Author of the publication

Breaking the Data Barrier: Towards Robust Speech Translation via Adversarial Stability Training.

, , , , and . IWSLT, Association for Computational Linguistics, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Privacy-Preserving Association Rule Mining: P4P Style., , and . CIDM, page 654-660. IEEE, (2007)How to deal with malicious users in privacy-preserving distributed data mining., and . Stat. Anal. Data Min., 2 (1): 18-33 (2009)Privacy Preserving Link Analysis on Dynamic Weighted Graph., , , and . Comput. Math. Organ. Theory, 11 (2): 141-159 (2005)Breaking the Data Barrier: Towards Robust Speech Translation via Adversarial Stability Training., , , , and . IWSLT, Association for Computational Linguistics, (2019)Octopus: Privacy-Preserving Collaborative Evaluation of Loan Stacking., , , and . CoRR, (2020)Practical private computation of vector addition-based functions., and . PODC, page 326-327. ACM, (2007)Distributed Key Generation for Encrypted Deduplication: Achieving the Strongest Privacy.. CCSW, page 57-68. ACM, (2014)Youdao's Winning Solution to the NLPCC-2018 Task 2 Challenge: A Neural Machine Translation Approach to Chinese Grammatical Error Correction., , and . NLPCC (1), volume 11108 of Lecture Notes in Computer Science, page 341-350. Springer, (2018)A Paradigm Shift: The Future of Machine Translation Lies with Large Language Models., , , , , , , , and . LREC/COLING, page 1339-1352. ELRA and ICCL, (2024)An End-to-End Speech Accent Recognition Method Based on Hybrid CTC/Attention Transformer ASR., , , and . ICASSP, page 7253-7257. IEEE, (2021)