Author of the publication

Translating Natural Language to SQL using Pointer-Generator Networks and How Decoding Order Matters.

, , , and . CoRR, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SLASS: Secure Login against Shoulder Surfing., and . SNDS, volume 420 of Communications in Computer and Information Science, page 346-357. Springer, (2014)Towards incorporating honeywords in n-session recording attack resilient unaided authentication services., and . IET Inf. Secur., 13 (1): 7-18 (2019)Lighting Two Candles With One Flame: An Unaided Human Identification Protocol With Security Beyond Conventional Limit., and . CoRR, (2017)On Understanding the Impact of RTT in the Mobile Network for Detecting the Rogue UAVs., , , , , , and . IEEE Trans. Cogn. Commun. Netw., 6 (4): 1218-1229 (2020)On Overcoming the Identified Limitations of a Usable PIN Entry Method., , , , and . IEEE Access, (2019)On Designing a Lesser Obtrusive Authentication Protocol to Prevent Machine-Learning-Based Threats in Internet of Things., , , , , , , and . IEEE Internet Things J., 8 (5): 3255-3267 (2021)The Tale of Sansa Spark, , , , , , , , , and 2 other author(s). Proceedings of 16th International Semantic Web Conference, Poster & Demos, (2017)Risk Assessment in Smart Aging Care Systems: An Elderly-Centered Perspective., , and . ICDH, page 1-12. IEEE, (2023)The Tale of Sansa Spark., , , , , , , , , and 2 other author(s). ISWC (Posters, Demos & Industry Tracks), volume 1963 of CEUR Workshop Proceedings, CEUR-WS.org, (2017)RTT-Based Rogue UAV Detection in IoV Networks., , , , , , , and . IEEE Internet Things J., 9 (8): 5909-5919 (2022)