Author of the publication

Learning Sentence Embeddings for Coherence Modelling and Beyond.

, , , and . RANLP, page 151-160. INCOMA Ltd., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Block-counting sequences are not purely morphic., , and . Adv. Appl. Math., (April 2024)The Use of Smart Contracts and Challenges., , , , , , and . CoRR, (2018)Craniofacial Reconstruction via Face Elevation Map Estimation Based on the Deep Convolution Neutral Network., , , , and . Secur. Commun. Networks, (2021)Melhorando a Acurácia da Detecção de Lavagem de Dinheiro na Rede Bitcoin., , , , , and . SBRC, page 728-741. (2020)CarbonApp: Blockchain Enabled Carbon Offset Project Management., , and . AINA (4), volume 202 of Lecture Notes on Data Engineering and Communications Technologies, page 13-25. Springer, (2024)Digital Watermark Perturbation for Adversarial Examples to Fool Deep Neural Networks., , , , , and . IJCNN, page 1-8. IEEE, (2021)Radio frequency fingerprint authentication based on feature fusion and contrastive learning., , , , , and . Expert Syst. Appl., (2024)Enabling Enterprise Blockchain Interoperability with Trusted Data Transfer (Industry Track)., , , , , , , , and . Middleware Industry, page 29-35. ACM, (2019)On the Performance, Utility Improvements, and Illicit Transaction Detection of Blockchain Networks.. University of New South Wales, Sydney, Australia, (2020)base-search.net (ftunswworks:oai:unsworks.library.unsw.edu.au:1959.4/70065).Adversarial Defense via Attention-Based Randomized Smoothing., , , , and . ICANN (1), volume 12396 of Lecture Notes in Computer Science, page 455-466. Springer, (2020)