Author of the publication

MTLAT: A Multi-Task Learning Framework Based on Adversarial Training for Chinese Cybersecurity NER.

, , , , , , and . NPC, volume 12639 of Lecture Notes in Computer Science, page 43-54. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

一种社交网络Sybil用户检测方法 (Compound Approach for Sybil Users Detection in Social Networks)., , , and . 计算机科学, 43 (1): 172-177 (2016)Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks., , , and . Sensors, 19 (11): 2452 (2019)High quality multi-focus polychromatic composite image fusion algorithm based on filtering in frequency domain and synthesis in space domain., , , and . Journal of Zhejiang University - Science C, 11 (5): 365-374 (2010)Assessing the Reliability of the MODIS LST Product to Detect Temporal Variability., , , , and . IEEE Geosci. Remote. Sens. Lett., (2023)Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack., , , , , and . Digit. Commun. Networks, 8 (3): 373-387 (2022)A Parameter-Free Approach for Lossless Streaming Graph Summarization., , , , , and . DASFAA (1), volume 12681 of Lecture Notes in Computer Science, page 385-393. Springer, (2021)An Improved Method for Reversible Data Hiding in Encrypted Image., and . ICA3PP (Workshops and Symposiums), volume 9532 of Lecture Notes in Computer Science, page 24-34. Springer, (2015)WP-GBDT: An Approach for Winner Prediction using Gradient Boosting Decision Tree., , , and . IEEE BigData, page 5691-5698. IEEE, (2021)An Approach for Predicting the Costs of Forwarding Contracts using Gradient Boosting., , , and . FedCSIS, volume 30 of Annals of Computer Science and Information Systems, page 451-454. (2022)An Efficient Linguistic Steganography for Chinese Text., , , and . ICME, page 2094-2097. IEEE Computer Society, (2007)