Author of the publication

Backdoor Attacks on Pre-trained Models by Layerwise Weight Poisoning.

, , , , , and . EMNLP (1), page 3023-3032. Association for Computational Linguistics, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TextFusion: Privacy-Preserving Pre-trained Model Inference via Token Fusion., , , , , , , , , and . EMNLP, page 8360-8371. Association for Computational Linguistics, (2022)Cross-Linguistic Syntactic Difference in Multilingual BERT: How Good is It and How Does It Affect Transfer?, , , , , , and . EMNLP, page 8073-8092. Association for Computational Linguistics, (2022)Backdoor Attacks on Pre-trained Models by Layerwise Weight Poisoning., , , , , and . EMNLP (1), page 3023-3032. Association for Computational Linguistics, (2021)Making Parameter-efficient Tuning More Efficient: A Unified Framework for Classification Tasks., , , , , , , , and . COLING, page 7053-7064. International Committee on Computational Linguistics, (2022)Simplify the Usage of Lexicon in Chinese NER., , , , and . ACL, page 5951-5960. Association for Computational Linguistics, (2020)Template-free Prompt Tuning for Few-shot NER., , , , , , and . NAACL-HLT, page 5721-5732. Association for Computational Linguistics, (2022)CNN-Based Chinese NER with Lexicon Rethinking., , , , , and . IJCAI, page 4982-4988. ijcai.org, (2019)Toward Recognizing More Entity Types in NER: An Efficient Implementation using Only Entity Lexicons., , , , , , and . EMNLP (Findings), volume EMNLP 2020 of Findings of ACL, page 678-688. Association for Computational Linguistics, (2020)Searching for Optimal Subword Tokenization in Cross-domain NER., , , , , , , and . IJCAI, page 4289-4295. ijcai.org, (2022)TextObfuscator: Making Pre-trained Language Model a Privacy Protector via Obfuscating Word Representations., , , , , , , , and . ACL (Findings), page 5459-5473. Association for Computational Linguistics, (2023)