematic Review., , , , , , , и . Frontiers Neurorobotics, (2019)M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet., , , и . ICT-EurAsia, том 8407 из Lecture Notes in Computer Science, стр. 612-621. Springer, (2014)Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption., , , , , и . ESORICS, том 8134 из Lecture Notes in Computer Science, стр. 592-609. Springer, (2013)Secure Deduplication with Efficient and Reliable Convergent Key Management., , , , , и . IEEE Trans. Parallel Distributed Syst., 25 (6): 1615-1625 (2014)An Almost Non-interactive Order Preserving Encryption Scheme., , , и . ISPEC, том 11125 из Lecture Notes in Computer Science, стр. 87-100. Springer, (2018)Non-interactive Deniable Authentication Protocols., , и . Inscrypt, том 7537 из Lecture Notes in Computer Science, стр. 142-159. Springer, (2011)Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach., , , и . ProvSec, том 9451 из Lecture Notes in Computer Science, стр. 215-226. Springer, (2015)A Semantic Retrieval Framework for Engineering Domain Knowledge., , , и . ICIC (1), том 6838 из Lecture Notes in Computer Science, стр. 488-493. Springer, (2011)Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things., , , , , и . J. Netw. Comput. Appl., (2019)Joint multi-scale information and long-range dependence for video captioning., , , , , и . Int. J. Multim. Inf. Retr., 12 (2): 37 (декабря 2023)