Publisher
Zhejiang University Press
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing
Reference46 articles.
1. Bridges RA, Jones CL, Iannacone MD, et al., 2013. Automatic labeling for entity extraction in cyber security. https://arxiv.org/abs/1308.4941
2. Caruana R, 1997. Multitask learning. Mach Learn, 28(1):41–75. https://doi.org/10.1023/A:1007379606734
3. Devlin J, Chang MW, Lee K, 2018. BERT: pre-training of deep bidirectional transformers for language understanding. https://arxiv.org/abs/1810.04805
4. Dionísio N, Alves F, Ferreira PM, et al., 2019. Cyberthreat detection from Twitter using deep neural networks. Int Joint Conf on Neural Networks, p.1–8. https://doi.org/10.1109/IJCNN.2019.8852475
5. Eddy SR, 1996. Hidden Markov models. Curr Opin Struct Biol, 6(3):361–365. https://doi.org/10.1016/s0959-440X(96)80056-X
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献