default search action
Yichen Jiang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [b1]Yichen Jiang:
Inducing and Interpreting Compositionality in Neural NLP Models. University of North Carolina, Chapel Hill, USA, 2024 - [j6]Yichen Jiang, Yunwei Tang, Linhai Jing, Charles Galdies, Hui Li, Lin Yan, Haifeng Ding, Qiyuan Xie, Changyong Dou:
Urban nighttime aerosol optical depth retrieval methods from SDGSAT-1 glimmer data. Int. J. Digit. Earth 17(1) (2024) - [j5]Zhiwen Wen, Zhong Wang, Daming Zhou, Dezhou Qin, Yichen Jiang, Junchang Liu, Huachao Dong:
Research on Multiple-AUVs Collaborative Detection and Surrounding Attack Simulation. Sensors 24(2): 437 (2024) - [c25]Yichen Jiang, Xiang Zhou, Mohit Bansal:
Inducing Systematicity in Transformers by Attending to Structurally Quantized Embeddings. ACL (1) 2024: 8360-8383 - [c24]Yichen Jiang, Marco Del Vecchio, Mohit Bansal, Anders Johannsen:
Hierarchical and Dynamic Prompt Compression for Efficient Zero-shot API Usage. EACL (Findings) 2024: 2162-2174 - [i16]Yichen Jiang, Xiang Zhou, Mohit Bansal:
Inducing Systematicity in Transformers by Attending to Structurally Quantized Embeddings. CoRR abs/2402.06492 (2024) - 2023
- [j4]Gang Chen, Yichen Jiang, Keyi Guo:
Neural Active Disturbance Rejection Adaptive Lateral Manipulation Control Method for Unmanned Driving Robot. IEEE Intell. Transp. Syst. Mag. 15(1): 387-399 (2023) - [c23]Yichen Jiang, Shuo Wang, Renato Figueiredo, Yier Jin:
Warm-Boot Attack on Modern DRAMs. DATE 2023: 1-2 - [c22]Xiang Zhou, Yichen Jiang, Mohit Bansal:
Data Factors for Better Compositional Generalization. EMNLP 2023: 14549-14566 - [i15]Yichen Jiang, Michael D. Porter:
Quantifying the Influence of User Behaviors on the Dissemination of Fake News on Twitter with Multivariate Hawkes Processes. CoRR abs/2308.13927 (2023) - [i14]Xiang Zhou, Yichen Jiang, Mohit Bansal:
Data Factors for Better Compositional Generalization. CoRR abs/2311.04420 (2023) - 2022
- [j3]Hui Wang, Lili Jiang, Hongjun Duan, Yifeng Wang, Yichen Jiang, Xiaolei Zhang:
Jumping Risk Communities in the Energy Industry: An Empirical Analysis Based on Time-Varying Complex Networks. Complex. 2022: 8642443:1-8642443:12 (2022) - [j2]Gang Chen, Yichen Jiang, Keyi Guo, Liangmo Wang:
Speed Tracking Control for Unmanned Driving Robot Vehicle Based on Fuzzy Adaptive Sliding Mode Control. IEEE Trans. Veh. Technol. 71(12): 12617-12625 (2022) - [c21]Yichen Jiang, Michael D. Porter:
Simulating Fake News Dissemination on Twitter with Multivariate Hawkes Processes. IEEE Big Data 2022: 3597-3606 - [c20]Yichen Jiang, Xiang Zhou, Mohit Bansal:
Mutual Exclusivity Training and Primitive Augmentation to Induce Compositionality. EMNLP 2022: 11778-11793 - [i13]Paul Soulos, Sudha Rao, Caitlin Smith, Eric Rosen, Asli Celikyilmaz, R. Thomas McCoy, Yichen Jiang, Coleman Haley, Roland Fernandez, Hamid Palangi, Jianfeng Gao, Paul Smolensky:
