Ruoming Pang (庞若鸣)
Ruoming Pang (庞若鸣)
Google Brain
Dirección de correo verificada de
Citado por
Citado por
Natural tts synthesis by conditioning wavenet on mel spectrogram predictions
J Shen, R Pang, RJ Weiss, M Schuster, N Jaitly, Z Yang, Z Chen, Y Zhang, ...
2018 IEEE International Conference on Acoustics, Speech and Signal …, 2018
Mnasnet: Platform-aware neural architecture search for mobile
M Tan, B Chen, R Pang, V Vasudevan, M Sandler, A Howard, QV Le
Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2019
Characteristics of internet background radiation
R Pang, V Yegneswaran, P Barford, V Paxson, L Peterson
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, 27-40, 2004
Searching for mobilenetv3
A Howard, M Sandler, G Chu, LC Chen, B Chen, M Tan, W Wang, Y Zhu, ...
Proceedings of the IEEE International Conference on Computer Vision, 1314-1324, 2019
The devil and packet trace anonymization
R Pang, M Allman, V Paxson, J Lee
ACM SIGCOMM Computer Communication Review 36 (1), 29-38, 2006
A first look at modern enterprise traffic
R Pang, M Allman, M Bennett, J Lee, V Paxson, B Tierney
Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement, 2-2, 2005
Reliability and Security in the CoDeeN Content Distribution Network.
L Wang, KS Park, R Pang, VS Pai, LL Peterson
USENIX Annual Technical Conference, General Track, 171-184, 2004
A high-level programming environment for packet trace anonymization and transformation
R Pang, V Paxson
Proceedings of the 2003 conference on Applications, technologies …, 2003
Transfer learning from speaker verification to multispeaker text-to-speech synthesis
Y Jia, Y Zhang, R Weiss, Q Wang, J Shen, F Ren, P Nguyen, R Pang, ...
Advances in neural information processing systems, 4480-4490, 2018
Oblivious hashing: A stealthy software integrity verification primitive
Y Chen, R Venkatesan, M Cary, R Pang, S Sinha, MH Jakubowski
International Workshop on Information Hiding, 400-414, 2002
Nas-fpn: Learning scalable feature pyramid architecture for object detection
G Ghiasi, TY Lin, QV Le
Proceedings of the IEEE conference on computer vision and pattern …, 2019
Streaming end-to-end speech recognition for mobile devices
Y He, TN Sainath, R Prabhavalkar, I McGraw, R Alvarez, D Zhao, ...
ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and …, 2019
binpac: A yacc for writing application protocol parsers
R Pang, V Paxson, R Sommer, L Peterson
Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, 289-300, 2006
Efficientdet: Scalable and efficient object detection
M Tan, R Pang, QV Le
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020
Rethinking Hardware Support for Network Analysis and Intrusion Prevention.
V Paxson, K Asanovic, S Dharmapurikar, JW Lockwood, R Pang, ...
HotSec, 2006
Deadlock-free dynamic reconfiguration schemes for increased network dependability
TM Pinkston, R Pang, J Duato
IEEE Transactions on Parallel and Distributed Systems 14 (8), 780-794, 2003
Defensive programming: Using an annotation toolkit to build DoS-resistant software
X Qie, R Pang, L Peterson
ACM SIGOPS Operating Systems Review 36 (SI), 45-60, 2002
The dark side of the Web: an open proxy's view
VS Pai, L Wang, KS Park, R Pang, L Peterson
ACM SIGCOMM Computer Communication Review 34 (1), 57-62, 2004
Hierarchical generative modeling for controllable speech synthesis
WN Hsu, Y Zhang, RJ Weiss, H Zen, Y Wu, Y Wang, Y Cao, Y Jia, Z Chen, ...
arXiv preprint arXiv:1810.07217, 2018
Lingvo: a modular and scalable framework for sequence-to-sequence modeling
J Shen, P Nguyen, Y Wu, Z Chen, MX Chen, Y Jia, A Kannan, T Sainath, ...
arXiv preprint arXiv:1902.08295, 2019
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20