Picture for Junjie Huang

Junjie Huang

Recall-Augmented Ranking: Enhancing Click-Through Rate Prediction Accuracy with Cross-Stage Data

Apr 15, 2024
Figure 1 for Recall-Augmented Ranking: Enhancing Click-Through Rate Prediction Accuracy with Cross-Stage Data
Figure 2 for Recall-Augmented Ranking: Enhancing Click-Through Rate Prediction Accuracy with Cross-Stage Data
Figure 3 for Recall-Augmented Ranking: Enhancing Click-Through Rate Prediction Accuracy with Cross-Stage Data
Figure 4 for Recall-Augmented Ranking: Enhancing Click-Through Rate Prediction Accuracy with Cross-Stage Data
Viaarxiv icon

Knowledge-aware Alert Aggregation in Large-scale Cloud Systems: a Hybrid Approach

Mar 11, 2024
Figure 1 for Knowledge-aware Alert Aggregation in Large-scale Cloud Systems: a Hybrid Approach
Figure 2 for Knowledge-aware Alert Aggregation in Large-scale Cloud Systems: a Hybrid Approach
Figure 3 for Knowledge-aware Alert Aggregation in Large-scale Cloud Systems: a Hybrid Approach
Figure 4 for Knowledge-aware Alert Aggregation in Large-scale Cloud Systems: a Hybrid Approach
Viaarxiv icon

FaultProfIT: Hierarchical Fault Profiling of Incident Tickets in Large-scale Cloud Systems

Feb 27, 2024
Viaarxiv icon

Detecting As Labeling: Rethinking LiDAR-camera Fusion in 3D Object Detection

Add code
Nov 13, 2023
Viaarxiv icon

ReLoop2: Building Self-Adaptive Recommendation Models via Responsive Error Compensation Loop

Add code
Jun 22, 2023
Figure 1 for ReLoop2: Building Self-Adaptive Recommendation Models via Responsive Error Compensation Loop
Figure 2 for ReLoop2: Building Self-Adaptive Recommendation Models via Responsive Error Compensation Loop
Figure 3 for ReLoop2: Building Self-Adaptive Recommendation Models via Responsive Error Compensation Loop
Figure 4 for ReLoop2: Building Self-Adaptive Recommendation Models via Responsive Error Compensation Loop
Viaarxiv icon

Scalable and Adaptive Log-based Anomaly Detection with Expert in the Loop

Jun 08, 2023
Figure 1 for Scalable and Adaptive Log-based Anomaly Detection with Expert in the Loop
Figure 2 for Scalable and Adaptive Log-based Anomaly Detection with Expert in the Loop
Figure 3 for Scalable and Adaptive Log-based Anomaly Detection with Expert in the Loop
Figure 4 for Scalable and Adaptive Log-based Anomaly Detection with Expert in the Loop
Viaarxiv icon

HiTIN: Hierarchy-aware Tree Isomorphism Network for Hierarchical Text Classification

Add code
May 24, 2023
Figure 1 for HiTIN: Hierarchy-aware Tree Isomorphism Network for Hierarchical Text Classification
Figure 2 for HiTIN: Hierarchy-aware Tree Isomorphism Network for Hierarchical Text Classification
Figure 3 for HiTIN: Hierarchy-aware Tree Isomorphism Network for Hierarchical Text Classification
Figure 4 for HiTIN: Hierarchy-aware Tree Isomorphism Network for Hierarchical Text Classification
Viaarxiv icon

Adversarial Learning Data Augmentation for Graph Contrastive Learning in Recommendation

Add code
Feb 05, 2023
Figure 1 for Adversarial Learning Data Augmentation for Graph Contrastive Learning in Recommendation
Figure 2 for Adversarial Learning Data Augmentation for Graph Contrastive Learning in Recommendation
Figure 3 for Adversarial Learning Data Augmentation for Graph Contrastive Learning in Recommendation
Figure 4 for Adversarial Learning Data Augmentation for Graph Contrastive Learning in Recommendation
Viaarxiv icon

Imperceptible Adversarial Attack via Invertible Neural Networks

Add code
Dec 04, 2022
Figure 1 for Imperceptible Adversarial Attack via Invertible Neural Networks
Figure 2 for Imperceptible Adversarial Attack via Invertible Neural Networks
Figure 3 for Imperceptible Adversarial Attack via Invertible Neural Networks
Figure 4 for Imperceptible Adversarial Attack via Invertible Neural Networks
Viaarxiv icon

BEVPoolv2: A Cutting-edge Implementation of BEVDet Toward Deployment

Add code
Nov 30, 2022
Figure 1 for BEVPoolv2: A Cutting-edge Implementation of BEVDet Toward Deployment
Figure 2 for BEVPoolv2: A Cutting-edge Implementation of BEVDet Toward Deployment
Figure 3 for BEVPoolv2: A Cutting-edge Implementation of BEVDet Toward Deployment
Figure 4 for BEVPoolv2: A Cutting-edge Implementation of BEVDet Toward Deployment
Viaarxiv icon