Author of the publication

DCEN: A Decoupled Context Enhanced Network For Few-shot Slot Tagging

, , , , and . 2021 International Joint Conference on Neural Networks (IJCNN), page 1-7. (2021)
DOI: 10.1109/IJCNN52387.2021.9533361

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities., , and . IACR Cryptology ePrint Archive, (2013)Tightly Secure Hierarchical Identity-Based Encryption., and . Public Key Cryptography (1), volume 11442 of Lecture Notes in Computer Science, page 436-465. Springer, (2019)Compact Structure-Preserving Signatures with Almost Tight Security., , , , and . CRYPTO (2), volume 10402 of Lecture Notes in Computer Science, page 548-580. Springer, (2017)(Hierarchical) Identity-Based Encryption from Affine Message Authentication., , and . CRYPTO (1), volume 8616 of Lecture Notes in Computer Science, page 408-425. Springer, (2014)Tightly-Secure Signatures from Five-Move Identification Protocols., , and . ASIACRYPT (3), volume 10626 of Lecture Notes in Computer Science, page 68-94. Springer, (2017)HGE: Embedding Temporal Knowledge Graphs in a Product Space of Heterogeneous Geometric Subspaces, , , and . arXiv preprint arXiv:2312.13680, (2023)HGE: Embedding Temporal Knowledge Graphs in a Product Space of Heterogeneous Geometric Subspaces, , , and . Thirty-eighth Conference on Artificial Intelligence, AAAI, 2024, Vancouver, Canada, February 22 – February 25, 2024,, (2024)Improved security proofs and constructions for public-key cryptography.. Ruhr University Bochum, Germany, (2016)Unified security model of authenticated key exchange with specific adversarial capabilities., , and . IET Information Security, 10 (1): 8-17 (2016)Analysis and Improvement of an Authenticated Key Exchange Protocol., , and . ISPEC, volume 6672 of Lecture Notes in Computer Science, page 417-431. Springer, (2011)