Zhoujun Li

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2021
TrOCR: Transformer-based Optical Character Recognition with Pre-trained Models.
CoRR, 2021

Unsupervised Keyphrase Extraction by Jointly Modeling Local and Global Context.
CoRR, 2021

AnaSearch: Extract, Retrieve and Visualize Structured Results from Unstructured Text for Analytical Queries.
Proceedings of the WSDM '21, 2021

Learning to Select Relevant Knowledge for Neural Machine Translation.
Proceedings of the Natural Language Processing and Chinese Computing, 2021

Smart-Start Decoding for Neural Machine Translation.
Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2021

Multilingual Agreement for Multilingual Neural Machine Translation.
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021

Improving Unsupervised Extractive Summarization with Facet-Aware Modeling.
Proceedings of the Findings of the Association for Computational Linguistics: ACL/IJCNLP 2021, 2021

Open Domain Dialogue Generation with Latent Images.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

Learning to Copy Coherent Knowledge for Response Generation.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
面向自然语言处理的预训练技术研究综述 (Survey of Natural Language Processing Pre-training Techniques).
计算机科学, 2020

Towards Overcoming False Positives in Visual Relationship Detection.
CoRR, 2020

Open Domain Dialogue Generation with Latent Images.
CoRR, 2020

Joint Bilinear End-to-End Dependency Parsing with Prior Knowledge.
Proceedings of the Natural Language Processing and Chinese Computing, 2020

TableBank: Table Benchmark for Image-based Table Detection and Recognition.
Proceedings of The 12th Language Resources and Evaluation Conference, 2020

An Improved Template Representation-based Transformer for Abstractive Text Summarization.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

StyleDGPT: Stylized Response Generation with Pre-trained Language Models.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2020, 2020

BiGCNN: Bidirectional Gated Convolutional Neural Network for Chinese Named Entity Recognition.
Proceedings of the Database Systems for Advanced Applications, 2020

DocBank: A Benchmark Dataset for Document Layout Analysis.
Proceedings of the 28th International Conference on Computational Linguistics, 2020

Super Root: A New Stealthy Rooting Technique on ARM Devices.
Proceedings of the Applied Cryptography and Network Security, 2020

Improving Neural Machine Translation with Soft Template Prediction.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020

Alternating Language Modeling for Cross-Lingual Pre-Training.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
基于深度学习的机器阅读理解综述 (Survey on Deep-learning-based Machine Reading Comprehension).
计算机科学, 2019

Read, Attend and Comment: A Deep Architecture for Automatic News Comment Generation.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019

Low-Resource Response Generation with Template Prior.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019

Leveraging Adjective-Noun Phrasing Knowledge for Comparison Relation Prediction in Text-to-SQL.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019

Leveraging Web Semantic Knowledge in Word Representation Learning.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Marefa: Turning Publishers Catalogs' Data Into Linked Data.
Int. J. Semantic Web Inf. Syst., 2018

Self-healing group key distribution protocol in wireless sensor networks for secure IoT communications.
Future Gener. Comput. Syst., 2018

TinyVisor: An extensible secure framework on android platforms.
Comput. Secur., 2018

Improved Neural Machine Translation with Chinese Phonologic Features.
Proceedings of the Natural Language Processing and Chinese Computing, 2018

Fuzz Testing Based on Virtualization Technology.
Proceedings of the 2018 International Conference on Computing and Artificial Intelligence, 2018

H-Securebox: A Hardened Memory Data Protection Framework on ARM Devices.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Resilient decentralized Android application repackaging detection using logic bombs.
Proceedings of the 2018 International Symposium on Code Generation and Optimization, 2018

Event Extraction with Deep Contextualized Word Representation and Multi-attention Layer.
Proceedings of the Advanced Data Mining and Applications - 14th International Conference, 2018

2017
The Arabic Knowledge Graph: Opportunities and Challenges.
Proceedings of the 11th IEEE International Conference on Semantic Computing, 2017

Hijacking Your Routers via Control-Hijacking URLs in Embedded Devices with Web Interfaces.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution and Compilation Optimization.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

HypTracker: A Hypervisor to Detect Malwares Through System Call Analysis on ARM.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Extracting Linked Data from HTML Tables.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

Presence Attestation: The Missing Link in Dynamic Trust Bootstrapping.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Exponential Arithmetic Based Self-Healing Group Key Distribution Scheme with Backward Secrecy under the Resource-Constrained Wireless Networks.
Sensors, 2016

A Model Guided Security Analysis Approach for Android Applications.
J. Softw., 2016

