Author of the publication

HL-EncDec: A Hybrid-Level Encoder-Decoder for Neural Response Generation.

, , , , and . COLING, page 845-856. Association for Computational Linguistics, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A SDKEY-Based Secure Storage and Transmission Approach for Android Phone., , , , and . CyberC, page 1-6. IEEE Computer Society, (2014)Data provenance in SOA: security, reliability, and integrity., , , , , and . Service Oriented Computing and Applications, 1 (4): 223-247 (2007)Delineating the dimensions of social support on social networking sites and their effects: A comparative model., , and . Computers in Human Behavior, (2016)Network-Based Output Tracking Control for a Class of T-S Fuzzy Systems That Can Not Be Stabilized by Nondelayed Output Feedback Controllers., , and . IEEE Trans. Cybernetics, 45 (8): 1511-1524 (2015)Experimental System Identification, Feed-Forward Control, and Hysteresis Compensation of a 2-DOF Mechanism., , , , , and . IJIMR, 3 (3): 1-21 (2013)Fuzzy HINFINITY Tracking Control for Nonlinear Networked Control Systems in T-S Fuzzy Model., , , and . IEEE Trans. Systems, Man, and Cybernetics, Part B, 39 (4): 1073-1079 (2009)Reducing Tongue Shape Dimensionality from Hundreds of Available Resources Using Autoencoder., , and . ICPR, page 2875-2880. IEEE Computer Society, (2018)Optimized Java Card transaction mechanism based on object locality., , and . SAC, page 550-551. ACM, (2010)±π/2-Phase-shift spectral phase encoding for security improvement in the optical code based system., , , , , , and . ICCC, page 131-135. IEEE, (2014)Haptic Teleoperation of UAVs through Control Barrier Functions., , and . CoRR, (2019)