Neural machine translation: A review

F Stahlberg - Journal of Artificial Intelligence Research, 2020 - jair.org
The field of machine translation (MT), the automatic translation of written text from one
natural language into another, has experienced a major paradigm shift in recent years …

Subword regularization: Improving neural network translation models with multiple subword candidates

T Kudo - arXiv preprint arXiv:1804.10959, 2018 - arxiv.org
Subword units are an effective way to alleviate the open vocabulary problems in neural
machine translation (NMT). While sentences are usually converted into unique subword …

Chinese NER using lattice LSTM

Y Zhang, J Yang - arXiv preprint arXiv:1805.02023, 2018 - arxiv.org
We investigate a lattice-structured LSTM model for Chinese NER, which encodes a
sequence of input characters as well as all potential words that match a lexicon. Compared …

Vuldeepecker: A deep learning-based system for vulnerability detection

Z Li, D Zou, S Xu, X Ou, H Jin, S Wang, Z Deng… - arXiv preprint arXiv …, 2018 - arxiv.org
The automatic detection of software vulnerabilities is an important research problem.
However, existing solutions to this problem rely on human experts to define features and …

[PDF][PDF] 神经机器翻译综述

李亚超, 熊德意, 张民 - 计算机学报, 2018 - cdn.jsdelivr.net
摘要机器翻译研究将源语言所表达的语义自动转换为目标语言的相同语义,
是人工智能和自然语言处理的重要研究内容. 近年来, 基于序列到序列模型(Sequence-to …

Chinese relation extraction with multi-grained information and external linguistic knowledge

Z Li, N Ding, Z Liu, H Zheng, Y Shen - Proceedings of the 57th …, 2019 - aclanthology.org
Chinese relation extraction is conducted using neural networks with either character-based
or word-based inputs, and most existing methods typically suffer from segmentation errors …

VDSimilar: Vulnerability detection based on code similarity of vulnerabilities and patches

H Sun, L Cui, L Li, Z Ding, Z Hao, J Cui, P Liu - Computers & Security, 2021 - Elsevier
Vulnerability detection using machine learning is a hot topic in improving software security.
However, existing works formulate detection as a classification problem, which requires a …

Patchdb: A large-scale security patch dataset

X Wang, S Wang, P Feng, K Sun… - 2021 51st Annual IEEE …, 2021 - ieeexplore.ieee.org
Security patches, embedding both vulnerable code and the corresponding fixes, are of great
significance to vulnerability detection and software maintenance. However, the existing …

Porous lattice transformer encoder for Chinese NER

X Mengge, B Yu, T Liu, Y Zhang, E Meng… - Proceedings of the …, 2020 - aclanthology.org
Incorporating lexicons into character-level Chinese NER by lattices is proven effective to
exploitrich word boundary information. Previous work has extended RNNs to consume …

ASR n-best fusion nets

X Liu, M Li, L Chen, P Wanigasekara… - ICASSP 2021-2021 …, 2021 - ieeexplore.ieee.org
Current spoken language understanding systems heavily rely on the best hypothesis (ASR 1-
best) generated by automatic speech recognition, which is used as the input for downstream …