Picture for Junjie Huang

Junjie Huang

ToCoAD: Two-Stage Contrastive Learning for Industrial Anomaly Detection

Add code
Jul 01, 2024
Viaarxiv icon

Recall-Augmented Ranking: Enhancing Click-Through Rate Prediction Accuracy with Cross-Stage Data

Add code
Apr 15, 2024
Figure 1 for Recall-Augmented Ranking: Enhancing Click-Through Rate Prediction Accuracy with Cross-Stage Data
Figure 2 for Recall-Augmented Ranking: Enhancing Click-Through Rate Prediction Accuracy with Cross-Stage Data
Figure 3 for Recall-Augmented Ranking: Enhancing Click-Through Rate Prediction Accuracy with Cross-Stage Data
Figure 4 for Recall-Augmented Ranking: Enhancing Click-Through Rate Prediction Accuracy with Cross-Stage Data
Viaarxiv icon

Knowledge-aware Alert Aggregation in Large-scale Cloud Systems: a Hybrid Approach

Add code
Mar 11, 2024
Figure 1 for Knowledge-aware Alert Aggregation in Large-scale Cloud Systems: a Hybrid Approach
Figure 2 for Knowledge-aware Alert Aggregation in Large-scale Cloud Systems: a Hybrid Approach
Figure 3 for Knowledge-aware Alert Aggregation in Large-scale Cloud Systems: a Hybrid Approach
Figure 4 for Knowledge-aware Alert Aggregation in Large-scale Cloud Systems: a Hybrid Approach
Viaarxiv icon

FaultProfIT: Hierarchical Fault Profiling of Incident Tickets in Large-scale Cloud Systems

Add code
Feb 27, 2024
Figure 1 for FaultProfIT: Hierarchical Fault Profiling of Incident Tickets in Large-scale Cloud Systems
Figure 2 for FaultProfIT: Hierarchical Fault Profiling of Incident Tickets in Large-scale Cloud Systems
Figure 3 for FaultProfIT: Hierarchical Fault Profiling of Incident Tickets in Large-scale Cloud Systems
Figure 4 for FaultProfIT: Hierarchical Fault Profiling of Incident Tickets in Large-scale Cloud Systems
Viaarxiv icon

Detecting As Labeling: Rethinking LiDAR-camera Fusion in 3D Object Detection

Add code
Nov 13, 2023
Viaarxiv icon

ReLoop2: Building Self-Adaptive Recommendation Models via Responsive Error Compensation Loop

Add code
Jun 22, 2023
Figure 1 for ReLoop2: Building Self-Adaptive Recommendation Models via Responsive Error Compensation Loop
Figure 2 for ReLoop2: Building Self-Adaptive Recommendation Models via Responsive Error Compensation Loop
Figure 3 for ReLoop2: Building Self-Adaptive Recommendation Models via Responsive Error Compensation Loop
Figure 4 for ReLoop2: Building Self-Adaptive Recommendation Models via Responsive Error Compensation Loop
Viaarxiv icon

Scalable and Adaptive Log-based Anomaly Detection with Expert in the Loop

Add code
Jun 08, 2023
Figure 1 for Scalable and Adaptive Log-based Anomaly Detection with Expert in the Loop
Figure 2 for Scalable and Adaptive Log-based Anomaly Detection with Expert in the Loop
Figure 3 for Scalable and Adaptive Log-based Anomaly Detection with Expert in the Loop
Figure 4 for Scalable and Adaptive Log-based Anomaly Detection with Expert in the Loop
Viaarxiv icon

HiTIN: Hierarchy-aware Tree Isomorphism Network for Hierarchical Text Classification

Add code
May 24, 2023
Figure 1 for HiTIN: Hierarchy-aware Tree Isomorphism Network for Hierarchical Text Classification
Figure 2 for HiTIN: Hierarchy-aware Tree Isomorphism Network for Hierarchical Text Classification
Figure 3 for HiTIN: Hierarchy-aware Tree Isomorphism Network for Hierarchical Text Classification
Figure 4 for HiTIN: Hierarchy-aware Tree Isomorphism Network for Hierarchical Text Classification
Viaarxiv icon

Adversarial Learning Data Augmentation for Graph Contrastive Learning in Recommendation

Add code
Feb 05, 2023
Figure 1 for Adversarial Learning Data Augmentation for Graph Contrastive Learning in Recommendation
Figure 2 for Adversarial Learning Data Augmentation for Graph Contrastive Learning in Recommendation
Figure 3 for Adversarial Learning Data Augmentation for Graph Contrastive Learning in Recommendation
Figure 4 for Adversarial Learning Data Augmentation for Graph Contrastive Learning in Recommendation
Viaarxiv icon

Imperceptible Adversarial Attack via Invertible Neural Networks

Add code
Dec 04, 2022
Figure 1 for Imperceptible Adversarial Attack via Invertible Neural Networks
Figure 2 for Imperceptible Adversarial Attack via Invertible Neural Networks
Figure 3 for Imperceptible Adversarial Attack via Invertible Neural Networks
Figure 4 for Imperceptible Adversarial Attack via Invertible Neural Networks
Viaarxiv icon