1 code implementation • Findings (ACL) 2022 • Yu tong, Jingzhi Guo, Jizhe Zhou, Ge Chen, Guokai Zheng
Thinking in reverse, CWS can also be viewed as a process of grouping a sequence of characters into a sequence of words.
no code implementations • 6 Oct 2022 • Hsin-Yuan Huang, Yu tong, Di Fang, Yuan Su
In contrast, the best previous algorithms, such as recent works using gradient-based optimization or polynomial interpolation, require a total evolution time of $\mathcal{O}(\epsilon^{-2})$ and $\mathcal{O}(\epsilon^{-2})$ experiments.
no code implementations • 3 Jan 2021 • Jizhe Zhou, Chi-Man Pun, Yu tong
A larger portion of fake news quotes untampered images from other sources with ulterior motives rather than conducting image forgery.
no code implementations • 3 Jan 2021 • Jizhe Zhou, Chi-Man Pun, Yu tong
With the prevailing of live video streaming, establishing an online pixelation method for privacy-sensitive objects is an urgency.
3 code implementations • 13 Jan 2020 • Liang Xu, Yu tong, Qianqian Dong, Yixuan Liao, Cong Yu, Yin Tian, Weitang Liu, Lu Li, Caiquan Liu, Xuanwei Zhang
In this paper, we introduce the NER dataset from CLUE organization (CLUENER2020), a well-defined fine-grained dataset for named entity recognition in Chinese.
Chinese Named Entity Recognition named-entity-recognition +2