Alert button
Picture for Junjie Huang

Junjie Huang

Alert button

Recall-Augmented Ranking: Enhancing Click-Through Rate Prediction Accuracy with Cross-Stage Data

Add code
Bookmark button
Alert button
Apr 15, 2024
Junjie Huang, Guohao Cai, Jieming Zhu, Zhenhua Dong, Ruiming Tang, Weinan Zhang, Yong Yu

Viaarxiv icon

Knowledge-aware Alert Aggregation in Large-scale Cloud Systems: a Hybrid Approach

Add code
Bookmark button
Alert button
Mar 11, 2024
Jinxi Kuang, Jinyang Liu, Junjie Huang, Renyi Zhong, Jiazhen Gu, Lan Yu, Rui Tan, Zengyin Yang, Michael R. Lyu

Figure 1 for Knowledge-aware Alert Aggregation in Large-scale Cloud Systems: a Hybrid Approach
Figure 2 for Knowledge-aware Alert Aggregation in Large-scale Cloud Systems: a Hybrid Approach
Figure 3 for Knowledge-aware Alert Aggregation in Large-scale Cloud Systems: a Hybrid Approach
Figure 4 for Knowledge-aware Alert Aggregation in Large-scale Cloud Systems: a Hybrid Approach
Viaarxiv icon

FaultProfIT: Hierarchical Fault Profiling of Incident Tickets in Large-scale Cloud Systems

Add code
Bookmark button
Alert button
Feb 27, 2024
Junjie Huang, Jinyang Liu, Zhuangbin Chen, Zhihan Jiang, Yichen LI, Jiazhen Gu, Cong Feng, Zengyin Yang, Yongqiang Yang, Michael R. Lyu

Viaarxiv icon

Detecting As Labeling: Rethinking LiDAR-camera Fusion in 3D Object Detection

Add code
Bookmark button
Alert button
Nov 13, 2023
Junjie Huang, Yun Ye, Zhujin Liang, Yi Shan, Dalong Du

Viaarxiv icon

ReLoop2: Building Self-Adaptive Recommendation Models via Responsive Error Compensation Loop

Add code
Bookmark button
Alert button
Jun 22, 2023
Jieming Zhu, Guohao Cai, Junjie Huang, Zhenhua Dong, Ruiming Tang, Weinan Zhang

Figure 1 for ReLoop2: Building Self-Adaptive Recommendation Models via Responsive Error Compensation Loop
Figure 2 for ReLoop2: Building Self-Adaptive Recommendation Models via Responsive Error Compensation Loop
Figure 3 for ReLoop2: Building Self-Adaptive Recommendation Models via Responsive Error Compensation Loop
Figure 4 for ReLoop2: Building Self-Adaptive Recommendation Models via Responsive Error Compensation Loop
Viaarxiv icon

Scalable and Adaptive Log-based Anomaly Detection with Expert in the Loop

Add code
Bookmark button
Alert button
Jun 08, 2023
Jinyang Liu, Junjie Huang, Yintong Huo, Zhihan Jiang, Jiazhen Gu, Zhuangbin Chen, Cong Feng, Minzhi Yan, Michael R. Lyu

Figure 1 for Scalable and Adaptive Log-based Anomaly Detection with Expert in the Loop
Figure 2 for Scalable and Adaptive Log-based Anomaly Detection with Expert in the Loop
Figure 3 for Scalable and Adaptive Log-based Anomaly Detection with Expert in the Loop
Figure 4 for Scalable and Adaptive Log-based Anomaly Detection with Expert in the Loop
Viaarxiv icon

HiTIN: Hierarchy-aware Tree Isomorphism Network for Hierarchical Text Classification

Add code
Bookmark button
Alert button
May 24, 2023
He Zhu, Chong Zhang, Junjie Huang, Junran Wu, Ke Xu

Figure 1 for HiTIN: Hierarchy-aware Tree Isomorphism Network for Hierarchical Text Classification
Figure 2 for HiTIN: Hierarchy-aware Tree Isomorphism Network for Hierarchical Text Classification
Figure 3 for HiTIN: Hierarchy-aware Tree Isomorphism Network for Hierarchical Text Classification
Figure 4 for HiTIN: Hierarchy-aware Tree Isomorphism Network for Hierarchical Text Classification
Viaarxiv icon

Adversarial Learning Data Augmentation for Graph Contrastive Learning in Recommendation

Add code
Bookmark button
Alert button
Feb 05, 2023
Junjie Huang, Qi Cao, Ruobing Xie, Shaoliang Zhang, Feng Xia, Huawei Shen, Xueqi Cheng

Figure 1 for Adversarial Learning Data Augmentation for Graph Contrastive Learning in Recommendation
Figure 2 for Adversarial Learning Data Augmentation for Graph Contrastive Learning in Recommendation
Figure 3 for Adversarial Learning Data Augmentation for Graph Contrastive Learning in Recommendation
Figure 4 for Adversarial Learning Data Augmentation for Graph Contrastive Learning in Recommendation
Viaarxiv icon

Imperceptible Adversarial Attack via Invertible Neural Networks

Add code
Bookmark button
Alert button
Dec 04, 2022
Zihan Chen, Ziyue Wang, Junjie Huang, Wentao Zhao, Xiao Liu, Dejian Guan

Figure 1 for Imperceptible Adversarial Attack via Invertible Neural Networks
Figure 2 for Imperceptible Adversarial Attack via Invertible Neural Networks
Figure 3 for Imperceptible Adversarial Attack via Invertible Neural Networks
Figure 4 for Imperceptible Adversarial Attack via Invertible Neural Networks
Viaarxiv icon