一种基于三维树模型的源代码安全缺陷分类方法 (Novel Taxonomy of Security Weakness in Source Code Based on Three-dimension Tree Model).
计算机科学, 2016

模糊测试技术研究综述 (Survey of Fuzz Testing Technology).
计算机科学, 2016

一种领域语料驱动的句子相关性计算方法研究 (Study on Domain-corpus Driven Calculation Method of Sentence Relevance).
计算机科学, 2016

H-Binder: A Hardened Binder Framework on Android Systems.
Proceedings of the Security and Privacy in Communication Networks, 2016

2015
A Note on an Improved Self-Healing Group Key Distribution Scheme.
Sensors, 2015

术语自动抽取方法研究综述 (Survey of Automatic Terminology Extraction Methodologies).
计算机科学, 2015

基于Web数据的实证研究:城市轨道交通对住宅价格的时空效应分析 (Empirical Research Based on Web Data: An Analysis on Spatio-temporal Effect of City Rail Transit on Residential House Prices).
计算机科学, 2015

基于混合双层模型的DHT网络路由表快照算法 (Hybrid Method for Capturing Snapshot of Routing Table of DHT Networks).
计算机科学, 2015

Transferable conditional e-cash with optimal anonymity in the standard model.
IET Inf. Secur., 2015

One-Round Affiliation-Hiding Authenticated Asymmetric Group Key Agreement with Semi-trusted Group Authority.
Comput. J., 2015

Transferable Optimal-size Fair E-cash with Optimal Anonymity.
Proceedings of the 2015 International Symposium on Theoretical Aspects of Software Engineering, 2015

An Effective Approach to Measuring and Assessing the Risk of Android Application.
Proceedings of the 2015 International Symposium on Theoretical Aspects of Software Engineering, 2015

PathWalker: A Dynamic Symbolic Execution Tool Based on LLVM Byte Code Instrumentation.
Proceedings of the Dependable Software Engineering: Theories, Tools, and Applications, 2015

Integrity Verification of Replicated File with Proxy in Cloud Computing.
Proceedings of the Cloud Computing and Big Data, 2015

2014
Fair Multiple-bank E-cash in the Standard Model.
IACR Cryptol. ePrint Arch., 2014

Affiliation-Hiding Authenticated Asymmetric Group Key Agreement Based on Short Signature.
Comput. J., 2014

An Enhanced Kad Protocol Resistant to Eclipse Attacks.
Proceedings of the 9th IEEE International Conference on Networking, 2014

Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage.
Proceedings of the Trusted Systems - 6th International Conference, 2014

Routing table status influence of Monitoring Kad.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

An Improved Remote Data Possession Checking Protocol in Cloud Storage.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014

Question Retrieval with High Quality Answers in Community Question Answering.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

2013
Comparable Entity Mining from Comparative Questions.
IEEE Trans. Knowl. Data Eng., 2013

New construction of affiliation-hiding authenticated group key agreement.
Secur. Commun. Networks, 2013

Optimally Anonymous and Transferable Conditional E-cash.
IACR Cryptol. ePrint Arch., 2013

Ancestor Excludable Hierarchical ID-Based Encryption Revisited.
Proceedings of the Network and System Security - 7th International Conference, 2013

Efficient Divisible E-Cash in the Standard Model.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Multiple-Bank E-Cash without Random Oracles.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
Affiliation-Hiding Authenticated Asymmetric Group Key Agreement.
Comput. J., 2012

A provably secure authenticated key agreement protocol for wireless communications.
Comput. Electr. Eng., 2012

FSMesh - Flexibly Securing Mashups by User Defined DOM Environment.
Proceedings of the WEBIST 2012 - Proceedings of the 8th International Conference on Web Information Systems and Technologies, Porto, Portugal, 18, 2012

File Parsing Vulnerability Detection with Symbolic Execution.
Proceedings of the Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012

Anonymous Transferable Conditional E-cash.
Proceedings of the Security and Privacy in Communication Networks, 2012

SQL Injection Detection via Program Tracing and Machine Learning.
Proceedings of the Internet and Distributed Computing Systems, 2012

2011
Authenticated key exchange protocol with selectable identities.
Wirel. Commun. Mob. Comput., 2011

Provably secure identity-based authenticated key agreement protocols with malicious private key generators.
Inf. Sci., 2011

Question-Oriented Answer Summarization via Term Hierarchical Structure.
Int. J. Softw. Eng. Knowl. Eng., 2011

