Author of the publication

Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media.

, , , and . NAACL-HLT (1), page 1380-1390. Association for Computational Linguistics, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Can Language Models be Instructed to Protect Personal Information?, , , , and . CoRR, (2023)An Annotated Corpus for Machine Reading of Instructions in Wet Lab Protocols., , , and . NAACL-HLT (2), page 97-106. Association for Computational Linguistics, (2018)Structured Minimally Supervised Learning for Neural Relation Extraction., and . NAACL-HLT (1), page 3057-3069. Association for Computational Linguistics, (2019)SemEval-2013 Task 2: Sentiment Analysis in Twitter., , , , , and . CoRR, (2019)An Empirical Study of Pre-trained Transformers for Arabic Information Extraction., , , and . EMNLP (1), page 4727-4734. Association for Computational Linguistics, (2020)Major Life Event Extraction from Twitter based on Congratulations/Condolences Speech Acts., , , and . EMNLP, page 1997-2007. ACL, (2014)It's a Contradiction - no, it's not: A Case Study using Functional Relations., , , and . EMNLP, page 11-20. ACL, (2008)Pre-train or Annotate? Domain Adaptation with a Constrained Budget., , and . EMNLP (1), page 5002-5015. Association for Computational Linguistics, (2021)Do CoNLL-2003 Named Entity Taggers Still Work Well in 2023?, and . ACL (1), page 8254-8271. Association for Computational Linguistics, (2023)Deep Reinforcement Learning for Dialogue Generation., , , , , and . EMNLP, page 1192-1202. The Association for Computational Linguistics, (2016)