Alert button
Picture for Hongyi Wen

Hongyi Wen

Alert button

Diffusion Cocktail: Fused Generation from Diffusion Models

Add code
Bookmark button
Alert button
Dec 12, 2023
Haoming Liu, Yuanhe Guo, Shengjie Wang, Hongyi Wen

Viaarxiv icon

Towards Personalized Prompt-Model Retrieval for Generative Recommendation

Add code
Bookmark button
Alert button
Aug 04, 2023
Yuanhe Guo, Haoming Liu, Hongyi Wen

Figure 1 for Towards Personalized Prompt-Model Retrieval for Generative Recommendation
Figure 2 for Towards Personalized Prompt-Model Retrieval for Generative Recommendation
Figure 3 for Towards Personalized Prompt-Model Retrieval for Generative Recommendation
Figure 4 for Towards Personalized Prompt-Model Retrieval for Generative Recommendation
Viaarxiv icon

Evaluating Music Recommendations with Binary Feedback for Multiple Stakeholders

Add code
Bookmark button
Alert button
Sep 16, 2021
Sasha Stoikov, Hongyi Wen

Figure 1 for Evaluating Music Recommendations with Binary Feedback for Multiple Stakeholders
Figure 2 for Evaluating Music Recommendations with Binary Feedback for Multiple Stakeholders
Figure 3 for Evaluating Music Recommendations with Binary Feedback for Multiple Stakeholders
Viaarxiv icon

Correcting the User Feedback-Loop Bias for Recommendation Systems

Add code
Bookmark button
Alert button
Sep 13, 2021
Weishen Pan, Sen Cui, Hongyi Wen, Kun Chen, Changshui Zhang, Fei Wang

Figure 1 for Correcting the User Feedback-Loop Bias for Recommendation Systems
Figure 2 for Correcting the User Feedback-Loop Bias for Recommendation Systems
Figure 3 for Correcting the User Feedback-Loop Bias for Recommendation Systems
Figure 4 for Correcting the User Feedback-Loop Bias for Recommendation Systems
Viaarxiv icon

Revisiting Adversarially Learned Injection Attacks Against Recommender Systems

Add code
Bookmark button
Alert button
Aug 28, 2020
Jiaxi Tang, Hongyi Wen, Ke Wang

Figure 1 for Revisiting Adversarially Learned Injection Attacks Against Recommender Systems
Figure 2 for Revisiting Adversarially Learned Injection Attacks Against Recommender Systems
Figure 3 for Revisiting Adversarially Learned Injection Attacks Against Recommender Systems
Figure 4 for Revisiting Adversarially Learned Injection Attacks Against Recommender Systems
Viaarxiv icon