Picture for Chenxi Yang

Chenxi Yang

A Practical Cross-Layer Approach for ML-Driven Storage Placement in Warehouse-Scale Computers

Add code
Jan 10, 2025
Figure 1 for A Practical Cross-Layer Approach for ML-Driven Storage Placement in Warehouse-Scale Computers
Figure 2 for A Practical Cross-Layer Approach for ML-Driven Storage Placement in Warehouse-Scale Computers
Figure 3 for A Practical Cross-Layer Approach for ML-Driven Storage Placement in Warehouse-Scale Computers
Figure 4 for A Practical Cross-Layer Approach for ML-Driven Storage Placement in Warehouse-Scale Computers
Viaarxiv icon

C3: Learning Congestion Controllers with Formal Certificates

Add code
Dec 14, 2024
Figure 1 for C3: Learning Congestion Controllers with Formal Certificates
Figure 2 for C3: Learning Congestion Controllers with Formal Certificates
Figure 3 for C3: Learning Congestion Controllers with Formal Certificates
Figure 4 for C3: Learning Congestion Controllers with Formal Certificates
Viaarxiv icon

Beyond Score Changes: Adversarial Attack on No-Reference Image Quality Assessment from Two Perspectives

Add code
Apr 24, 2024
Figure 1 for Beyond Score Changes: Adversarial Attack on No-Reference Image Quality Assessment from Two Perspectives
Figure 2 for Beyond Score Changes: Adversarial Attack on No-Reference Image Quality Assessment from Two Perspectives
Figure 3 for Beyond Score Changes: Adversarial Attack on No-Reference Image Quality Assessment from Two Perspectives
Figure 4 for Beyond Score Changes: Adversarial Attack on No-Reference Image Quality Assessment from Two Perspectives
Viaarxiv icon

Deep Policy Optimization with Temporal Logic Constraints

Add code
Apr 17, 2024
Figure 1 for Deep Policy Optimization with Temporal Logic Constraints
Figure 2 for Deep Policy Optimization with Temporal Logic Constraints
Figure 3 for Deep Policy Optimization with Temporal Logic Constraints
Figure 4 for Deep Policy Optimization with Temporal Logic Constraints
Viaarxiv icon

Defense Against Adversarial Attacks on No-Reference Image Quality Models with Gradient Norm Regularization

Add code
Mar 18, 2024
Figure 1 for Defense Against Adversarial Attacks on No-Reference Image Quality Models with Gradient Norm Regularization
Figure 2 for Defense Against Adversarial Attacks on No-Reference Image Quality Models with Gradient Norm Regularization
Figure 3 for Defense Against Adversarial Attacks on No-Reference Image Quality Models with Gradient Norm Regularization
Figure 4 for Defense Against Adversarial Attacks on No-Reference Image Quality Models with Gradient Norm Regularization
Viaarxiv icon

Exploring Vulnerabilities of No-Reference Image Quality Assessment Models: A Query-Based Black-Box Method

Add code
Jan 17, 2024
Figure 1 for Exploring Vulnerabilities of No-Reference Image Quality Assessment Models: A Query-Based Black-Box Method
Figure 2 for Exploring Vulnerabilities of No-Reference Image Quality Assessment Models: A Query-Based Black-Box Method
Figure 3 for Exploring Vulnerabilities of No-Reference Image Quality Assessment Models: A Query-Based Black-Box Method
Figure 4 for Exploring Vulnerabilities of No-Reference Image Quality Assessment Models: A Query-Based Black-Box Method
Viaarxiv icon

On a Foundation Model for Operating Systems

Add code
Dec 13, 2023
Figure 1 for On a Foundation Model for Operating Systems
Figure 2 for On a Foundation Model for Operating Systems
Viaarxiv icon

Adaptive Scheduling for Edge-Assisted DNN Serving

Add code
May 02, 2023
Viaarxiv icon

Policy Optimization with Robustness Certificates

Add code
Jan 26, 2023
Figure 1 for Policy Optimization with Robustness Certificates
Figure 2 for Policy Optimization with Robustness Certificates
Figure 3 for Policy Optimization with Robustness Certificates
Figure 4 for Policy Optimization with Robustness Certificates
Viaarxiv icon

Safe Neurosymbolic Learning with Differentiable Symbolic Execution

Add code
Mar 15, 2022
Figure 1 for Safe Neurosymbolic Learning with Differentiable Symbolic Execution
Figure 2 for Safe Neurosymbolic Learning with Differentiable Symbolic Execution
Figure 3 for Safe Neurosymbolic Learning with Differentiable Symbolic Execution
Figure 4 for Safe Neurosymbolic Learning with Differentiable Symbolic Execution
Viaarxiv icon