Attacking decipherment problems optimally with low-order n-gram models (2008)

by Sujith Ravi , Kevin Knight
Venue:In Proceedings of EMNLP 2008
Citations:10 - 6 self

Active Bibliography

4 Bayesian Inference for Zodiac and Other Homophonic Ciphers – Sujith Ravi, Kevin Knight
3 The Applications of Genetic Algorithms in Cryptanalysis – A.J. Bagnall - 1996
An Exact A * Method for Solving Letter Substitution Ciphers – Eric Corlett
2 Probabilistic Methods for a Japanese Syllable Cipher – Sujith Ravi, Kevin Knight - 2009
11 Substitution Deciphering Based on HMMs with Applications to Compressed Document Processing – Dar-shyang Lee - 2002
1 Efficient Attacks On Homophonic Substitution Ciphers – Amrapali Dhavare, Presented To, Amrapali Dhavare, Amrapali Dhavare, Amrapali Dhavare, Amrapali Dhavare - 2011
1 Efficient Cryptanalysis of Homophonic Substitution Ciphers – Amrapali Dhavare, Richard M. Low, Mark Stamp
A Study on Masquerade Detection – Lin Huang, Presented To
Recommended Citation – Sjsu Scholarworks, Wing Chan, Presented To, Wing On Chan - 2007
7 Bayesian inference for finite-state transducers – David Chiang, Jonathan Graehl, Kevin Knight, Adam Pauls, Sujith Ravi - 2010
Decipherment Complexity in 1:1 Substitution Ciphers – Malte Nuhn, Hermann Ney
Structured Language Models for . . . – Ying Zhang - 2009
1 Efficient Minimal Perfect Hash Language Models – David Guthrie, Wei Liu
Cryptographic Primitives – Paul Garrett - 2007
Last Words On Becoming a Discipline – Mark Steedman
Large-Scale Semi-Supervised Learning for Natural Language Processing – Shane Bergsma - 2010
5 2009. Efficacy of a constantly adaptive language model technique for web-scale applications – Kuansan Wang, Xiaolong Li
3 Automated Induction Of A Lexical Sublanguage Grammar Using A Hybrid System Of Corpus- And Knowledge-Based Techniques – Geert Jan Wilms, Geert Jan Wilms, Lois C. Boggess - 1995
4 A Robust Loose Coupling for Speech Recognition and Natural Language Understanding – Eric K. Ringger - 1995