Rishita Anubhai

According to our database1, Rishita Anubhai authored at least 12 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
BioBridge: Bridging Biomedical Foundation Models via Knowledge Graphs.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

DATALORE: Can a Large Language Model Find All Lost Scrolls in a Data Repository?
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024

2023
Instruction Tuning for Few-Shot Aspect-Based Sentiment Analysis.
Proceedings of the 13th Workshop on Computational Approaches to Subjectivity, 2023

2022
Label Semantics for Few Shot Named Entity Recognition.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2022, 2022

2021
Structured Prediction as Translation between Augmented Natural Languages.
Proceedings of the 9th International Conference on Learning Representations, 2021

Multi-Task Learning and Adapted Knowledge Models for Emotion-Cause Extraction.
Proceedings of the Findings of the Association for Computational Linguistics: ACL/IJCNLP 2021, 2021

2020
Resource-Enhanced Neural Model for Event Argument Extraction.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2020, 2020

To BERT or Not to BERT: Comparing Task-specific and Task-agnostic Semi-Supervised Approaches for Sequence Tagging.
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, 2020

Severing the Edge Between Before and After: Neural Architectures for Temporal Ordering of Events.
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, 2020

2016

2015
Deep Speech 2: End-to-End Speech Recognition in English and Mandarin.
CoRR, 2015

2012
The most dangerous code in the world: validating SSL certificates in non-browser software.
Proceedings of the ACM Conference on Computer and Communications Security, 2012


  Loading...