Author of the publication

CKDST: Comprehensively and Effectively Distill Knowledge from Machine Translation to End-to-End Speech Translation.

, , , , , , and . ACL (Findings), page 3123-3137. Association for Computational Linguistics, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward Vehicular Digital Forensics From Decentralized Trust: An Accountable, Privacy-Preserving, and Secure Realization., , , , and . IEEE Internet Things J., 9 (9): 7009-7024 (2022)A Multikernel and Metaheuristic Feature Selection Approach for IoT Malware Threat Hunting in the Edge Layer., , , , , and . IEEE Internet Things J., 8 (6): 4540-4547 (2021)A distributed approach to enabling privacy-preserving model-based classifier training., , , , and . Knowl. Inf. Syst., 20 (2): 157-185 (2009)One Secure IoT Scheme for Protection of True Nodes., , , , , and . SmartCom, volume 11344 of Lecture Notes in Computer Science, page 143-152. Springer, (2018)Privacy-Enhancing Fog Computing and Its Applications, , and . Springer Briefs in Electrical and Computer Engineering Springer, (2018)An effective behavior-based Android malware detection system., , and . Secur. Commun. Networks, 8 (12): 2079-2089 (2015)The Ideal Science Student and Problem Solving., and . ICLS, International Society of the Learning Sciences, (2006)Proxy Re-encryption with Delegatable Verifiability., and . ACISP (2), volume 9723 of Lecture Notes in Computer Science, page 120-133. Springer, (2016)Emerging trends in network forensics., , , and . CASCON, page 389-390. ACM, (2010)A privacy-preserving proximity friend notification scheme with opportunistic networking., and . ICC, page 5387-5392. IEEE, (2012)