Author of the publication

CKDST: Comprehensively and Effectively Distill Knowledge from Machine Translation to End-to-End Speech Translation.

, , , , , , and . ACL (Findings), page 3123-3137. Association for Computational Linguistics, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Series Editorial: Vehicular Networking and 6G Data Taxonomy., and . IEEE Commun. Stand. Mag., 6 (1): 75 (2022)An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications., , , , and . IEEE Trans. Veh. Technol., 59 (7): 3589-3603 (2010)Secure bidirectional proxy re-encryption for cryptographic cloud storage., , , and . Pervasive Mob. Comput., (2016)Information Conversion, Effective Samples, and Parameter Size., , and . IEEE Trans. Inf. Theory, 53 (12): 4438-4456 (2007)Dual-Anonymous Off-Line Electronic Cash for Mobile Payment., , , , , and . IEEE Trans. Mob. Comput., 22 (6): 3303-3317 (June 2023)REACT: An RFID-based privacy-preserving children tracking scheme for large amusement parks., , , and . Comput. Networks, 54 (15): 2744-2755 (2010)User-Habit-Oriented Authentication Model: Toward Secure, User-Friendly Authentication for Mobile Devices., , and . IEEE Trans. Emerg. Top. Comput., 3 (1): 107-118 (2015)Coordinated Control Strategies for SMES-Battery Hybrid Energy Storage Systems., and . IEEE Access, (2017)Active Learning From Stream Data Using Optimal Weight Classifier Ensemble., , , and . IEEE transactions on systems, man, and cybernetics. Part B, Cybernetics : a publication of the IEEE Systems, Man, and Cybernetics Society, (April 2010)Tools for privacy preserving distributed data mining, , , , and . SIGKDD Explor. Newsl., 4 (2): 28--34 (2002)