Login / Signup
Ankit Arun
Publication Activity (10 Years)
Years Active: 2017-2022
Publications (10 Years): 8
Top Topics
Natural Language
Moving Target
Automatic Summarization
Neural Classifier
Top Venues
CoRR
CSCML
IEEE BigData
COLING (Industry)
</>
Publications
</>
Asish Ghoshal
,
Arash Einolghozati
,
Ankit Arun
,
Haoran Li
,
Lili Yu
,
Yashar Mehdad
,
Scott Wen-tau Yih
,
Asli Celikyilmaz
Improving Faithfulness of Abstractive Summarization by Controlling Confounding Effect of Irrelevant Sentences.
CoRR
(2022)
Soumya Batra
,
Shashank Jain
,
Peyman Heidari
,
Ankit Arun
,
Catharine Youngs
,
Xintong Li
,
Pinar Donmez
,
Shawn Mei
,
Shiunzu Kuo
,
Vikas Bhardwaj
,
Anuj Kumar
,
Michael White
Building Adaptive Acceptability Classifiers for Neural NLG.
EMNLP (1)
(2021)
Peyman Heidari
,
Arash Einolghozati
,
Shashank Jain
,
Soumya Batra
,
Lee Callender
,
Ankit Arun
,
Shawn Mei
,
Sonal Gupta
,
Pinar Donmez
,
Vikas Bhardwaj
,
Anuj Kumar
,
Michael White
Getting to Production with Few-shot Natural Language Generation Models.
SIGDIAL
(2021)
Ankit Arun
,
Soumya Batra
,
Vikas Bhardwaj
,
Ashwini Challa
,
Pinar Donmez
,
Peyman Heidari
,
Hakan Inan
,
Shashank Jain
,
Anuj Kumar
,
Shawn Mei
,
Karthik Mohan
,
Michael White
Best Practices for Data-Efficient Modeling in NLG: How to Train Production-Ready Neural Models with Less Data.
COLING (Industry)
(2020)
Ankit Arun
,
Soumya Batra
,
Vikas Bhardwaj
,
Ashwini Challa
,
Pinar Donmez
,
Peyman Heidari
,
Hakan Inan
,
Shashank Jain
,
Anuj Kumar
,
Shawn Mei
,
Karthik Mohan
,
Michael White
Best Practices for Data-Efficient Modeling in NLG: How to Train Production-Ready Neural Models with Less Data.
CoRR
(2020)
Ankit Arun
,
Ignacio Arnaldo
Shooting the moving target: machine learning in cybersecurity.
OpML
(2019)
Ignacio Arnaldo
,
Ankit Arun
,
Sumeeth Kyathanahalli
,
Kalyan Veeramachaneni
Acquire, adapt, and anticipate: continuous learning to block malicious domains.
IEEE BigData
(2018)
Ignacio Arnaldo
,
Alfredo Cuesta-Infante
,
Ankit Arun
,
Mei Lam
,
Costas Bassias
,
Kalyan Veeramachaneni
Learning Representations for Log Data in Cybersecurity.
CSCML
(2017)