Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How Well Do Large Language Models Understand Syntax? An Evaluation by Asking Natural Language Questions., , , , , , and . CoRR, (2023)Maximum a Posteriori Estimation for Information Source Detection., , , , , and . IEEE Trans. Syst. Man Cybern. Syst., 50 (6): 2242-2256 (2020)Delving Deep into Regularity: A Simple but Effective Method for Chinese Named Entity Recognition., , , , , and . NAACL-HLT (Findings), page 1863-1873. Association for Computational Linguistics, (2022)A Markov Chain Monte Carlo Approach for Source Detection in Networks., , , , , and . SMP, volume 774 of Communications in Computer and Information Science, page 77-88. Springer, (2017)Are Bert Family Good Instruction Followers? A Study on Their Potential And Limitations., , , , , , , and . ICLR, OpenReview.net, (2024)Maximizing the Coverage of Information Propagation in Social Networks., , , , , and . IJCAI, page 2104-2110. AAAI Press, (2015)The solution to matrix equation AX+XTC=B., , and . J. Frankl. Inst., 344 (8): 1056-1062 (2007)Mining top-k sequential patterns in transaction database graphs., , , , , , and . World Wide Web, 23 (1): 103-130 (2020)Efficient Document-level Event Extraction via Pseudo-Trigger-aware Pruned Complete Graph., , , , , , and . CoRR, (2021)Finding Route Hotspots in Large Labeled Networks., , , , , and . CoRR, (2019)