no code implementations • 21 Feb 2024 • Shishun Zhang, Qijin She, Wenhao Li, Chenyang Zhu, Yongjun Wang, Ruizhen Hu, Kai Xu
To achieve the goal, the core idea is to develop an effective object-to-arm task assignment strategy for minimizing the cumulative task execution time and maximizing the dual-arm cooperation efficiency.
1 code implementation • 25 Jul 2023 • Hongzuo Xu, Yijie Wang, Guansong Pang, Songlei Jian, Ning Liu, Yongjun Wang
anomaly contamination.
Semi-supervised Anomaly Detection Supervised Anomaly Detection +1
1 code implementation • 25 Jul 2022 • Hongzuo Xu, Yijie Wang, Songlei Jian, Qing Liao, Yongjun Wang, Guansong Pang
Our one-class classifier is calibrated in two ways: (1) by adaptively penalizing uncertain predictions, which helps eliminate the impact of anomaly contamination while accentuating the predictions that the one-class model is confident in, and (2) by discriminating the normal samples from native anomaly examples that are generated to simulate genuine time series abnormal behaviors on the basis of original data.
2 code implementations • 14 Jun 2022 • Hongzuo Xu, Guansong Pang, Yijie Wang, Yongjun Wang
Isolation forest (iForest) has been emerging as arguably the most popular anomaly detector in recent years due to its general effectiveness across different benchmarks and strong scalability.
Ranked #1 on Anomaly Detection on NB15-DoS
no code implementations • 3 Feb 2022 • Tao Liu, Shu Guo, Hao liu, Rui Kang, Mingyang Bai, Jiyang Jiang, Wei Wen, Xing Pan, Jun Tai, JianXin Li, Jian Cheng, Jing Jing, Zhenzhou Wu, Haijun Niu, Haogang Zhu, Zixiao Li, Yongjun Wang, Henry Brodaty, Perminder Sachdev, Daqing Li
Degeneration and adaptation are two competing sides of the same coin called resilience in the progressive processes of brain aging or diseases.
no code implementations • 30 Apr 2021 • Zhiyue Wu, Hongzuo Xu, Guansong Pang, Fengyuan Yu, Yijie Wang, Songlei Jian, Yongjun Wang
DRAM failure prediction is a vital task in AIOps, which is crucial to maintain the reliability and sustainable service of large-scale data centers.
1 code implementation • 19 Apr 2021 • Hongzuo Xu, Yijie Wang, Songlei Jian, Zhenyu Huang, Ning Liu, Yongjun Wang, Fei Li
We obtain an optimal attention-guided embedding space with expanded high-level information and rich semantics, and thus outlying behaviors of the queried outlier can be better unfolded.
no code implementations • 25 Jan 2021 • Mantun Chen, Yongjun Wang, Zhiquan Qin, Xiatian Zhu
To address this, we introduce a model-agnostic, efficient, and Harmonious Data Augmentation (HDA) method that can improve deep WF attacking methods significantly.
Data Augmentation Cryptography and Security 68M25 K.4.1
1 code implementation • 1 Nov 2019 • Hongzuo Xu, Yijie Wang, Yongjun Wang, Zhiyue Wu
Mixed-type data are pervasive in real life, but very limited outlier detection methods are available for these data.
Ranked #1 on Outlier Detection on Hepatitis
1 code implementation • 1 Jul 2019 • Hongzuo Xu, Yongjun Wang, Zhiyue Wu, Yijie Wang
Non-IID categorical data are ubiquitous and distinct in real-world applications.
no code implementations • 9 Apr 2015 • Xiangru Li, Yu Lu, Georges Comte, Ali Luo, Yongheng Zhao, Yongjun Wang
On real spectra, we extracted 23 features to estimate $T_{eff}$, 62 features for log$~g$, and 68 features for [Fe/H].