Toward an Accurate Snapshot of DHT Networks.
IEEE Commun. Lett., 2011

An efficient and non-interactive hierarchical key agreement protocol.
Comput. Secur., 2011

Monitoring, analyzing and characterizing lookup traffic in a large-scale DHT.
Comput. Commun., 2011

An efficient dynamic authenticated key exchange protocol with selectable identities.
Comput. Math. Appl., 2011

ID Repetition in Structured P2P Networks.
Comput. J., 2011

An Integrated Approach to Automatic Management of Virtualized Resources in Cloud Environments.
Comput. J., 2011

Program Slicing Stored XSS Bugs in Web Application.
Proceedings of the 5th IEEE International Symposium on Theoretical Aspects of Software Engineering, 2011

Online MOACO biclustering of microarray data.
Proceedings of the 2011 IEEE International Conference on Granular Computing, 2011

Multiobjective optizition shuffled frog-leaping biclustering.
Proceedings of the 2011 IEEE International Conference on Bioinformatics and Biomedicine Workshops, 2011

An Iterative Method for Generating Loop Invariants.
Proceedings of the Frontiers in Algorithmics and Algorithmic Aspects in Information and Management, 2011

2010
Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security.
Int. J. Secur. Networks, 2010

MOACO Biclustering of gene expression data.
Int. J. Funct. Informatics Pers. Medicine, 2010

Improving Diversity of Focused Summaries through the Negative Endorsements of Redundant Facts.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, 2010

Automated Program Verification Using Generation of Invariants.
Proceedings of the 10th International Conference on Quality Software, 2010

A Method for Mobile User Profile and Reasoning.
Proceedings of the PRICAI 2010: Trends in Artificial Intelligence, 2010

The topic-perspective model for social tagging systems.
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2010

A Simple Effective Scheme to Enhance the Capability of Web Servers Using P2P Networks.
Proceedings of the 39th International Conference on Parallel Processing, 2010

Solving Course Timetabling Problem Using Interrelated Approach.
Proceedings of the 2010 IEEE International Conference on Granular Computing, 2010

Answer summarization via term hierarchical structure.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

A Tree Graph Model Based on Mobile Environment.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

Hierarchical Classification with Dynamic-Threshold SVM Ensemble for Gene Function Prediction.
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010

2009
Design of Collaborative Platform on Clustering Applications for Governments.
Intell. Inf. Manag., 2009

Digital multisignature on the generalized conic curve over Z<sub>n</sub>.
Comput. Secur., 2009

Biclustering of microarray data with MOSPO based on crowding distance.
BMC Bioinform., 2009

Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings.
Proceedings of the Ubiquitous Intelligence and Computing, 6th International Conference, 2009

Constructing Program Invariants via Solving QBF.
Proceedings of the TASE 2009, 2009

Server-Controlled Identity-Based Authenticated Key Exchange.
Proceedings of the Provable Security, Third International Conference, 2009

ID Repetition in Kad.
Proceedings of the Proceedings P2P 2009, 2009

An Efficient Certificateless Encryption Scheme in the Standard Model.
Proceedings of the Third International Conference on Network and System Security, 2009

Learning Kernel Matrix from Gene Ontology and Annotation Data for Protein Function Prediction.
Proceedings of the Advances in Neural Networks, 2009

A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks.
Proceedings of the Scalable Information Systems, 4th International ICST Conference, 2009

Microarray Data Biclustering with Multi-objective Immune Optimization Algorithm.
Proceedings of the Fifth International Conference on Natural Computation, 2009

Multi-objective ant colony optimization biclustering of microarray data.
Proceedings of the 2009 IEEE International Conference on Granular Computing, 2009

Predicting gene function with positive and unlabeled examples.
Proceedings of the 2009 IEEE International Conference on Granular Computing, 2009

Active Measurement of Routing Table in Kad.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

Microarray Biclustering with Crowding Based MOACO.
Proceedings of the 2009 IEEE International Conference on Bioinformatics and Biomedicine, 2009

Simplifying Buffer Overflow Detection Using Site-Safe Expressions.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
Handling gene redundancy in microarray data using Grey Relational Analysis.
Int. J. Data Min. Bioinform., 2008

Modeling and Verifying Time Sensitive Security Protocols with Constraints.
Electron. Notes Theor. Comput. Sci., 2008

A Novel Derivation Framework For Definite Logic Program.
Electron. Notes Theor. Comput. Sci., 2008

fficient and Provably Secure Generic Construction of Client-to-Client Password-Based Key Exchange Protocol.
Electron. Notes Theor. Comput. Sci., 2008

