共 15 条
- [1] Chen JZ, 2016, PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), P551, DOI [10.1109/CIS.2016.0134, 10.1109/CIS.2016.133]
- [2] [陈钊 Chen Zhao], 2015, [中文信息学报, Journal of Chinese Information Processing], V29, P172
- [3] He X., 2016, P 2016 C EMP METH NA, P1598
- [4] Kim Y., 2014, P 2014 C EMP METH NA
- [5] LIANG Jun, 2015, J CHINESE INFORM PRO, V29, P160, DOI [10.3969/j.issn.1003-0077.2015.05.020, DOI 10.3969/J.ISSN.1003-0077.2015.05.020]
- [6] LIU Feilong, 2017, COMPUTER SCI, V44, P92, DOI [10.11896/j.issn.1002-137X.2017.6A.019, DOI 10.11896/J.ISSN.1002-137X.2017.6A.019]
- [7] [刘龙飞 Liu Longfei], 2015, [中文信息学报, Journal of Chinese Information Processing], V29, P159
- [8] Mi Haitao, 2016, P 2016 C EMP METH NA, P2283, DOI DOI 10.18653/V1/D16-1249
- [9] Miyamoto Y.., 2016, P 2016 C EMP METH NA, P1992, DOI DOI 10.18653/V1/D16-1209
- [10] Parikh A., 2016, EMNLP, P2249