1 code implementation • NAACL 2022 • Chuyun Deng, Mingxuan Liu, Yue Qin, Jia Zhang, Hai-Xin Duan, Donghong Sun
Adversarial texts help explore vulnerabilities in language models, improve model robustness, and explain their working mechanisms.
no code implementations • 4 Jul 2022 • Yue Qin, Xiaojing Liao
Cybersecurity vulnerability information is often recorded by multiple channels, including government vulnerability repositories, individual-maintained vulnerability-gathering platforms, or vulnerability-disclosure email lists and forums.
1 code implementation • 24 May 2021 • Yizheng Chen, Shiqi Wang, Yue Qin, Xiaojing Liao, Suman Jana, David Wagner
Since data distribution shift is very common in security applications, e. g., often observed for malware detection, local robustness cannot guarantee that the property holds for unseen inputs at the time of deploying the classifier.
no code implementations • nature climate change 2020 • Yue Qin, John T. Abatzoglou, Stefan Siebert, Laurie S. Huning, Amir AghaKouchak, Justin S. Mankin, Chaopeng Hong, Dan Tong, Steven J. Davis and Nathaniel D. Mueller
Snowpack stores cold-season precipitation to meet warm-season water demand.
1 code implementation • 24 Jul 2018 • Jing Yang, Biao Zhang, Yue Qin, Xiangwen Zhang, Qian Lin, Jinsong Su
Although neural machine translation(NMT) yields promising translation performance, it unfortunately suffers from over- and under-translation is- sues [Tu et al., 2016], of which studies have become research hotspots in NMT.
2 code implementations • 16 Jan 2018 • Xiangwen Zhang, Jinsong Su, Yue Qin, Yang Liu, Rongrong Ji, Hongji Wang
The dominant neural machine translation (NMT) models apply unified attentional encoder-decoder neural networks for translation.