Cryptanalysis of simple three-party key exchange protocol.
Comput. Secur., 2008

Supremum of Agent Number Needed in Analyzing Security Protocols Based on Horn Logic.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008

A Digital Signature Scheme on the Conic Curve over Zn Based on Two Hard Problems.
Proceedings of the PACIIA 2008, 2008

VM-based Architecture for Network Monitoring and Analysis.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Research on Mixture Language Model-based Document Clustering.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

Multi-objective Evolutionary Algorithm for Mining 3D Clusters in Gene-sample-time Microarray Data.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

A Novel Unsupervised Feature Selection Method for Bioinformatics Data Sets through Feature Clustering.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

Improving Information Retrieval within Language Model Framework by Integrating Adjacent and Distant Relation.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

Constraint Abstraction in Verification of Security Protocols.
Proceedings of the Frontiers in Algorithmics, Second Annual International Workshop, 2008

Timed Component-Interaction Automata for Specification and Verification of Real-Time Reactive Systems.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Local abstract verification and refinement of security protocols.
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, 2008

Multi-objective Particle Swarm Optimization Biclustering of Microarray Data.
Proceedings of the 2008 IEEE International Conference on Bioinformatics and Biomedicine, 2008

2007
A Description Logic Framework for Semantic Web Service Composition.
Proceedings of the Third International Conference on Semantics, 2007

An Effective Gene Selection Method Based on Relevance Analysis and Discernibility Matrix.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

A New Decision Tree Classification Method for Mining High-Speed Data Streams Based on Threaded Binary Search Trees.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

Incorporating constituent structure constraint into discriminative word alignment.
Proceedings of Machine Translation Summit XI: Papers, 2007

An Incremental Fuzzy Decision Tree Classification Method for Mining Data Streams.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2007

Hamiltonicity and Pancyclicity of Binary Recursive Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2007

Diameter bounds of cubelike recursive networks.
Proceedings of the 13th International Conference on Parallel and Distributed Systems, 2007

A Survey of Fuzzy Decision Tree Classifier Methodology.
Proceedings of the Fuzzy Information and Engineering, 2007

Algorithms for Different Approximations in Incomplete Information Systems with Maximal Compatible Classes as Primitive Granules.
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007

Semantic Smoothing the Multinomial Naive Bayes for Biomedical Literature Classification.
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007

Hamiltonian Property on Binary Recursive Networks.
Proceedings of the Frontiers in Algorithmics, First Annual International Workshop, 2007

Constraints Solution for Time Sensitive Security Protocols.
Proceedings of the Frontiers in Algorithmics, First Annual International Workshop, 2007

A New Fuzzy Decision Tree Classification Method for Mining High-Speed Data Streams Based on Binary Search Trees.
Proceedings of the Frontiers in Algorithmics, First Annual International Workshop, 2007

Ontology Based Clustering for Improving Genomic IR.
Proceedings of the 20th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2007), 2007

An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming.
Proceedings of the Advances in Computer Science, 2007

Model Checking for BPEL4WS with Time.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

A New Method of Cluster-Based Topic Language Model for Genomic IR.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Supporting Connector in Programming Language.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006

A New Component-Oriented Programming Language with the First-Class Connector.
Proceedings of the Modular Programming Languages, 7th Joint Modular Languages Conference, 2006

Minimum Redundancy Gene Selection Based on Grey Relational Analysis.
Proceedings of the Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006

A novel rough set approach for classification.
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006

Gene Selection for Classifying Microarray Data Using Grey Relation Analysis.
Proceedings of the Discovery Science, 9th International Conference, 2006

2004
Fast Mining Maximal Frequent ItemSets Based on FP-Tree.
Proceedings of the Conceptual Modeling, 2004

Mining Maximal Frequent ItemSets Using Combined FP-Tree.
Proceedings of the AI 2004: Advances in Artificial Intelligence, 2004

2003
A Proof Assistant for Mobile Processes.
Proceedings of the Advanced Parallel Programming Technologies, 5th International Workshop, 2003

1999
Universal abstract consistency class and universal refutation.
J. Comput. Sci. Technol., 1999

Computing Strong/Weak Bisimulation Equivalences and Observation Congruence for Value-Passing Processes.
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 1999

1998
Checking Strong/Weak Bisimulation Equivalences and Observation Congruence for the pi-Calculus.
Proceedings of the Automata, Languages and Programming, 25th International Colloquium, 1998


  Loading...