- [1]会议论文,PPT: Backdoor Attacks on Pre-trained Models via Poisoned Prompt Tuning,IJCAI International Joint Conference on Artificial Intelligence,2022/01/01
- [2]会议论文,Few-shot Table-to-text Generation with Prefix-Controlled Generator,Coling 2022,2022/10/01
- [3]会议论文,A Universal Identity Backdoor Attack against Speaker Verification based on Siamese Network,Interspeech 2022,2022/09/01
- [4]会议论文,A Multi-Task Dual-Tree Network for Aspect Sentiment Triplet Extraction,Coling 2022,2022/10/01
- [5]期刊论文,深度学习中的后门攻击综述,信息安全学报,2022/03/01
- [6]会议论文,Parallel Relationship Graph to?Improve Multi-Document Summarization,Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),2022/01/01
- [7]会议论文,Improving Constituent Representation with Hypertree Neural Networks, NAACL 2022,2022/07/01
- [8]会议论文,Automatic Threshold Calculation Based Label Propagation Algorithm for Overlapping Community,2016 IEEE First International Conference on Data Science in Cyberspace (DSC 2016),2016/02/01,刘功申
- [9]会议论文,VIEWPOINT ESTIMATION IN IMAGES BY A KEY-POINT BASED DEEP NEURAL NETWORK,2019 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP),2019/01/01
- [10]会议论文,LIP IMAGE SEGMENTATION IN MOBILE DEVICES BASED ON ALTERNATIVE KNOWLEDGE DISTILLATION,2019 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP),2019/01/01