Cited By
View all- Kumarasinghe ULekssays ASencar HBoughorbel SElvitigala CNakov PQuek TGao DZhou JCardenas A(2024)Semantic Ranking for Automated Adversarial Technique Annotation in Security TextProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3645000(49-62)Online publication date: 1-Jul-2024
- Chang SAhn GPark S(2024)Improving Performance of Neural IR Models by Using a Keyword-Extraction-Based Weak-Supervision MethodIEEE Access10.1109/ACCESS.2024.338219012(46851-46863)Online publication date: 2024
- Fan YTu XLi R(2024)An Inverse Retrieval Method via Query Generation for Xiaohongshu’s Search EngineAdvanced Intelligent Computing Technology and Applications10.1007/978-981-97-5675-9_31(362-373)Online publication date: 1-Aug-2024
- Show More Cited By