Model editing techniques modify a minor proportion of knowledge in Large...
Text-to-SQL aims at generating SQL queries for the given natural languag...
Prompt tuning, like CoOp, has recently shown promising vision recognizin...
There is evidence that address matching plays a crucial role in many are...
Recently, many studies incorporate external knowledge into character-lev...
Span-based joint extraction simultaneously conducts named entity recogni...
State-of-the-art generative model-based attacks against image classifier...
Multi-Document Scientific Summarization (MDSS) aims to produce coherent ...
An exhaustive study has been conducted to investigate span-based models ...
Textual adversarial attacks expose the vulnerabilities of text classifie...
Few-shot named entity recognition (NER) enables us to build a NER system...
Text summarization models are often trained to produce summaries that me...
Document retrieval enables users to find their required documents accura...
For Named Entity Recognition (NER), sequence labeling-based and span-bas...
Blackbox transfer attacks for image classifiers have been extensively st...
Deep Neural Networks (DNNs) have been shown to be vulnerable to adversar...
When compared to the image classification models, black-box adversarial
...
The success of deep neural networks (DNNs) haspromoted the widespread
ap...
Vision systems that deploy Deep Neural Networks (DNNs) are known to be
v...
Span-based joint extraction simultaneously conducts named entity recogni...
As Deep Packet Inspection (DPI) middleboxes become increasingly popular,...
The emergence of Internet of Things (IoT) brings about new security
chal...
There has been a recent surge in research on adversarial perturbations t...
Efforts by online ad publishers to circumvent traditional ad blockers to...
Recent research has demonstrated the brittleness of machine learning sys...
Drug-drug interaction (DDI) is a vital information when physicians and
p...