Author of the publication

Robust Secret Data Hiding for Transformer-based Neural Machine Translation.

, , , , and . IJCNN, page 1-8. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-paragraph Reading Comprehension with Token-level Dynamic Reader and Hybrid Verifier., , , and . IJCNN, page 1-8. IEEE, (2020)LogKernel A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering., , , and . CoRR, (2022)Toward interests drift mechanism for social network., , , , and . SSIC, page 1-5. IEEE, (2016)Few-shot Table-to-text Generation with Prefix-Controlled Generator., , , and . COLING, page 6493-6504. International Committee on Computational Linguistics, (2022)Transformer-DW: A Transformer Network with Dynamic and Weighted Head., , , and . ICONIP (2), volume 11954 of Lecture Notes in Computer Science, page 504-515. Springer, (2019)A Multi-Channel Graph Attention Network for Chinese NER., , and . ICONIP (1), volume 13108 of Lecture Notes in Computer Science, page 203-214. Springer, (2021)Leveraging Inner-Connection of Message Sequence for Traffic Classification: A Deep Learning Approach., , , , , and . ICPADS, page 77-84. IEEE, (2018)An modularity-based overlapping community structure detecting algorithm., , , and . ASONAM, page 113-117. IEEE Computer Society, (2014)A Universal Identity Backdoor Attack against Speaker Verification based on Siamese Network., , , and . INTERSPEECH, page 4770-4774. ISCA, (2022)A global and local context integration DCNN for adult image classification., , , , and . Pattern Recognit., (2019)