no code implementations • 9 Oct 2023 • Shuyu Jiang, Wenyi Tang, Xingshu Chen, Rui Tanga, Haizhou Wang, Wenxian Wang
To address these limitations, we propose Retrieval-Augmented Unsupervised Counter Narrative Generation (RAUCG) to automatically expand external counter-knowledge and map it into CNs in an unsupervised paradigm.
no code implementations • 17 Apr 2023 • Yuxing Yang, Junhao Zhao, Siyi Wang, Xiangyu Min, Pengchao Wang, Haizhou Wang
With the rise of short video platforms as prominent channels for news dissemination, major platforms in China have gradually evolved into fertile grounds for the proliferation of fake news.
Automatic Speech Recognition Automatic Speech Recognition (ASR) +5
no code implementations • 5 Mar 2022 • Shuyu Jiang, Dengbiao Tu, Xingshu Chen, Rui Tang, Wenxian Wang, Haizhou Wang
Therefore, we first propose a clue-guided cross-lingual abstractive summarization method to improve the quality of cross-lingual summaries, and then construct a novel hand-written CLS dataset for evaluation.
Abstractive Text Summarization Cross-Lingual Abstractive Summarization +2
no code implementations • 4 Mar 2022 • Zhenxiong Miao, Xingshu Chen, Haizhou Wang, Rui Tang, Zhou Yang, Wenyi Tang
In this paper, we propose an end-to-end method based on community structure and text features for offensive language detection (CT-OLD).
no code implementations • 26 Aug 2020 • Chunhui Li, Xingshu Chen, Haizhou Wang, Yu Zhang, Peiming Wang
Firstly, we train CAPTCHA synthesizers based on the cycle-GAN to generate some fake samples.
no code implementations • 26 Aug 2020 • Yiding Wang, Zhenyi Wang, Chenghao Li, Yilin Zhang, Haizhou Wang
In recent years, due to the mental burden of depression, the number of people who endanger their lives has been increasing rapidly.
no code implementations • 12 Dec 2019 • Yoon-Ho Choi, Peng Liu, Zitong Shang, Haizhou Wang, Zhilong Wang, Lan Zhang, Junwei Zhou, Qingtian Zou
Although using machine learning techniques to solve computer security challenges is not a new idea, the rapidly emerging Deep Learning technology has recently triggered a substantial amount of interests in the computer security community.
Cryptography and Security