Structural Biases for Improving Transformers on Translation into Morphologically Rich Languages. CoRR abs/2208.06061 (2022) - [i12]Yichen Jiang, Xiang Zhou, Mohit Bansal:
Mutual Exclusivity Training and Primitive Augmentation to Induce Compositionality. CoRR abs/2211.15578 (2022) - 2021
- [c19]Yichen Jiang, Huifeng Zhu, Dean Sullivan, Xiaolong Guo, Xuan Zhang, Yier Jin:
Quantifying Rowhammer Vulnerability for DRAM Security. DAC 2021: 73-78 - [c18]Yichen Jiang, Mohit Bansal:
Learning and Analyzing Generation Order for Undirected Sequence Models. EMNLP (Findings) 2021: 3513-3523 - [c17]Yichen Jiang, Mohit Bansal:
Inducing Transformer's Compositional Generalization Ability via Auxiliary Sequence Prediction Tasks. EMNLP (1) 2021: 6253-6265 - [c16]Yichen Jiang, Huifeng Zhu, Haoqi Shan, Xiaolong Guo, Xuan Zhang, Yier Jin:
TRRScope: Understanding Target Row Refresh Mechanism for Modern DDR Protection. HOST 2021: 239-247 - [c15]Yichen Jiang, Michael D. Porter:
Discovering Influence of Yelp Reviews Using Hawkes Point Processes. IntelliSys (3) 2021: 84-104 - [c14]Yichen Jiang, Asli Celikyilmaz, Paul Smolensky, Paul Soulos, Sudha Rao, Hamid Palangi, Roland Fernandez, Caitlin Smith, Mohit Bansal, Jianfeng Gao:
Enriching Transformers with Structured Tensor-Product Representations for Abstractive Summarization. NAACL-HLT 2021: 4780-4793 - [c13]Moeen Mostafavi, Maria Phillips, Yichen Jiang, Michael D. Porter, Paul Freedman:
A tale of two metrics: Polling and financial contributions as a measure of performance. SysCon 2021: 1-6 - [i11]Yichen Jiang, Asli Celikyilmaz, Paul Smolensky, Paul Soulos, Sudha Rao, Hamid Palangi, Roland Fernandez, Caitlin Smith, Mohit Bansal, Jianfeng Gao:
Enriching Transformers with Structured Tensor-Product Representations for Abstractive Summarization. CoRR abs/2106.01317 (2021) - [i10]Yichen Jiang, Mohit Bansal:
Inducing Transformer's Compositional Generalization Ability via Auxiliary Sequence Prediction Tasks. CoRR abs/2109.15256 (2021) - [i9]Yichen Jiang, Mohit Bansal:
Learning and Analyzing Generation Order for Undirected Sequence Models. CoRR abs/2112.09097 (2021) - 2020
- [c12]Yichen Jiang, Shikha Bordia, Zheng Zhong, Charles Dognin, Maneesh Kumar Singh, Mohit Bansal:
HoVer: A Dataset for Many-Hop Fact Extraction And Claim Verification. EMNLP (Findings) 2020: 3441-3460 - [i8]Yichen Jiang, Shikha Bordia, Zheng Zhong, Charles Dognin, Maneesh Singh, Mohit Bansal:
HoVer: A Dataset for Many-Hop Fact Extraction And Claim Verification. CoRR abs/2011.03088 (2020)
2010 – 2019
- 2019
- [j1]Yichen Jiang, Jenny Hamer, Chenghong Wang, Xiaoqian Jiang, Miran Kim, Yongsoo Song, Yuhou Xia, Noman Mohammed, Md. Nazmus Sadat, Shuang Wang:
SecureLR: Secure Logistic Regression Model via a Hybrid Cryptographic Protocol. IEEE ACM Trans. Comput. Biol. Bioinform. 16(1): 113-123 (2019) - [c11]Yichen Jiang, Nitish Joshi, Yen-Chun Chen, Mohit Bansal:
Explore, Propose, and Assemble: An Interpretable Model for Multi-Hop Reading Comprehension. ACL (1) 2019: 2714-2725 - [c10]Yichen Jiang, Mohit Bansal:
