Alert button
Picture for Chengzhi Huang

Chengzhi Huang

Alert button

Single-User Injection for Invisible Shilling Attack against Recommender Systems

Add code
Bookmark button
Alert button
Aug 21, 2023
Chengzhi Huang, Hui Li

Viaarxiv icon

Challenges and Solutions to Build a Data Pipeline to Identify Anomalies in Enterprise System Performance

Add code
Bookmark button
Alert button
Dec 13, 2021
Xiaobo Huang, Amitabha Banerjee, Chien-Chia Chen, Chengzhi Huang, Tzu Yi Chuang, Abhishek Srivastava, Razvan Cheveresan

Figure 1 for Challenges and Solutions to Build a Data Pipeline to Identify Anomalies in Enterprise System Performance
Figure 2 for Challenges and Solutions to Build a Data Pipeline to Identify Anomalies in Enterprise System Performance
Figure 3 for Challenges and Solutions to Build a Data Pipeline to Identify Anomalies in Enterprise System Performance
Figure 4 for Challenges and Solutions to Build a Data Pipeline to Identify Anomalies in Enterprise System Performance
Viaarxiv icon

Zero-Shot Language Transfer vs Iterative Back Translation for Unsupervised Machine Translation

Add code
Bookmark button
Alert button
Mar 31, 2021
Aviral Joshi, Chengzhi Huang, Har Simrat Singh

Figure 1 for Zero-Shot Language Transfer vs Iterative Back Translation for Unsupervised Machine Translation
Figure 2 for Zero-Shot Language Transfer vs Iterative Back Translation for Unsupervised Machine Translation
Figure 3 for Zero-Shot Language Transfer vs Iterative Back Translation for Unsupervised Machine Translation
Figure 4 for Zero-Shot Language Transfer vs Iterative Back Translation for Unsupervised Machine Translation
Viaarxiv icon