Shasha Li

Orcid: 0000-0002-7581-1612

Affiliations:
  • National University of Defense Technology, College of Computer, Changsha, China


According to our database1, Shasha Li authored at least 86 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Recommending Missed Citations Identified by Reviewers: A New Task, Dataset and Baselines.
CoRR, 2024

SWEA: Changing Factual Knowledge in Large Language Models via Subject Word Embedding Altering.
CoRR, 2024

PMET: Precise Model Editing in a Transformer.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Plan and generate: Explicit and implicit variational augmentation for multi-document summarization of scientific articles.
Inf. Process. Manag., 2023

PMET: Precise Model Editing in a Transformer.
CoRR, 2023

Address Matching Based On Hierarchical Information.
CoRR, 2023

Dynamic Multi-View Fusion Mechanism for Chinese Relation Extraction.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023

Learning Well-Separated and Representative Prototypes for Few-Shot Event Detection.
Proceedings of the Natural Language Processing and Chinese Computing, 2023

QAE: A Hard-Label Textual Attack Considering the Comprehensive Quality of Adversarial Examples.
Proceedings of the Natural Language Processing and Chinese Computing, 2023

A Novel Ranking Method for Textual Adversarial Attack.
Proceedings of the 6th International Conference on Machine Learning and Natural Language Processing, 2023

Retrieval-Augmented GPT-3.5-Based Text-to-SQL Framework with Sample-Aware Prompting and Dynamic Revision Chain.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

Jointly Extractive and Abstractive Training Paradigm for Text Summarization.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

MuDPT: Multi-modal Deep-symphysis Prompt Tuning for Large Pre-trained Vision-Language Models.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Knowledge Enhanced Fine-grained Biomedical Named Entity Recognition.
Proceedings of the 2023 12th International Conference on Computing and Pattern Recognition, 2023

Distinguishing Sensitive and Insensitive Options for the Winograd Schema Challenge.
Proceedings of the Database Systems for Advanced Applications, 2023

2022
Textual adversarial attacks by exchanging text-self words.
Int. J. Intell. Syst., December, 2022

S-NER: A Concise and Efficient Span-Based Model for Named Entity Recognition.
Sensors, 2022

A novel bundling learning paradigm for named entity recognition.
Knowl. Based Syst., 2022

BERT-SMAP: Paying attention to Essential Terms in passage ranking beyond BERT.
Inf. Process. Manag., 2022

Towards an Efficient and Robust Adversarial Attack Against Neural Text Classifier.
Int. J. Pattern Recognit. Artif. Intell., 2022

Span-based joint entity and relation extraction augmented with sequence tagging mechanism.
CoRR, 2022

Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks.
CoRR, 2022

A Two-Phase Paradigm for Joint Entity-Relation Extraction.
CoRR, 2022

A Context-Aware Approach for Textual Adversarial Attack through Probability Difference Guided Beam Search.
CoRR, 2022

Few-shot Named Entity Recognition with Entity-level Prototypical Network Enhanced by Dispersedly Distributed Prototypes.
CoRR, 2022

Win-Win Cooperation: Bundling Sequence and Span Models for Named Entity Recognition.
CoRR, 2022

ADC: Adversarial attacks against object Detection that evade Context consistency checks.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2022

Amazon Shop the Look: A Visual Search System for Fashion and Home.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

Multi-source Representation Enhancement for Wikipedia-style Entity Annotation.
Proceedings of the International Joint Conference on Neural Networks, 2022

Integrating Title and Citation Context Semantics of Citing Paper via Weighted Attentions for Local Citation Recommendation.
Proceedings of the International Joint Conference on Neural Networks, 2022

Topic-Grained Text Representation-Based Model for Document Retrieval.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022

Multi-Document Scientific Summarization from a Knowledge Graph-Centric View.
Proceedings of the 29th International Conference on Computational Linguistics, 2022

Few-shot Named Entity Recognition with Entity-level Prototypical Network Enhanced by Dispersedly Distributed Prototypes.
Proceedings of the 29th International Conference on Computational Linguistics, 2022

SummScore: A Comprehensive Evaluation Metric for Summary Quality Based on Cross-Encoder.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022

From Less to More: Common-Sense Semantic Perception Benefits Image Captioning.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022

Context-Aware Transfer Attacks for Object Detection.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Boosting Span-based Joint Entity and Relation Extraction via Squence Tagging Mechanism.
CoRR, 2021

Adversarial Attacks on Black Box Video Classifiers: Leveraging the Power of Geometric Transformations.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Combating Word-level Adversarial Text with Robust Adversarial Training.
Proceedings of the International Joint Conference on Neural Networks, 2021

Looking Back and Forward: Enhancing Image Captioning with Global Semantic Guidance.
Proceedings of the International Joint Conference on Neural Networks, 2021

Show, Rethink, And Tell: Image Caption Generation With Hierarchical Topic Cues.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

Span Representation Generation Method in Entity-Relation Joint Extraction.
Proceedings of the Intelligent Computing Theories and Application, 2021

Many-To-Many Chinese ICD-9 Terminology Standardization Based on Neural Networks.
Proceedings of the Intelligent Computing Theories and Application, 2021

