Picture for Chengzhi Huang

Chengzhi Huang

Single-User Injection for Invisible Shilling Attack against Recommender Systems

Add code
Aug 21, 2023
Viaarxiv icon

Challenges and Solutions to Build a Data Pipeline to Identify Anomalies in Enterprise System Performance

Add code
Dec 13, 2021
Figure 1 for Challenges and Solutions to Build a Data Pipeline to Identify Anomalies in Enterprise System Performance
Figure 2 for Challenges and Solutions to Build a Data Pipeline to Identify Anomalies in Enterprise System Performance
Figure 3 for Challenges and Solutions to Build a Data Pipeline to Identify Anomalies in Enterprise System Performance
Figure 4 for Challenges and Solutions to Build a Data Pipeline to Identify Anomalies in Enterprise System Performance
Viaarxiv icon

Zero-Shot Language Transfer vs Iterative Back Translation for Unsupervised Machine Translation

Add code
Mar 31, 2021
Figure 1 for Zero-Shot Language Transfer vs Iterative Back Translation for Unsupervised Machine Translation
Figure 2 for Zero-Shot Language Transfer vs Iterative Back Translation for Unsupervised Machine Translation
Figure 3 for Zero-Shot Language Transfer vs Iterative Back Translation for Unsupervised Machine Translation
Figure 4 for Zero-Shot Language Transfer vs Iterative Back Translation for Unsupervised Machine Translation
Viaarxiv icon