Author of the publication

MilKBQA: A Complex Knowledge Base Question Answering Dataset on Chinese Military Field.

, , , , , and . DSC, page 136-143. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Infeasible Paths: Approaches and Challenges., and . ENASE (Selected Papers), volume 410 of Communications in Computer and Information Science, page 64-78. Springer, (2012)Detecting infeasible branches based on code patterns., , and . CSMR-WCRE, page 74-83. IEEE Computer Society, (2014)ABOR: An Automatic Framework for Buffer Overflow Removal in C/C++Programs., , and . ICEIS (Revised Selected Papers), volume 227 of Lecture Notes in Business Information Processing, page 204-221. Springer, (2014)Improved Partitioning Graph Embedding Framework for Small Cluster., , , , and . KSEM, volume 12815 of Lecture Notes in Computer Science, page 203-215. Springer, (2021)Detection of Buffer Overflow Vulnerabilities in C/C++ with Pattern Based Limited Symbolic Evaluation., , , , and . COMPSAC Workshops, page 559-564. IEEE Computer Society, (2012)Intelligent Mobile Agents for Large-Scale Collaborative Virtual Environment., , , , and . Int. J. Virtual Real., 7 (2): 63-72 (2008)A Survey of Infeasible Path Detection., , and . ENASE, page 43-52. SciTePress, (2012)Automatic Removal of Buffer Overflow Vulnerabilities in C/C++ Programs., , and . ICEIS (2), page 49-59. SciTePress, (2014)Design verification for database applications through analysing their support to data lifecycle., and . Int. J. Data Min. Model. Manag., 3 (4): 406-417 (2011)Hippie: A Data-Paralleled Pipeline Approach to Improve Memory-Efficiency and Scalability for Large DNN Training., , , , , , and . ICPP, page 71:1-71:10. ACM, (2021)