Author of the publication

Improving the Robustness of Low-Resource Neural Machine Translation with Adversarial Examples.

, , , , , , and . CCMT, volume 1671 of Communications in Computer and Information Science, page 60-71. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving the Robustness of Low-Resource Neural Machine Translation with Adversarial Examples., , , , , , and . CCMT, volume 1671 of Communications in Computer and Information Science, page 60-71. Springer, (2022)Multilingual Pre-training Model-Assisted Contrastive Learning Neural Machine Translation., , , and . IJCNN, page 1-7. IEEE, (2023)Hamming Distance Encoding Multihop Relation Knowledge Graph Completion., , , , and . IEEE Access, (2020)Knowledge Forgetting in Answer Set Programming., , , and . J. Artif. Intell. Res., (2014)Eliminating Nonmonotonic DL-Atoms in Description Logic Programs., , , , and . RR, volume 7994 of Lecture Notes in Computer Science, page 168-182. Springer, (2013)Knowledge Forgetting in Circumscription: A Preliminary Report., , , and . AAAI, page 1649-1655. AAAI Press, (2015)Belief Change in Nonmonotonic Multi-Context Systems., , and . LPNMR, volume 8148 of Lecture Notes in Computer Science, page 543-555. Springer, (2013)Robust scRNA-seq Cell Types Identification by Self-Guided Deep Clustering Network., and . IEEE Access, (2024)Some Results on Order-Consistent Logic Programs., and . FSKD (5), page 557-561. IEEE Computer Society, (2008)978-0-7695-3305-6.Fully Privacy-Preserving and Efficient Clustering Scheme based on Fully Homomorphic Encryption., , , , and . ICC, page 2694-2700. IEEE, (2024)