Alert button
Picture for Yuxin Su

Yuxin Su

Alert button

Face It Yourselves: An LLM-Based Two-Stage Strategy to Localize Configuration Errors via Logs

Add code
Bookmark button
Alert button
Apr 02, 2024
Shiwen Shan, Yintong Huo, Yuxin Su, Yichen Li, Dan Li, Zibin Zheng

Viaarxiv icon

Can Language Models Pretend Solvers? Logic Code Simulation with LLMs

Add code
Bookmark button
Alert button
Mar 28, 2024
Minyu Chen, Guoqiang Li, Ling-I Wu, Ruibang Liu, Yuxin Su, Xi Chang, Jianxin Xue

Viaarxiv icon

MTAD: Tools and Benchmarks for Multivariate Time Series Anomaly Detection

Add code
Bookmark button
Alert button
Jan 10, 2024
Jinyang Liu, Wenwei Gu, Zhuangbin Chen, Yichen Li, Yuxin Su, Michael R. Lyu

Viaarxiv icon

Practical Anomaly Detection over Multivariate Monitoring Metrics for Online Services

Add code
Bookmark button
Alert button
Aug 19, 2023
Jinyang Liu, Tianyi Yang, Zhuangbin Chen, Yuxin Su, Cong Feng, Zengyin Yang, Michael R. Lyu

Figure 1 for Practical Anomaly Detection over Multivariate Monitoring Metrics for Online Services
Figure 2 for Practical Anomaly Detection over Multivariate Monitoring Metrics for Online Services
Figure 3 for Practical Anomaly Detection over Multivariate Monitoring Metrics for Online Services
Figure 4 for Practical Anomaly Detection over Multivariate Monitoring Metrics for Online Services
Viaarxiv icon

Performance Issue Identification in Cloud Systems with Relational-Temporal Anomaly Detection

Add code
Bookmark button
Alert button
Aug 01, 2023
Wenwei Gu, Jinyang Liu, Zhuangbin Chen, Jianping Zhang, Yuxin Su, Jiazhen Gu, Cong Feng, Zengyin Yang, Michael Lyu

Figure 1 for Performance Issue Identification in Cloud Systems with Relational-Temporal Anomaly Detection
Figure 2 for Performance Issue Identification in Cloud Systems with Relational-Temporal Anomaly Detection
Figure 3 for Performance Issue Identification in Cloud Systems with Relational-Temporal Anomaly Detection
Figure 4 for Performance Issue Identification in Cloud Systems with Relational-Temporal Anomaly Detection
Viaarxiv icon

Improving the Transferability of Adversarial Samples by Path-Augmented Method

Add code
Bookmark button
Alert button
Mar 28, 2023
Jianping Zhang, Jen-tse Huang, Wenxuan Wang, Yichen Li, Weibin Wu, Xiaosen Wang, Yuxin Su, Michael R. Lyu

Figure 1 for Improving the Transferability of Adversarial Samples by Path-Augmented Method
Figure 2 for Improving the Transferability of Adversarial Samples by Path-Augmented Method
Figure 3 for Improving the Transferability of Adversarial Samples by Path-Augmented Method
Figure 4 for Improving the Transferability of Adversarial Samples by Path-Augmented Method
Viaarxiv icon

Heterogeneous Anomaly Detection for Software Systems via Semi-supervised Cross-modal Attention

Add code
Bookmark button
Alert button
Feb 14, 2023
Cheryl Lee, Tianyi Yang, Zhuangbin Chen, Yuxin Su, Yongqiang Yang, Michael R. Lyu

Figure 1 for Heterogeneous Anomaly Detection for Software Systems via Semi-supervised Cross-modal Attention
Figure 2 for Heterogeneous Anomaly Detection for Software Systems via Semi-supervised Cross-modal Attention
Figure 3 for Heterogeneous Anomaly Detection for Software Systems via Semi-supervised Cross-modal Attention
Figure 4 for Heterogeneous Anomaly Detection for Software Systems via Semi-supervised Cross-modal Attention
Viaarxiv icon

AEON: A Method for Automatic Evaluation of NLP Test Cases

Add code
Bookmark button
Alert button
May 13, 2022
Jen-tse Huang, Jianping Zhang, Wenxuan Wang, Pinjia He, Yuxin Su, Michael R. Lyu

Figure 1 for AEON: A Method for Automatic Evaluation of NLP Test Cases
Figure 2 for AEON: A Method for Automatic Evaluation of NLP Test Cases
Figure 3 for AEON: A Method for Automatic Evaluation of NLP Test Cases
Figure 4 for AEON: A Method for Automatic Evaluation of NLP Test Cases
Viaarxiv icon

Improving Adversarial Transferability via Neuron Attribution-Based Attacks

Add code
Bookmark button
Alert button
Mar 31, 2022
Jianping Zhang, Weibin Wu, Jen-tse Huang, Yizhan Huang, Wenxuan Wang, Yuxin Su, Michael R. Lyu

Figure 1 for Improving Adversarial Transferability via Neuron Attribution-Based Attacks
Figure 2 for Improving Adversarial Transferability via Neuron Attribution-Based Attacks
Figure 3 for Improving Adversarial Transferability via Neuron Attribution-Based Attacks
Figure 4 for Improving Adversarial Transferability via Neuron Attribution-Based Attacks
Viaarxiv icon