Ruoming Pang (庞若鸣)
Ruoming Pang (庞若鸣)
Google Brain
Verified email at
Cited by
Cited by
Mnasnet: Platform-aware neural architecture search for mobile
M Tan, B Chen, R Pang, V Vasudevan, M Sandler, A Howard, QV Le
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2019
Searching for mobilenetv3
A Howard, M Sandler, G Chu, LC Chen, B Chen, M Tan, W Wang, Y Zhu, ...
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2019
Natural tts synthesis by conditioning wavenet on mel spectrogram predictions
J Shen, R Pang, RJ Weiss, M Schuster, N Jaitly, Z Yang, Z Chen, Y Zhang, ...
2018 IEEE International Conference on Acoustics, Speech and Signal …, 2018
Efficientdet: Scalable and efficient object detection
M Tan, R Pang, QV Le
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2020
Nas-fpn: Learning scalable feature pyramid architecture for object detection
G Ghiasi, TY Lin, QV Le
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2019
Characteristics of internet background radiation
R Pang, V Yegneswaran, P Barford, V Paxson, L Peterson
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, 27-40, 2004
Streaming end-to-end speech recognition for mobile devices
Y He, TN Sainath, R Prabhavalkar, I McGraw, R Alvarez, D Zhao, ...
ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and …, 2019
Transfer learning from speaker verification to multispeaker text-to-speech synthesis
Y Jia, Y Zhang, RJ Weiss, Q Wang, J Shen, F Ren, Z Chen, P Nguyen, ...
arXiv preprint arXiv:1806.04558, 2018
The devil and packet trace anonymization
R Pang, M Allman, V Paxson, J Lee
ACM SIGCOMM Computer Communication Review 36 (1), 29-38, 2006
A first look at modern enterprise traffic
R Pang, M Allman, M Bennett, J Lee, V Paxson, B Tierney
Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement, 2-2, 2005
Conformer: Convolution-augmented transformer for speech recognition
A Gulati, J Qin, CC Chiu, N Parmar, Y Zhang, J Yu, W Han, S Wang, ...
arXiv preprint arXiv:2005.08100, 2020
Reliability and Security in the CoDeeN Content Distribution Network.
L Wang, KS Park, R Pang, VS Pai, LL Peterson
USENIX Annual Technical Conference, General Track, 171-184, 2004
A high-level programming environment for packet trace anonymization and transformation
R Pang, V Paxson
Proceedings of the 2003 conference on Applications, technologies …, 2003
Oblivious hashing: A stealthy software integrity verification primitive
Y Chen, R Venkatesan, M Cary, R Pang, S Sinha, MH Jakubowski
International Workshop on Information Hiding, 400-414, 2002
binpac: A yacc for writing application protocol parsers
R Pang, V Paxson, R Sommer, L Peterson
Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, 289-300, 2006
Hierarchical generative modeling for controllable speech synthesis
WN Hsu, Y Zhang, RJ Weiss, H Zen, Y Wu, Y Wang, Y Cao, Y Jia, Z Chen, ...
arXiv preprint arXiv:1810.07217, 2018
Lingvo: a modular and scalable framework for sequence-to-sequence modeling
J Shen, P Nguyen, Y Wu, Z Chen, MX Chen, Y Jia, A Kannan, T Sainath, ...
arXiv preprint arXiv:1902.08295, 2019
Defensive programming: Using an annotation toolkit to build DoS-resistant software
X Qie, R Pang, L Peterson
ACM SIGOPS Operating Systems Review 36 (SI), 45-60, 2002
Rethinking Hardware Support for Network Analysis and Intrusion Prevention.
V Paxson, K Asanovic, S Dharmapurikar, JW Lockwood, R Pang, ...
HotSec, 2006
Deadlock-free dynamic reconfiguration schemes for increased network dependability
TM Pinkston, R Pang, J Duato
IEEE Transactions on Parallel and Distributed Systems 14 (8), 780-794, 2003
The system can't perform the operation now. Try again later.
Articles 1–20