Exploiting Multi-Object Relationships for Detecting Adversarial Attacks in Complex Scenes.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Multi-Expert Adversarial Attack Detection in Person Re-identification Using Context Inconsistency.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

A Unified Summarization Model with Semantic Guide and Keyword Coverage Mechanism.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021

Hierarchical Encoder-Decoder Summary Model with an Instructor for Long Academic Papers.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

Eluding ML-based Adblockers With Actionable Adversarial Examples.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Research on Chinese medical named entity recognition based on collaborative cooperation of multiple neural network models.
J. Biomed. Informatics, 2020

Measurement-driven Security Analysis of Imperceptible Impersonation Attacks.
CoRR, 2020

A4 : Evading Learning-based Adblockers.
CoRR, 2020

ToC-RWG: Explore the Combination of Topic Model and Citation Information for Automatic Related Work Generation.
IEEE Access, 2020

DeepTrack: Grouping RFID Tags Based on Spatio-temporal Proximity in Retail Spaces.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Generating More Effective and Imperceptible Adversarial Text Examples for Sentiment Classification.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency.
Proceedings of the Computer Vision - ECCV 2020, 2020

You do (not) belong here: detecting DPI evasion attacks with context learning.
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020

Span-based Joint Entity and Relation Extraction with Attention-based Span-specific and Contextual Semantic Representations.
Proceedings of the 28th International Conference on Computational Linguistics, 2020

2019
Cited text spans identification with an improved balanced ensemble model.
Scientometrics, 2019

A hybrid approach for named entity recognition in Chinese electronic medical record.
BMC Medical Informatics Decis. Mak., 2019

An Analytical Study on a Benchmark Corpus Constructed for Related Work Generation.
Proceedings of the Natural Language Processing and Chinese Computing, 2019

Multi-classification of Theses to Disciplines Based on Metadata.
Proceedings of the Natural Language Processing and Chinese Computing, 2019

Stealthy Adversarial Perturbations Against Real-Time Video Classification Systems.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

What Topics Do Images Say: A Neural Image Captioning Model with Topic Representation.
Proceedings of the IEEE International Conference on Multimedia & Expo Workshops, 2019

Incremental Learning of GAN for Detecting Multiple Adversarial Attacks.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2019: Image Processing, 2019

Selecting Paragraphs to Answer Questions for Multi-passage Machine Reading Comprehension.
Proceedings of the Information Retrieval - 25th China Conference, 2019

2018
Using semantic similarity to reduce wrong labels in distant supervision for relation extraction.
Inf. Process. Manag., 2018

Adversarial Perturbations Against Real-Time Video Classification Systems.
CoRR, 2018

A Novel Misclassification Attack Against Black Box Neural Network Classifiers.
Proceedings of the 14th International Conference on Semantics, Knowledge and Grids, 2018

NUDT @ CLSciSumm-18.
Proceedings of the 3rd Joint Workshop on Bibliometric-enhanced Information Retrieval and Natural Language Processing for Digital Libraries (BIRNDL 2018) co-located with the 41st International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2018), 2018

Research on Matrix Multiplication Based WeChat Group Tagging Technology.
Proceedings of the First IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2018

A BiLSTM-CRF Method to Chinese Electronic Medical Record Named Entity Recognition.
Proceedings of the 2018 International Conference on Algorithms, 2018

2017
Drug-drug Interaction Extraction via Recurrent Neural Network with Multiple Attention Layers.
CoRR, 2017

Syntactic Representation Learning for Open Information Extraction on Web.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

Open Relation Extraction Based on Core Dependency Phrase Clustering.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Drug-Drug Interaction Extraction via Recurrent Neural Network with Multiple Attention Layers.
Proceedings of the Advanced Data Mining and Applications - 13th International Conference, 2017

2016
ERPC: An Edge-Resources Based Framework to Reduce Bandwidth Cost in the Personal Cloud.
Proceedings of the Web-Age Information Management - 17th International Conference, 2016

ROP-Hunt: Detecting Return-Oriented Programming Attacks in Applications.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

An Optimized DHT for Linux Package Distribution.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016

Improving DHT Load Balance Using the Churn.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
基于混合双层模型的DHT网络路由表快照算法 (Hybrid Method for Capturing Snapshot of Routing Table of DHT Networks).
计算机科学, 2015

Face recognition based on random feature.
Proceedings of the 2015 Visual Communications and Image Processing, 2015

A Priority-Based Dynamic Web Requests Scheduling for Web Servers over Content-Centric Networking.
Proceedings of the Third IEEE Workshop on Hot Topics in Web Systems and Technologies, 2015

Adaptive LPQ: An efficient descriptor for blurred face recognition.
Proceedings of the 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition, 2015

Face Recognition Using Local PCA Filters.
Proceedings of the Biometric Recognition - 10th Chinese Conference, 2015

Noise-resistant local binary pattern based on random projection.
Proceedings of the 3rd IAPR Asian Conference on Pattern Recognition, 2015

Simultaneous blurred face restoration and recognition.
Proceedings of the 3rd IAPR Asian Conference on Pattern Recognition, 2015


  Loading...