Avoiding Reasoning Shortcuts: Adversarial Evaluation, Training, and Model Development for Multi-Hop QA. ACL (1) 2019: 2726-2736 - [c9]Yichen Jiang, Mohit Bansal:
Self-Assembling Modular Networks for Interpretable Multi-Hop Reasoning. EMNLP/IJCNLP (1) 2019: 4473-4483 - [c8]Long Li, Tianhong Wang, Tao Jin, Peifeng Ma, Yichen Jiang, Guangjie Yuan, Yingzhong Tian:
Research on Shape Perception of the Soft Gripper Based on Triboelectric Nanogenerator. ROBIO 2019: 211-216 - [c7]Long Li, Peifeng Ma, Yichen Jiang, Tao Jin, Tong Wu, Guangjie Yuan, Yingzhong Tian:
Research on a Tubular Climbing Robot Induced by Tri-tube Soft Actuators. ROBIO 2019: 2189-2194 - [i7]Wenhao Wang, Yichen Jiang, Qintao Shen, Weihao Huang, Hao Chen, Shuang Wang, Xiaofeng Wang, Haixu Tang, Kai Chen, Kristin E. Lauter, Dongdai Lin:
Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance. CoRR abs/1905.07766 (2019) - [i6]Yichen Jiang, Nitish Joshi, Yen-Chun Chen, Mohit Bansal:
Explore, Propose, and Assemble: An Interpretable Model for Multi-Hop Reading Comprehension. CoRR abs/1906.05210 (2019) - [i5]Yichen Jiang, Mohit Bansal:
Avoiding Reasoning Shortcuts: Adversarial Evaluation, Training, and Model Development for Multi-Hop QA. CoRR abs/1906.07132 (2019) - [i4]Yichen Jiang, Mohit Bansal:
Self-Assembling Modular Networks for Interpretable Multi-Hop Reasoning. CoRR abs/1909.05803 (2019) - 2018
- [c6]Yichen Jiang, Chenghong Wang, Shuang Wang:
Privacy-preserving biomedical data dissemination via a hybrid approach. AMIA 2018 - [c5]Yichen Jiang, Mohit Bansal:
Closed-Book Training to Improve Summarization Encoder Memory. EMNLP 2018: 4067-4077 - [i3]Yichen Jiang, Mohit Bansal:
Closed-Book Training to Improve Summarization Encoder Memory. CoRR abs/1809.04585 (2018) - 2017
- [c4]Chenghong Wang, Yichen Jiang, Feng Chen, Noman Mohammed, Xiaoqian Jiang, Md Momin Al Aziz, Md. Nazmus Sadat, Shuang Wang:
SCOTCH: Secure Counting Of encrypTed genomiC data using a Hybrid approach. AMIA 2017 - 2014
- [c3]Anna Lan, Zhen Han, Dawei Zhang, Yichen Jiang, Tianhua Liu, Meihong Li:
An Anonymous Remote Attestation Protocol to Prevent Masquerading Attack. UIC/ATC/ScalCom 2014: 590-595 - [i2]Yichen Jiang, Yi Ji, Tianhua Liu:
An Anonymous Communication Scheme based on Ring Signature in VANETs. CoRR abs/1410.1639 (2014) - [i1]Yichen Jiang:
Privacy-Preserving Vehicular Announcements Aggregation Scheme Based on Threshold Ring Signature. CoRR abs/1411.3433 (2014) - 2012
- [c2]Yichen Jiang, Aixia Jia, Yansong Feng, Dongyan Zhao:
Recommending academic papers via users' reading purposes. RecSys 2012: 241-244 - 2011
- [c1]Mingrui Zhang, Yingxu Liu, Yichen Jiang, Zhifu Sun, Ping Yang:
Model based user interface design for predicting lung cancer treatment outcomes. EMBC 2011: 75-78
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-27 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint