Search Results for author: Yue Qin

Found 6 papers, 4 papers with code

Cybersecurity Entity Alignment via Masked Graph Attention Networks

no code implementations4 Jul 2022 Yue Qin, Xiaojing Liao

Cybersecurity vulnerability information is often recorded by multiple channels, including government vulnerability repositories, individual-maintained vulnerability-gathering platforms, or vulnerability-disclosure email lists and forums.

Entity Alignment Graph Attention

Learning Security Classifiers with Verified Global Robustness Properties

1 code implementation24 May 2021 Yizheng Chen, Shiqi Wang, Yue Qin, Xiaojing Liao, Suman Jana, David Wagner

Since data distribution shift is very common in security applications, e. g., often observed for malware detection, local robustness cannot guarantee that the property holds for unseen inputs at the time of deploying the classifier.

Malware Detection

Otem&Utem: Over- and Under-Translation Evaluation Metric for NMT

1 code implementation24 Jul 2018 Jing Yang, Biao Zhang, Yue Qin, Xiangwen Zhang, Qian Lin, Jinsong Su

Although neural machine translation(NMT) yields promising translation performance, it unfortunately suffers from over- and under-translation is- sues [Tu et al., 2016], of which studies have become research hotspots in NMT.

Machine Translation NMT +1

Asynchronous Bidirectional Decoding for Neural Machine Translation

2 code implementations16 Jan 2018 Xiangwen Zhang, Jinsong Su, Yue Qin, Yang Liu, Rongrong Ji, Hongji Wang

The dominant neural machine translation (NMT) models apply unified attentional encoder-decoder neural networks for translation.

Machine Translation NMT +1

Cannot find the paper you are looking for? You can Submit a new open access paper.