default search action
Meihuizi Jia
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Wang Zhao, Dongxiao Gu, Xuejie Yang, Meihuizi Jia, Changyong Liang, Xiaoyu Wang, Oleg Zolotarev:
MedT2T: An adaptive pointer constrain generating method for a new medical text-to-table task. Future Gener. Comput. Syst. 161: 586-600 (2024) - [j7]Zhendong Chen, Fuzhen Zhuang, Lejian Liao, Meihuizi Jia, Jiaqi Li, Heyan Huang:
A syntactic multi-level interaction network for rumor detection. Neural Comput. Appl. 36(4): 1713-1726 (2024) - [j6]Zhendong Chen, Siu Cheung Hui, Fuzhen Zhuang, Lejian Liao, Meihuizi Jia, Jiaqi Li, Heyan Huang:
A syntactic evidence network model for fact verification. Neural Networks 178: 106424 (2024) - [j5]Meihuizi Jia, Lei Shen, Luu Anh Tuan, Meng Chen, Jing Xu, Lejian Liao, Shaozu Yuan, Xiaodong He:
MuJo-SF: Multimodal Joint Slot Filling for Attribute Value Prediction of E-Commerce Commodities. IEEE Trans. Multim. 26: 10354-10366 (2024) - [c13]Shuai Zhao, Meihuizi Jia, Anh Tuan Luu, Fengjun Pan, Jinming Wen:
Universal Vulnerabilities in Large Language Models: Backdoor Attacks for In-context Learning. EMNLP 2024: 11507-11522 - [c12]Shuai Zhao, Leilei Gan, Anh Tuan Luu, Jie Fu, Lingjuan Lyu, Meihuizi Jia, Jinming Wen:
Defending Against Weight-Poisoning Backdoor Attacks for Parameter-Efficient Fine-Tuning. NAACL-HLT (Findings) 2024: 3421-3438 - [c11]Jing Xu, Dandan Song, Siu Hui, Zhijing Wu, Meihuizi Jia, Hao Wang, Yanru Zhou, Changzhi Zhou, Ziyi Yang:
Separation and Fusion: A Novel Multiple Token Linking Model for Event Argument Extraction. NAACL-HLT 2024: 6611-6624 - [i5]Shuai Zhao, Meihuizi Jia, Luu Anh Tuan, Jinming Wen:
Universal Vulnerabilities in Large Language Models: In-context Learning Backdoor Attacks. CoRR abs/2401.05949 (2024) - [i4]Shuai Zhao, Leilei Gan, Luu Anh Tuan, Jie Fu, Lingjuan Lyu, Meihuizi Jia, Jinming Wen:
Defending Against Weight-Poisoning Backdoor Attacks for Parameter-Efficient Fine-Tuning. CoRR abs/2402.12168 (2024) - [i3]Shuai Zhao, Meihuizi Jia, Zhongliang Guo, Leilei Gan, Jie Fu, Yichao Feng, Fengjun Pan, Luu Anh Tuan:
A Survey of Backdoor Attacks and Defenses on Large Language Models: Implications for Security Measures. CoRR abs/2406.06852 (2024) - [i2]Shuai Zhao, Xiaobao Wu, Cong-Duy Nguyen, Meihuizi Jia, Yichao Feng, Luu Anh Tuan:
Unlearning Backdoor Attacks for LLMs with Weak-to-Strong Knowledge Distillation. CoRR abs/2410.14425 (2024) - 2023
- [j4]Zhendong Chen, Fuzhen Zhuang, Lejian Liao, Meihuizi Jia, Jiaqi Li, Heyan Huang:
Effectively Modeling Sentence Interactions With Factorization Machines for Fact Verification. IEEE Intell. Syst. 38(5): 18-27 (2023) - [c10]Meihuizi Jia, Lei Shen, Xin Shen, Lejian Liao, Meng Chen, Xiaodong He, Zhendong Chen, Jiaqi Li:
MNER-QG: An End-to-End MRC Framework for Multimodal Named Entity Recognition with Query Grounding. AAAI 2023: 8032-8040 - 2022
- [j3]Meihuizi Jia, Lejian Liao, Wenjing Wang, Fei Li, Zhendong Chen, Jiaqi Li, Heyan Huang:
Keywords-aware dynamic graph neural network for multi-hop reading comprehension. Neurocomputing 501: 25-40 (2022) - [c9]Meihuizi Jia, Ruixue Liu, Peiying Wang, Yang Song, Zexi Xi, Haobin Li, Xin Shen, Meng Chen, Jinhui Pang, Xiaodong He:
E-ConvRec: A Large-Scale Conversational Recommendation Dataset for E-Commerce Customer Service. LREC 2022: 5787-5796 - [c8]Meihuizi Jia, Xin Shen, Lei Shen, Jinhui Pang, Lejian Liao, Yang Song, Meng Chen, Xiaodong He:
Query Prior Matters: A MRC Framework for Multimodal Named Entity Recognition. ACM Multimedia 2022: 3549-3558 - [c7]Zhendong Chen, Siu Cheung Hui, Fuzhen Zhuang, Lejian Liao, Fei Li, Meihuizi Jia, Jiaqi Li:
EvidenceNet: Evidence Fusion Network for Fact Verification. WWW 2022: 2636-2645 - [i1]Meihuizi Jia, Lei Shen, Xin Shen, Lejian Liao, Meng Chen, Xiaodong He, Zhendong Chen, Jiaqi Li:
MNER-QG: An End-to-End MRC framework for Multimodal Named Entity Recognition with Query Grounding. CoRR abs/2211.14739 (2022) - 2021
- [c6]Fei Li, Zheng Wang, Siu Cheung Hui, Lejian Liao, Dandan Song, Jing Xu, Guoxiu He, Meihuizi Jia:
Modularized Interaction Network for Named Entity Recognition. ACL/IJCNLP (1) 2021: 200-209
2010 – 2019
- 2019
- [j2]Huifang Ma, Di Zhang, Meihuizi Jia, Xianghong Lin:
A term correlation based semi-supervised microblog clustering with dual constraints. Int. J. Mach. Learn. Cybern. 10(4): 679-692 (2019) - 2017
- [j1]Huifang Ma, Meihuizi Jia, Di Zhang, Xianghong Lin:
Combining tag correlation and user social relation for microblog recommendation. Inf. Sci. 385: 325-337 (2017) - 2016
- [c5]Huifang Ma, Meihuizi Jia, Xianghong Lin, Fuzhen Zhuang:
Tag correlation and user social relation based microblog recommendation. IJCNN 2016: 2424-2430 - 2015
- [c4]Huifang Ma, Meihuizi Jia, Weizhong Zhao, Xianghong Lin:
Semi-supervised Microblog Clustering Method via Dual Constraints. KSEM 2015: 360-369 - [c3]Huifang Ma, Meihuizi Jia, Meng Xie, Xianghong Lin:
A Microblog Recommendation Algorithm Based on Multi-tag Correlation. KSEM 2015: 483-488 - 2014
- [c2]Huifang Ma, Meihuizi Jia, YaKai Shi, Zhanjun Hao:
Semi-supervised Nonnegative Matrix Factorization for Microblog Clustering Based on Term Correlation. APWeb 2014: 511-516 - [c1]Yuexin Sun, Huifang Ma, Meihuizi Jia, Peiqing Wang:
An Efficient Microblog Hot Topic Detection Algorithm Based on Two Stage Clustering. Intelligent Information Processing 2014: 90-95
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-01 01:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint