Author of the publication

ZJUKLAB at SemEval-2021 Task 4: Negative Augmentation with Language Model for Reading Comprehension of Abstract Meaning.

, , , , , , and . SemEval@ACL/IJCNLP, page 810-819. Association for Computational Linguistics, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Data Structure for Efficient File Deduplication in Cloud Storage., , , , , , and . UEMCON, page 71-77. IEEE, (2020)AZ-Code: An Efficient Availability Zone Level Erasure Code to Provide High Fault Tolerance in Cloud Storage Systems., , , , , , , , and . MSST, page 230-243. IEEE, (2019)AZ-Recovery: An Efficient Crossing-AZ Recovery Scheme for Erasure Coded Cloud Storage Systems., , , , , , , , , and . SRDS, page 236-245. IEEE, (2020)An Intrusion Detection Method Based on Hierarchical Feature Learning and Its Application., , , , , and . CSS (1), volume 11982 of Lecture Notes in Computer Science, page 13-20. Springer, (2019)Research and Application of Anomaly Detection of Industrial Control System Based on Improved Zoe Algorithm., , , , , and . CSS (1), volume 11982 of Lecture Notes in Computer Science, page 3-12. Springer, (2019)Determination of Meteor Vector Velocity Using MU Interferometry Measurements of Head Echoes., , , , and . Remote. Sens., 15 (15): 3784 (August 2023)Fast Identification of Multi-Tagged Objects for Large-Scale RFID Systems., , , and . IEEE Wirel. Commun. Lett., 8 (4): 992-995 (2019)HaarAE: an unsupervised anomaly detection model for IOT devices based on Haar wavelet transform., , , , and . Appl. Intell., 53 (15): 18125-18137 (August 2023)An improved spatial-temporal correlation algorithm combined with compressed sensing and LEACH protocol in WSNs., , , , and . Int. J. Inf. Comput. Secur., 12 (4): 383-396 (2020)Protect Privacy from Gradient Leakage Attack in Federated Learning., , , and . INFOCOM, page 580-589. IEEE, (2022)